x0) [ 2107.787820] audit: type=1326 audit(1764510108.578:5745): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=32747 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=89 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2107.800595] audit: type=1326 audit(1764510108.579:5746): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=32747 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2107.819480] audit: type=1326 audit(1764510108.579:5747): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=32747 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=261 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 13:41:57 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1}, 0x0, 0x700000000000000}) 13:41:57 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xa28}}, './file0/file0\x00'}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000180)) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/44, 0x2c) futimesat(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r2, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000140)={0x6, 0x9c8, 0x101}) sendfile(r1, r2, &(0x7f0000000240)=0x9, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) 13:41:57 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='setgroups\x00') readv(r0, &(0x7f0000000680)=[{&(0x7f0000000180)=""/201, 0xc9}], 0x1) write$P9_RUNLINKAT(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000040)) futimesat(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', 0x0) 13:41:57 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0xc, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:41:57 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0xa00}}, &(0x7f00000001c0), 0x0) 13:41:57 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0xe}], 0x1, 0x0) 13:41:57 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x60, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:41:57 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000005c0)=ANY=[@ANYBLOB="73c4c5c69f6ee2e9170000", @ANYRES32=r0, @ANYBLOB="254e1938057907becc68eccd083658474791aeaccdc60b7739041c7295d32d8a44bb79b25c6b3e2f2c3a9a2945b1e6ef188631dbe8a2f26f6456007ee347fc70e6804f6a5471390c020d13421d5e8321f2412a62a1d06551a4fd4f5b83b1d919ff54018b343deba1af11b30ad3bfe6c379b27138379decda63d6c95d05bc84ab2b2fd99e7251898c23b20e20e11acc702a864528dc20aea1c19091e57dee38faf5239f115f0372055d9e0f12e9fee626eb96db877317b3faacea0a56159ad6045a7213cdd7010d6365fa66956d493b430264186e9475f38445889481d9000000000000"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000040)) eventfd(0x4727) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000340)=""/4, 0x4) write(0xffffffffffffffff, &(0x7f0000000100)="5ed0b2ff68d76fb346352b602a2a1295cbe01cb3f64fbed9e7f9bc9be0f300cb97f6a204cc585145dfb949002f6117fc969dd435dd0c37c5077e5b10cfeafd75205e215b167323a3b971b0ec8583851f2567d30bf5baf28aabb598e6c3d4d825cae01271cb35cdd091e4872367f354e0dc81a7e4ac79775bc1dcaafe2f5079da7dd1989f1ddce6722fc438a7217526cfe75d53471624d6f091e19a7fb699ea27efa9e0fd1914e7c35f297afd9b9bad399bcc85ff0ce7a982f4fa0c172ea5f06479eec302f30e5df66273717e028f4ca7d4c5b6bc8a3c3c67f688195f22488a15d9e1f7e5fed3a6c2aba7bc308b0e2c5657f4538f4a3bf9b975bb887a901ab3c85261be3e331b741313e78b5ad63b7b1b378e9479dc4a95b2b4d15cd1d1b808844378f882a72af1e5b0eefd356e0247246e60643204c3b46183dbe4e066c55cb1dcdaa7b70ef43ab2fa4d2b8c4c1a89cb0e325fd9716874d3856cf368efcdf92d21214e55e4de647c37c71887d11f74f9afe1616e3054ceae601e4b3555e243c1882ad42c7730caeb309e7714ad87c55e9fba308cfc4161e562abde3ac4f3d7e0a3584d49f90692e4c7a4591928100197f102309b05c0b4b4898b0591bc1433af443478979f28e6136ffb21aaeac2be5490475a08e96bb94fd9d9d3aa2f8a1e147a80ba9bfd04dac3f476ff128476c693ea71f7be47a508c98eddc479eb703d6f", 0x200) fork() r2 = fork() ptrace(0x10, r2) ptrace(0x8, r2) wait4(r2, 0x0, 0x20000000, &(0x7f0000000400)) [ 2117.103922] kauditd_printk_skb: 51 callbacks suppressed [ 2117.103945] audit: type=1326 audit(1764510118.020:5799): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=32882 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2117.131843] audit: type=1326 audit(1764510118.023:5800): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=32882 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f5a06d05a04 code=0x7ffc0000 [ 2117.146188] audit: type=1326 audit(1764510118.025:5801): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=32882 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2117.164538] audit: type=1326 audit(1764510118.027:5802): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=32882 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=19 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2117.183393] audit: type=1326 audit(1764510118.027:5803): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=32882 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 13:41:58 executing program 5: lsetxattr$security_ima(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@v1={0x2, "70eda7ed0683bd1d4e8a57"}, 0xc, 0x3) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f00000002c0)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x1, 0x5) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f00000001c0)) lsetxattr$security_ima(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240), &(0x7f0000000280)=ANY=[@ANYBLOB="993293ff00005a"], 0x10, 0x3) [ 2117.198508] audit: type=1326 audit(1764510118.030:5804): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=32882 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2117.212180] audit: type=1326 audit(1764510118.030:5805): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=32882 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 13:41:58 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x40000080) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) futimesat(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', 0x0) [ 2117.230825] audit: type=1326 audit(1764510118.032:5806): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=32885 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2117.254848] audit: type=1326 audit(1764510118.033:5807): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=32882 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 13:41:58 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0x10}], 0x1, 0x0) 13:41:58 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0x2000}}, &(0x7f00000001c0), 0x0) [ 2117.278037] audit: type=1326 audit(1764510118.033:5808): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=32882 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 13:41:58 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x300, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:41:58 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xa28}}, './file0/file0\x00'}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000180)) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/44, 0x2c) futimesat(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r2, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000140)={0x6, 0x9c8, 0x101}) sendfile(r1, r2, &(0x7f0000000240)=0x9, 0x0) 13:41:58 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0xd, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:41:58 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f00000000c0)={{0x0, 0x2, 0x5, 0x0, 0x6}, 0xffff, 0x7f}) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) 13:41:58 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000005c0)=ANY=[@ANYBLOB="73c4a2c69f66e2e9170000", @ANYRES32=r0, @ANYBLOB="254e1938057907becc68eccd083658474791aeaccdc60b7739041c7295d32d8a44bb79b25c6b3e2f2c3a9a2945b1e6ef188631dbe8a2f26f6456007ee347fc70e6804f6a5471390c020d13421d5e8321f2412a62a1d06551a4fd4f5b83b1d919ff54018b343deba1af11b30ad3bfe6c379b27138379decda63d6c95d05bc84ab2b2fd99e7251898c23b20e20e11acc702a864528dc20aea1c19091e57dee38faf5239f115f0372055d9e0f12e9fee626eb96db877317b3faacea0a56159ad6045a7213cdd7010d6365fa66956d493b430264186e9475f38445889481d9000000000000"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000040)) eventfd(0x4727) ioctl$TIOCNXCL(r0, 0x540d) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="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", 0x200) fork() r2 = fork() ptrace(0x10, r2) ptrace(0x8, r2) wait4(r2, 0x0, 0x20000000, &(0x7f0000000400)) 13:41:58 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) futimesat(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', 0x0) 13:42:07 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0x4000}}, &(0x7f00000001c0), 0x0) 13:42:07 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x500, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:42:07 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000005c0)=ANY=[@ANYBLOB="73c4a2c69f66e2e9170000", @ANYRES32=r0, @ANYBLOB="254e1938057907becc68eccd083658474791aeaccdc60b7739041c7295d32d8a44bb79b25c6b3e2f2c3a9a2945b1e6ef188631dbe8a2f26f6456007ee347fc70e6804f6a5471390c020d13421d5e8321f2412a62a1d06551a4fd4f5b83b1d919ff54018b343deba1af11b30ad3bfe6c379b27138379decda63d6c95d05bc84ab2b2fd99e7251898c23b20e20e11acc702a864528dc20aea1c19091e57dee38faf5239f115f0372055d9e0f12e9fee626eb96db877317b3faacea0a56159ad6045a7213cdd7010d6365fa66956d493b430264186e9475f38445889481d9000000000000"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000040)) eventfd(0x4727) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="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", 0x200) fork() rt_sigtimedwait(&(0x7f0000000340)={[0x1ff]}, &(0x7f00000004c0), &(0x7f0000000380)={0x77359400}, 0x8) r2 = fork() ptrace(0x10, r2) ptrace(0x8, r2) wait4(r2, 0x0, 0x20000000, &(0x7f0000000400)) 13:42:07 executing program 1: ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000040)={0x8, 0x381e, 0x48, 0x0, 0xd, "e4c7bbc9aa37867c"}) syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000000)={0x0, &(0x7f0000000100)}) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000240)=""/4096) write(r0, &(0x7f00000000c0)="ef97ba6b8430655c45c5c8879310afa50de7f0ba94a169b38a1dccf94e55c1190deb2682d5959837e414251571c3fc9ba767b7a93776a6088bc77d2f4bae4ab6c6c35cc554f2df4f4f9bc72e5c9e872c2b9c1bdb8c3f48cdaa988874", 0x5c) ioctl$VT_SETMODE(r0, 0x5602, &(0x7f0000000000)={0x3c, 0x1, 0x1ff, 0x4, 0x81}) ioctl$TCXONC(r0, 0x540a, 0x3) r1 = eventfd2(0x101, 0x80000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x8, 0x2) futimesat(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', 0x0) 13:42:07 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0xe, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:42:07 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f00000000c0)={{0x3, 0x0, 0x816e, 0x0, 0xffff2d50}, 0x7, 0x8}) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='setgroups\x00') readv(r1, &(0x7f0000000680)=[{&(0x7f0000000180)=""/201, 0xc9}], 0x1) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f0000000280)={{0x0, 0xc002c098f6a2202a, 0xcf, 0x0, 0x3}, 0x9, 0x7f}) write$P9_RUNLINKAT(r1, 0x0, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000140), 0x2, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='setgroups\x00') readv(r3, &(0x7f0000000680)=[{&(0x7f0000000180)=""/201, 0xc9}], 0x1) write$P9_RUNLINKAT(r3, 0x0, 0x0) write$P9_RFSYNC(r3, &(0x7f00000003c0)={0x7, 0x33, 0x1}, 0x7) r4 = signalfd(r3, &(0x7f0000000400)={[0x7]}, 0x8) ioctl$int_in(r4, 0x5452, &(0x7f0000000440)=0x1) sendmsg$AUDIT_ADD_RULE(r3, &(0x7f0000000380)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0xbe42b77974b87453}, 0xc, &(0x7f0000000340)={&(0x7f00000006c0)={0x424, 0x3f3, 0xb10, 0x70bd29, 0x25dfdbff, {0x6, 0x0, 0x19, [0x9, 0xc0000, 0x80000000, 0x10000, 0x401, 0x101, 0x5, 0x62, 0x8, 0xfffffffe, 0x6, 0x4, 0x0, 0x0, 0x80, 0x3, 0x9e79, 0x4, 0x100, 0x3bc7468b, 0x1, 0x1, 0x748d, 0x35, 0x7, 0x8, 0xffffff80, 0x52, 0x7ffc, 0x67, 0x2, 0xa04c, 0x1, 0x5, 0x0, 0x7, 0xff, 0x2, 0x200, 0x5, 0x8, 0xa02, 0x24000, 0x72, 0x7, 0x62, 0x2, 0x6, 0xc13c, 0x5, 0xd01, 0x7c, 0x19, 0x8000, 0x1, 0x1ff, 0x6, 0x9, 0xfffffffb, 0x9, 0x8, 0x3, 0x7, 0x4], [0x3, 0xed5, 0x7fff, 0x80000000, 0x3f, 0x0, 0x2, 0x1ff, 0x3, 0xb1b2, 0xd527, 0x0, 0xfffffffd, 0x7, 0x3, 0x1ff, 0x9, 0xb02, 0x7, 0x9, 0x5, 0x4e5889ff, 0x9, 0x30, 0x1ff, 0x8, 0xffffff01, 0xa11, 0x1, 0x0, 0x9, 0x1f, 0xb61, 0xa78, 0x10000, 0x3, 0x2800000, 0x8, 0xe6c7, 0x2, 0x1, 0x4, 0x80000001, 0x3fc857f0, 0xffffffff, 0xffff, 0x0, 0x400002, 0x2, 0x2, 0x0, 0x80000001, 0x6, 0x81, 0x1, 0x9, 0x7, 0x2d4f, 0x24b8, 0x3, 0x1b27a08f, 0x4, 0xffffffff, 0x101], [0xfff, 0x8fcf, 0x1, 0x6, 0xb938, 0x2, 0x5366cd23, 0x6, 0x100, 0x4, 0x2, 0x40, 0x5, 0x7, 0x95, 0x0, 0x2c33, 0x3ff, 0x3, 0xfffffffc, 0x1, 0x1000, 0x80000000, 0x323, 0x5, 0x401, 0x3, 0x7, 0xe00, 0xfffffffe, 0x2, 0x2, 0x2, 0x0, 0x7, 0x0, 0xfffffff7, 0xfffffe00, 0x5, 0xffffff51, 0x7, 0x7fff, 0x678, 0x10001, 0x6a5, 0x5, 0x80, 0x5, 0x8, 0x9, 0x20, 0xfffffffc, 0x4aa, 0x7fffffff, 0x1, 0x8001, 0x0, 0x1, 0x200, 0xffff, 0x9, 0x6, 0x0, 0x9], [0x1000, 0xffffff6c, 0x69, 0x1f, 0x9, 0x8, 0x3ff, 0x61a0ee4a, 0x1, 0x3, 0x5, 0x400, 0x1, 0x1, 0x9ed, 0x9, 0xfffffffb, 0x6, 0x7, 0x0, 0x800, 0x2, 0xff, 0xca4, 0x3, 0x8, 0x0, 0x3, 0x7fffffff, 0x1, 0x0, 0x5, 0x5, 0x1, 0x401, 0x4, 0x6, 0x7fff, 0x9, 0x401, 0x7f, 0x9, 0x80, 0x8, 0x8, 0x9, 0x7, 0x9, 0x3a61, 0x7, 0x21b, 0x3f, 0x5, 0xffffffff, 0x3, 0x7, 0x1, 0x3f, 0x81, 0x800000, 0x1ff, 0x81, 0x0, 0x9], 0x1, ['\x00']}, ["", "", "", "", "", "", "", "", "", ""]}, 0x424}, 0x1, 0x0, 0x0, 0x20000}, 0x20000010) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r2, {0x7ff}}, './file0\x00'}) 13:42:07 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xa28}}, './file0/file0\x00'}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000180)) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/44, 0x2c) futimesat(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000140)={0x6, 0x9c8, 0x101}) 13:42:07 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0x11}], 0x1, 0x0) [ 2127.076326] kauditd_printk_skb: 93 callbacks suppressed [ 2127.076352] audit: type=1326 audit(1764510127.995:5902): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33137 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 13:42:08 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0xa00, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) [ 2127.111537] audit: type=1326 audit(1764510127.996:5903): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33137 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 13:42:08 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xa28}}, './file0/file0\x00'}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000180)) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/44, 0x2c) futimesat(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) [ 2127.126782] audit: type=1326 audit(1764510127.998:5904): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33137 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2127.136153] audit: type=1326 audit(1764510127.998:5905): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33137 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2127.147274] audit: type=1326 audit(1764510127.998:5906): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33137 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2127.161427] audit: type=1326 audit(1764510127.998:5907): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33137 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2127.178705] audit: type=1326 audit(1764510127.999:5908): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33137 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=89 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2127.194338] audit: type=1326 audit(1764510127.999:5909): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33137 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 13:42:08 executing program 5: ioctl$SNDRV_TIMER_IOCTL_GPARAMS(0xffffffffffffffff, 0x40345410, &(0x7f0000000040)={{0x1}}) [ 2127.223779] audit: type=1326 audit(1764510128.000:5910): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33137 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=261 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2127.234090] audit: type=1326 audit(1764510128.000:5911): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33137 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 13:42:08 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x10, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:42:08 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0x12}], 0x1, 0x0) 13:42:08 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xa28}}, './file0/file0\x00'}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000180)) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/44, 0x2c) futimesat(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) 13:42:08 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0xb00, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:42:17 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) accept$unix(0xffffffffffffffff, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e) mount$tmpfs(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x20, &(0x7f0000000200)={[{@size={'size', 0x3d, [0x30, 0x78, 0x67]}}, {@huge_never}, {@size={'size', 0x3d, [0x2d, 0x65, 0x70, 0x67, 0x4c, 0x70]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x6d, 0x36, 0x2d, 0x34, 0x74, 0x38, 0x74, 0x70, 0x78, 0x37]}}, {@huge_always}, {@huge_within_size}, {@huge_always}, {@nr_blocks={'nr_blocks', 0x3d, [0x60, 0x34, 0x8, 0x30, 0x67]}}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@measure}, {@dont_measure}]}) futimesat(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', 0x0) 13:42:17 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0x14}], 0x1, 0x0) 13:42:17 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x11, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:42:17 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xa28}}, './file0/file0\x00'}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000180)) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/44, 0x2c) futimesat(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) 13:42:17 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000005c0)=ANY=[@ANYBLOB="73c4a2c69f66e2e9170000", @ANYRES32=r0, @ANYBLOB="254e1938057907becc68eccd083658474791aeaccdc60b7739041c7295d32d8a44bb79b25c6b3e2f2c3a9a2945b1e6ef188631dbe8a2f26f6456007ee347fc70e6804f6a5471390c020d13421d5e8321f2412a62a1d06551a4fd4f5b83b1d919ff54018b343deba1af11b30ad3bfe6c379b27138379decda63d6c95d05bc84ab2b2fd99e7251898c23b20e20e11acc702a864528dc20aea1c19091e57dee38faf5239f115f0372055d9e0f12e9fee626eb96db877317b3faacea0a56159ad6045a7213cdd7010d6365fa66956d493b430264186e9475f38445889481d9000000000000"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f00000004c0)) r2 = socket$inet6_icmp(0xa, 0x2, 0x3a) getsockopt$sock_int(r2, 0x1, 0x22, &(0x7f0000000340), &(0x7f0000000380)=0x4) eventfd(0x4727) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="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", 0x200) fork() r3 = fork() ptrace(0x10, r3) ptrace(0x8, r3) wait4(r3, 0x0, 0x20000000, &(0x7f0000000400)) 13:42:17 executing program 5: io_submit(0x0, 0x0, &(0x7f00000000c0)) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r1 = syz_io_uring_complete(0x0) syz_io_uring_setup(0x5c16, &(0x7f00000000c0)={0x0, 0x3040, 0x4, 0x3, 0x100, 0x0, r1}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000000140), &(0x7f0000000180)) io_setup(0x5, &(0x7f00000001c0)=0x0) io_destroy(r2) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) 13:42:17 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0xc00, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:42:17 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0xf2ff}}, &(0x7f00000001c0), 0x0) [ 2136.452184] kauditd_printk_skb: 52 callbacks suppressed [ 2136.452198] audit: type=1326 audit(1764510137.371:5964): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33283 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2136.462982] audit: type=1326 audit(1764510137.374:5965): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33283 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2136.468316] audit: type=1326 audit(1764510137.374:5966): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33283 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2136.476204] audit: type=1326 audit(1764510137.374:5967): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33283 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2136.486668] audit: type=1326 audit(1764510137.374:5968): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33283 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2136.496656] audit: type=1326 audit(1764510137.376:5969): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33283 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=89 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2136.507602] audit: type=1326 audit(1764510137.378:5970): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33283 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2136.521289] audit: type=1326 audit(1764510137.378:5971): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33283 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=261 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 13:42:17 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xa28}}, './file0/file0\x00'}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000180)) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/44, 0x2c) futimesat(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', 0x0) [ 2136.530672] audit: type=1326 audit(1764510137.378:5972): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33283 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2136.539270] audit: type=1326 audit(1764510137.379:5973): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33283 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 13:42:17 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000040)={0x6, 0x5, 0xfffffffe, 0x0, 0x3}) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f00000000c0)={{0x1}, 0x7f}) openat$null(0xffffffffffffff9c, &(0x7f0000000140), 0x48800, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000200), 0x10080, 0x0) ioctl$AUTOFS_IOC_PROTOVER(r1, 0x80049363, &(0x7f0000000280)) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000180)={0x4, 0x1, 0xad5, 0x0, 0xc}) 13:42:17 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0xd00, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:42:17 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0x16}], 0x1, 0x0) 13:42:17 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x80) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000140)={0x6, 0x9c8, 0x101}) ioctl$F2FS_IOC_FLUSH_DEVICE(r1, 0x4008f50a, &(0x7f00000000c0)={0x80000000, 0x3}) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1, 0x0, 0x0, 0x2}, 0x40}) 13:42:17 executing program 1: fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080), 0x2, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) futimesat(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[]) unlinkat(r0, &(0x7f0000000200)='./file0\x00', 0x0) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0xc9) 13:42:17 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0xfff2}}, &(0x7f00000001c0), 0x0) 13:42:17 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xa28}}, './file0/file0\x00'}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000180)) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/44, 0x2c) 13:42:17 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000005c0)=ANY=[@ANYBLOB="73c4a2c69f66e2e9170000", @ANYRES32=r0, @ANYBLOB="254e1938057907becc68eccd083658474791aeaccdc60b7739041c7295d32d8a44bb79b25c6b3e2f2c3a9a2945b1e6ef188631dbe8a2f26f6456007ee347fc70e6804f6a5471390c020d13421d5e8321f2412a62a1d06551a4fd4f5b83b1d919ff54018b343deba1af11b30ad3bfe6c379b27138379decda63d6c95d05bc84ab2b2fd99e7251898c23b20e20e11acc702a864528dc20aea1c19091e57dee38faf5239f115f0372055d9e0f12e9fee626eb96db877317b3faacea0a56159ad6045a7213cdd7010d6365fa66956d493b430264186e9475f38445889481d9000000000000"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000040)) eventfd(0x4727) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="5ed0b2ff68d76fb346352b602a2a1295cbe01cb3f64fbed9e7f9bc9be0f300cb97f6a204cc585145dfb949002f6117fc969dd435dd0c37c5077e5b10cfeafd75205e215b167323a3b971b0ec8583851f2567d30bf5baf28aabb598e6c3d4d825cae01271cb35cdd091e4872367f354e0dc81a7e4ac79775bc1dcaafe2f5079da7dd1989f1ddce6722fc438a7217526cfe75d53471624d6f091e19a7fb699ea27efa9e0fd1914e7c35f297afd9b9bad399bcc85ff0ce7a982f4fa0c172ea5f06479eec302f30e5df66273717e028f4ca7d4c5b6bc8a3c3c67f688195f22488a15d9e1f7e5fed3a6c2aba7bc308b0e2c5657f4538f4a3bf9b975bb887a901ab3c85261be3e331b741313e78b5ad63b7b1b378e9479dc4a95b2b4d15cd1d1b808844378f882a72af1e5b0eefd356e0247246e60643204c3b46183dbe4e066c55cb1dcdaa7b70ef43ab2fa4d2b8c4c1a89cb0e325fd9716874d3856cf368efcdf92d21214e55e4de647c37c71887d11f74f9afe1616e3054ceae601e4b3555e243c1882ad42c7730caeb309e7714ad87c55e9fba308cfc4161e562abde3ac4f3d7e0a3584d49f90692e4c7a4591928100197f102309b05c0b4b4898b0591bc1433af443478979f28e6136ffb21aaeac2be5490475a08e96bb94fd9d9d3aa2f8a1e147a80ba9bfd04dac3f476ff128476c693ea71f7be47a508c98eddc479eb703d6f", 0x200) fork() r2 = fork() ptrace(0x10, r2) fchmod(0xffffffffffffffff, 0x13) ptrace(0x8, r2) wait4(r2, 0x0, 0x20000000, &(0x7f0000000400)) 13:42:17 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x12, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:42:17 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xa28}}, './file0/file0\x00'}) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/44, 0x2c) [ 2136.781226] tmpfs: Unknown parameter '' [ 2136.817477] tmpfs: Unknown parameter '' 13:42:26 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000005c0)=ANY=[@ANYBLOB="73c4a2c69f66e2e9170000", @ANYRES32=r0, @ANYBLOB="254e1938057907becc68eccd083658474791aeaccdc60b7739041c7295d32d8a44bb79b25c6b3e2f2c3a9a2945b1e6ef188631dbe8a2f26f6456007ee347fc70e6804f6a5471390c020d13421d5e8321f2412a62a1d06551a4fd4f5b83b1d919ff54018b343deba1af11b30ad3bfe6c379b27138379decda63d6c95d05bc84ab2b2fd99e7251898c23b20e20e11acc702a864528dc20aea1c19091e57dee38faf5239f115f0372055d9e0f12e9fee626eb96db877317b3faacea0a56159ad6045a7213cdd7010d6365fa66956d493b430264186e9475f38445889481d9000000000000"]) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x7d, 0x4, 0x7, 0x80, 0x0, 0x6, 0x4020, 0x4, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_config_ext={0x2}, 0x4043c, 0x8, 0x8, 0x5, 0x100000000, 0x3f, 0x8001, 0x0, 0x7ff, 0x0, 0xfffffffffffffffb}, 0x0, 0x1, r1, 0x2) eventfd(0x4727) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write(r3, &(0x7f00000006c0)="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", 0x201) fork() r4 = fork() ptrace(0x10, r4) creat(&(0x7f0000000100)='./file0\x00', 0x1) ptrace(0x8, r4) wait4(r4, 0x0, 0x20000000, &(0x7f0000000400)) 13:42:26 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0x18}], 0x1, 0x0) 13:42:26 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0x80000}}, &(0x7f00000001c0), 0x0) 13:42:26 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x14, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:42:26 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0xe00, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:42:26 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0xa00) ioctl$F2FS_IOC_START_ATOMIC_WRITE(0xffffffffffffffff, 0xf501, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000140)={0x6, 0x9c8, 0x101, 0x0, 0x4}) fcntl$addseals(r1, 0x409, 0x8) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r2, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000140)={0x6, 0x9c8, 0x101}) ioctl$SNDRV_TIMER_IOCTL_STATUS32(r2, 0x80585414, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1, 0x2, 0x0, 0x1}}) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000240)='.pending_reads\x00', 0x3b5480, 0x103) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r3, 0x40505412, &(0x7f0000000280)={0x3, 0x800, 0x2, 0x0, 0x2}) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f00000000c0)={{0x2, 0x3, 0x8000007, 0x0, 0x7}, 0x1a000000, 0x800}) 13:42:26 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/44, 0x2c) 13:42:26 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000140)={0x6, 0x9c8, 0x101}) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000280), &(0x7f00000002c0)='./file1\x00', 0x8, 0x2) ioctl(r1, 0x4, &(0x7f0000000180)="69da6d0e86c877468f23797c0c333213ef7dd8ed218a2a98a43d9547b058f39e755c99096ad4e80a5595ddcb58c23b5addf3a021868f9d74b1ce80cc008d1f2be04df11e6ff986ee4ce4e6c03c4f0a6b3b5f1ba4b67076bb1f0ddf701e9e2b545d3f68d97c22e46f19cd69fef10a105859cbcb966e71b92edc5641ca21a01cb96597e1535d1f613d4399dd97509f6c1f5fafe1ceaba017f639f52d41eacc374dc998786eafad51e6e22ec1b345f63e6bbcb4a97d654ba24025f9db569148fd4f8dd0a02b47297b25d67288acfb296b59f7ce1c7c4494e7c7e0bada78daea5cc205f2c8de22") r2 = signalfd(r0, &(0x7f0000000080)={[0xfb5]}, 0x8) symlinkat(&(0x7f0000000040)='./file0\x00', r2, &(0x7f00000000c0)='./file1\x00') futimesat(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', 0x0) [ 2146.138098] kauditd_printk_skb: 84 callbacks suppressed [ 2146.138122] audit: type=1326 audit(1764510147.056:6058): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33551 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2146.161146] audit: type=1326 audit(1764510147.057:6059): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33544 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2146.181015] audit: type=1326 audit(1764510147.059:6060): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33544 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=303 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2146.200791] audit: type=1326 audit(1764510147.060:6061): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33544 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2146.218260] audit: type=1326 audit(1764510147.061:6062): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33551 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2146.234755] audit: type=1326 audit(1764510147.062:6063): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33551 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 13:42:27 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x1100, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) [ 2146.262545] audit: type=1326 audit(1764510147.063:6064): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33550 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 13:42:27 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0x1a}], 0x1, 0x0) [ 2146.279930] audit: type=1326 audit(1764510147.063:6065): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33544 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=83 compat=0 ip=0x7f2d0b88fc27 code=0x7ffc0000 [ 2146.299967] audit: type=1326 audit(1764510147.063:6066): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33544 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=165 compat=0 ip=0x7f2d0b89204a code=0x7ffc0000 13:42:27 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/44, 0x2c) 13:42:27 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0x1000000}}, &(0x7f00000001c0), 0x0) 13:42:27 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) futimesat(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[]) unlinkat(r1, &(0x7f0000000200)='./file0\x00', 0x0) faccessat2(r1, &(0x7f0000000040)='./file0\x00', 0x40, 0x1000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000180)) 13:42:27 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x16, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) [ 2146.323295] audit: type=1326 audit(1764510147.064:6067): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33550 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=89 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 13:42:27 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0x1c}], 0x1, 0x0) [ 2146.523843] tmpfs: Unknown parameter '' 13:42:27 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/44, 0x2c) [ 2146.572285] tmpfs: Unknown parameter '' 13:42:35 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0x2000000}}, &(0x7f00000001c0), 0x0) 13:42:35 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x1200, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:42:35 executing program 5: ioctl$SNDRV_TIMER_IOCTL_GPARAMS(0xffffffffffffffff, 0x40345410, &(0x7f0000000040)={{0x1, 0x1, 0x4, 0x0, 0xfffff3b0}, 0x0, 0x7}) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000002fc0)={0x24, 0x10, 0x1, 0x0, 0x0, "", [@typed={0xc, 0x0, 0x0, 0x0, @u64=0x2}, @nested={0x4}, @nested={0x4, 0x16}]}, 0x24}], 0x1}, 0x0) pipe2(&(0x7f00000000c0), 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000140)={0x6, 0x9c8, 0x101}) dup(r0) 13:42:35 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/44, 0x2c) 13:42:35 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0x1e}], 0x1, 0x0) 13:42:35 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) lseek(r0, 0xad7, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000004c0)=ANY=[@ANYBLOB="0f4f73c4a2c606b15c6eca8c54fc179f664a13746600", @ANYRES32=r0, @ANYBLOB="254e1938057907becc68eccd083658474791aeaccdc60b7739041c7295d32d8a44bb79b25c6b3e2f2c3a9a2945b1e6ef188631dbe8a2f26f6456007ee347fc70e6804f6a5471390c020d13421d5e8321f2412a62a1d06551a4fd4f5b83b1d919ff54018b343deba1af11b30ad3bfe6c379b27138379decda63d6c95d05bc84ab2b2fd99e7251898c23b20e20e11acc702a864528dc20aea1c19091e57dee38faf5239f115f0372055d9e0f12e9fee626eb96db877317b3faacea0a56159ad6045a7213cdd7010d6365fa66956d493b430264186e9475f38445889481d9000000000000"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x602a, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x6, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000040)) r2 = eventfd(0x4727) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x3802, 0x0) fsopen(&(0x7f0000000340)='virtiofs\x00', 0x0) close_range(r2, r0, 0x2) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="5ed0b2ff68d76fb346352b602a2a1295cbe01cb3f64fbed9e7f9bc9be0f300cb97f6a204cc585145dfb949002f6117fc969dd435dd0c37c5077e5b10cfeafd75205e215b167323a3b971b0ec8583851f2567d30bf5baf28aabb598e6c3d4d825cae01271cb35cdd091e4872367f354e0dc81a7e4ac79775bc1dcaafe2f5079da7dd1989f1ddce6722fc438a7217526cfe75d53471624d6f091e19a7fb699ea27efa9e0fd1914e7c35f297afd9b9bad399bcc85ff0ce7a982f4fa0c172ea5f06479eec302f30e5df66273717e028f4ca7d4c5b6bc8a3c3c67f688195f22488a15d9e1f7e5fed3a6c2aba7bc308b0e2c5657f4538f4a3bf9b975bb887a901ab3c85261be3e331b741313e78b5ad63b7b1b378e9479dc4a95b2b4d15cd1d1b808844378f882a72af1e5b0eefd356e0247246e60643204c3b46183dbe4e066c55cb1dcdaa7b70ef43ab2fa4d2b8c4c1a89cb0e325fd9716874d3856cf368efcdf92d21214e55e4de647c37c71887d11f74f9afe1616e3054ceae601e4b3555e243c1882ad42c7730caeb309e7714ad87c55e9fba308cfc4161e562abde3ac4f3d7e0a3584d49f90692e4c7a4591928100197f102309b05c0b4b4898b0591bc1433af443478979f28e6136ffb21aaeac2be5490475a08e96bb94fd9d9d3aa2f8a1e147a80ba9bfd04dac3f476ff128476c693ea71f7be47a508c98eddc479eb703d6f", 0x200) fork() r3 = fork() ptrace(0x10, r3) ptrace(0x8, r3) wait4(r3, 0x0, 0x1000000, &(0x7f0000000400)) 13:42:35 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x18, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:42:35 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0xc0000) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000140)={0x6, 0x9c8, 0x101}) ioctl$FITHAW(r0, 0xc0045878) syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0xffffffffffffff4c, 0x0, 0x40a1040, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) futimesat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) 13:42:35 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x1a, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) [ 2154.576828] kauditd_printk_skb: 59 callbacks suppressed [ 2154.576843] audit: type=1326 audit(1764510155.495:6128): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33716 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 13:42:35 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f00000000c0)={{0x0, 0x3, 0x81, 0x0, 0x491}, 0xffffffffffffffe1, 0x100}) [ 2154.592147] audit: type=1326 audit(1764510155.494:6127): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33714 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2154.601003] audit: type=1326 audit(1764510155.496:6129): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33714 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=303 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2154.612548] audit: type=1326 audit(1764510155.496:6130): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33714 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2154.627695] audit: type=1326 audit(1764510155.496:6131): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33714 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2154.644088] audit: type=1326 audit(1764510155.498:6132): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33714 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=83 compat=0 ip=0x7f2d0b88fc27 code=0x7ffc0000 [ 2154.652187] audit: type=1326 audit(1764510155.500:6133): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33714 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=165 compat=0 ip=0x7f2d0b89204a code=0x7ffc0000 [ 2154.656668] audit: type=1326 audit(1764510155.502:6134): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33716 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=261 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 13:42:35 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x1400, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:42:35 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) futimesat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000040), 0x576, 0x109042) openat2(r1, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x220401, 0x140, 0x3}, 0x18) 13:42:35 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/44, 0x2c) 13:42:35 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0x2a}], 0x1, 0x0) [ 2154.678741] audit: type=1326 audit(1764510155.502:6135): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33716 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2154.687252] audit: type=1326 audit(1764510155.503:6136): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33714 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f2d0b843a04 code=0x7ffc0000 13:42:35 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0x3000000}}, &(0x7f00000001c0), 0x0) 13:42:35 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0x2c}], 0x1, 0x0) 13:42:35 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000640)='/sys/module/8250_mid', 0x4c500, 0xb0) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000005c0)=ANY=[]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x10, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x80000000000}, 0x44282, 0x3e93b99a, 0xffffffff, 0x8, 0x4, 0x80000, 0x0, 0x0, 0x1ffffffe, 0x0, 0x400000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000a00)=0xfffffffffffffebe) eventfd(0x4727) r2 = syz_mount_image$nfs(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0xa7, 0x5, &(0x7f0000000980)=[{&(0x7f00000004c0)="03fd50cda91350e64335d2ddd1d2a84129f7cdd5f2ed098a2a0aad60a029dbbfe776319d0e65b3aa4ab1dbef6e4cd6dddc209fadb6a195de5ba10a177aefe880ae871089fa8b4b8cc1a8194b6049bbafcdecf29b48951e6628f3e4eb7171d716c595e3adef57d41a55be7c9ae5463989c396d17e3cafa8fdc417062c007588834b74f8e5ef342aa4b05b5d93d21dcbbf48b08dc040194e23341105c0a7", 0x9d, 0x23}, {&(0x7f0000000ac0)="9a86675b5427be5dc36c7b33ff837b80fa36ec5cb4487de8b4a2dd210f205ceef4c4d2579e3d1597ed84b6e80531147ad4f388fd816a19a7fffc0f11075fe019bcfb520ccfd700c27332aa904b52e99267c2702511ea175032383b47217ce9c834a814ad7cfa03c418f08dd77bba95209cf056d258945e69c8ecd314ee0cd0e13bfa7a65ae9bafe0858e8014eef0efcc4a652a81be65432447f2d5480a90f18d4f392b6996bc0364a8e8555fc0012f595d476eb2bc7c5e8bd8d022e6e127d9d4205feace04e927548787b4", 0xcb, 0x6}, {&(0x7f00000007c0)="6d454475ec68fe17f318aede4c9f6064e5342a1245e3a691df198179321c9f3fb12515042c667c4ecb768853ae7a1fb2a9cb95c2be2879a0e52a7ffea315fb2eb2e90997be47e718a79fca8ec4352243db1847821ca399554661134cee5e79a9bf2aaf706fce27474f02c2bc353ed10368e5a5e95a724f79677c2e90d9f1ada3870b7250d1c7ddacefdef600"/158, 0x9e, 0x1f}, {&(0x7f0000000580)="d0ee651a255b9da14308e857457748cd020679", 0x13, 0x39e}, {&(0x7f0000000880)="7baf623219d8dcfe2db1ec09ec5619f38ac86a8aede1e60d8d415bf94d7c60daf1d64279bbfda1eaf9fc2f5034783de7870cec78f9fea5c89e0b722fc59e784e9a0344f5d38a953a9802fb703f0324a016f77f7807db995d655c285bf030c0ebbb5e2f06db9ac84e6525b7e7d4cf8c3ef71151eec0a28d7c55f841be398e1fea803ac35ee61fb34294749337de5ae7cdafc574e78d30221602bc1b127705bcf7dd79376b73112025fb8b14f1146170236f7f6a6759d112e5d350c6d1da5d439c99252b27436955d6a54efde3fd29c3bc2950ef", 0xd3, 0xfff}], 0xc50c0, &(0x7f0000000a80)=ANY=[]) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000a40)) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="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", 0x200) fork() r3 = fork() fstat(r0, &(0x7f00000005c0)) ptrace(0x10, r3) ptrace(0x8, r3) wait4(r3, 0x0, 0x20000000, &(0x7f0000000400)) 13:42:35 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/44, 0x2c) [ 2154.810112] loop3: detected capacity change from 0 to 15 13:42:45 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/44, 0x2c) 13:42:45 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f00000000c0)={{0x1, 0xc1394d21f732392d, 0x2, 0x2, 0x7d13}, 0x31, 0x5}) 13:42:45 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x1c, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:42:45 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f0000000840)=ANY=[@ANYBLOB="73c4c69f662966b69952c71bb6c886aa3d6e94cf38cfc90008ec3c7b37a6af2c28cb6c1bb60df4ca855b1fe0de2c40644aeae0a6cf8927e52fe9d190e82cdca22677a8dec083398bbc536d177f7420dd1c13c87aeaec0e", @ANYRES32=r0, @ANYBLOB="254e1938057907becc68eccd083658474791aeaccdc60b7739041c7295d32d8a44bb79b25c6b3e2f2c3a9a2945b1e6ef188631dbe8a2f26f6456007ee347fc70e6804f6a5471390c020d13421d5e8321f2412a62a1d06551a4fd4f5b83b1d919ff54018b343deba1af11b30ad3bfe6c379b27138379decda63d6c95d05bc84ab2b2fd99e7251898c23b20e20e11acc702a864528dc20aea1c19091e57dee38faf5239f115f0372055d9e0f12e9fee626eb96db877317b3faacea0a56159ad6045a7213cdd7010d6365fa66956d493b430264186e9475f38445889481d9000000000000"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000040)) eventfd(0x4727) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) clone3(&(0x7f00000007c0)={0x60000, &(0x7f0000000340)=0xffffffffffffffff, &(0x7f0000000380), &(0x7f00000004c0), {0x3c}, &(0x7f00000006c0)=""/252, 0xfc, &(0x7f0000000500)=""/3, &(0x7f0000000540)=[0xffffffffffffffff, r1, r1, r1, r1], 0x5, {r0}}, 0x58) ioctl$EXT4_IOC_GETSTATE(r3, 0x40046629, &(0x7f0000000580)) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="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", 0x200) fork() r4 = fork() ptrace(0x10, r4) ptrace(0x8, r4) wait4(r4, 0x0, 0x20000000, &(0x7f0000000400)) 13:42:45 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0x4000000}}, &(0x7f00000001c0), 0x0) 13:42:45 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0x2e}], 0x1, 0x0) 13:42:45 executing program 1: r0 = syz_io_uring_complete(0x0) close(r0) syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) futimesat(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', 0x0) 13:42:45 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x1600, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) [ 2164.721191] kauditd_printk_skb: 31 callbacks suppressed [ 2164.721208] audit: type=1326 audit(1764510165.639:6168): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33963 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2164.736212] audit: type=1326 audit(1764510165.647:6169): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33963 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=261 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2164.750044] audit: type=1326 audit(1764510165.648:6170): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33963 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2164.764795] audit: type=1326 audit(1764510165.648:6171): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33963 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 13:42:45 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/44, 0x2c) [ 2164.780597] audit: type=1326 audit(1764510165.649:6172): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33963 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 13:42:45 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0x30}], 0x1, 0x0) [ 2164.800846] audit: type=1326 audit(1764510165.649:6173): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33963 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2164.810331] audit: type=1326 audit(1764510165.652:6174): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33963 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2164.824982] audit: type=1326 audit(1764510165.652:6175): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33963 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2164.834850] audit: type=1326 audit(1764510165.652:6176): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33963 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2164.845362] audit: type=1326 audit(1764510165.687:6177): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33970 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 13:42:55 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) futimesat(r0, &(0x7f00000009c0)='./file0\x00', 0x0) 13:42:55 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000004c0)=ANY=[@ANYBLOB="7368c9b67caa13000074970012047c", @ANYRES32=r0, @ANYBLOB="254e1938057907becc68eccd083658474791aeaccdc60b7739041c7295d32d8a44bb79b25c6b3e2f2c3a9a2945b1e6ef188631dbe8a2f26f6456007ee347fc70e6804f6a5471390c020d13421d5e8321f2412a62a1d06551a4fd4f5b83b1d919ff54018b343deba1af11b30ad3bfe6c379b27138379decda63d6c95d05bc84ab2b2fd99e7251898c23b20e20e11acc702a864528dc20aea1c19091e57dee38faf5239f115f0372055d9e0f12e9fee626eb96db877317b3faacea0a56159ad6045a7213cdd7010d6365fa66956d493b430264186e9475f38445889481d9000000000000"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x81, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000040)) eventfd(0x4727) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="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", 0x200) fork() fchmodat(r2, &(0x7f0000000340)='./file0\x00', 0x8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000005c0)=0xc) r3 = fork() ptrace(0x8, r3) r4 = fork() wait4(r4, 0x0, 0x20000000, &(0x7f0000000400)) 13:42:55 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x1800, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:42:55 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x1e, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:42:55 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/44, 0x2c) 13:42:55 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0x5000000}}, &(0x7f00000001c0), 0x0) 13:42:55 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0x60}], 0x1, 0x0) 13:42:55 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) 13:42:55 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/44, 0x2c) [ 2174.436006] kauditd_printk_skb: 10 callbacks suppressed [ 2174.436029] audit: type=1326 audit(1764510175.351:6188): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34100 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2174.453508] audit: type=1326 audit(1764510175.354:6189): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34100 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=303 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2174.471791] audit: type=1326 audit(1764510175.354:6190): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34100 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2174.493607] audit: type=1326 audit(1764510175.364:6191): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34100 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=83 compat=0 ip=0x7f2d0b88fc27 code=0x7ffc0000 13:42:55 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0x300}], 0x1, 0x0) [ 2174.524301] audit: type=1326 audit(1764510175.364:6192): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34100 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=165 compat=0 ip=0x7f2d0b89204a code=0x7ffc0000 13:42:55 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f00000000c0)={0x1, 0x5, 0x0, 0x0, 0xc}) 13:42:55 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x2a, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) [ 2174.551274] audit: type=1326 audit(1764510175.365:6193): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34100 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f2d0b843a04 code=0x7ffc0000 13:42:55 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x1a00, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) [ 2174.572257] audit: type=1326 audit(1764510175.370:6194): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34100 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 13:42:55 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/44, 0x2c) 13:42:55 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0x6000000}}, &(0x7f00000001c0), 0x0) [ 2174.597868] audit: type=1326 audit(1764510175.376:6195): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34098 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2174.632246] audit: type=1326 audit(1764510175.376:6196): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34098 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=261 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 13:42:55 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x9, &(0x7f0000000080)=[{0x2e, 0x46, 0x1d, 0x5344}, {0x4, 0x43, 0x1}, {0xffff, 0x0, 0x3e, 0x3}, {0x5, 0x1f, 0x3, 0x8}, {0x5, 0x2, 0x7, 0xfffffff7}, {0x200, 0x3, 0x8, 0x8}, {0x2, 0x0, 0xff, 0x3}, {0x6, 0x1, 0x3, 0x3}, {0x8, 0x8, 0xff, 0x80000003}]}) futimesat(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x701440, 0x1c8) open$dir(&(0x7f0000000000)='./file1\x00', 0xeaa11ab0db467821, 0x20) [ 2174.649103] audit: type=1326 audit(1764510175.377:6197): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34098 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 13:42:55 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0x500}], 0x1, 0x0) 13:43:04 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0xa00}], 0x1, 0x0) 13:43:04 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000005c0)=ANY=[@ANYBLOB="73c4a2c69f66e2e9170000", @ANYRES32=r0, @ANYBLOB="254e1938057907becc68eccd083658474791aeaccdc60b7739041c7295d32d8a44bb79b25c6b3e2f2c3a9a2945b1e6ef188631dbe8a2f26f6456007ee347fc70e6804f6a5471390c020d13421d5e8321f2412a62a1d06551a4fd4f5b83b1d919ff54018b343deba1af11b30ad3bfe6c379b27138379decda63d6c95d05bc84ab2b2fd99e7251898c23b20e20e11acc702a864528dc20aea1c19091e57dee38faf5239f115f0372055d9e0f12e9fee626eb96db877317b3faacea0a56159ad6045a7213cdd7010d6365fa66956d493b430264186e9475f38445889481d9000000000000"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000040)) eventfd(0x4727) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="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", 0x200) fork() r2 = fork() ptrace(0x10, r2) ptrace(0x8, r2) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000380)={'veth0_to_bond\x00', &(0x7f0000000340)=@ethtool_wolinfo={0x5, 0x1, 0x1b, "e989c66848f8"}}) wait4(r2, 0x0, 0x20000000, &(0x7f0000000400)) 13:43:04 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x1c00, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:43:04 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x2c, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:43:04 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x395880) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000001140), 0x18800, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000001180), 0x5, 0x2) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r2, 0x40345410, &(0x7f0000000040)={{0x2, 0x3, 0x100004, 0x2, 0x2}, 0x87c, 0x100000001}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000140)={0x6, 0x9c8, 0x101}) r3 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r3, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r3, 0x40505412, &(0x7f0000000140)={0x6, 0x9c8, 0x101}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) write$P9_RUNLINKAT(0xffffffffffffffff, 0x0, 0x0) r4 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r4, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r4, 0x40505412, &(0x7f0000000140)={0x6, 0x9c8, 0x101}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r4, &(0x7f0000001240)={0x2000000c}) ioctl$SNDRV_TIMER_IOCTL_TREAD(r3, 0x40045402, &(0x7f0000001100)=0x1) ioctl$BTRFS_IOC_SNAP_CREATE(r1, 0x50009401, &(0x7f0000000100)={{r3}, "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"}) dup(r0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f00000011c0)={0x5, 0x10001, 0x0, 0x0, 0x7}) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) 13:43:04 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)}) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/44, 0x2c) 13:43:04 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffc1, 0x0, 0x0, 0x1000048, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) futimesat(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', 0x0) 13:43:04 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0x7000000}}, &(0x7f00000001c0), 0x0) [ 2183.905693] kauditd_printk_skb: 15 callbacks suppressed [ 2183.905719] audit: type=1326 audit(1764510184.824:6213): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34251 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 13:43:04 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0xb00}], 0x1, 0x0) [ 2183.933968] audit: type=1326 audit(1764510184.826:6214): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34251 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=303 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2183.953212] audit: type=1326 audit(1764510184.828:6215): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34251 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 13:43:04 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0x8000000}}, &(0x7f00000001c0), 0x0) [ 2183.976558] audit: type=1326 audit(1764510184.830:6216): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34251 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=83 compat=0 ip=0x7f2d0b88fc27 code=0x7ffc0000 [ 2183.996102] audit: type=1326 audit(1764510184.830:6217): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34251 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=165 compat=0 ip=0x7f2d0b89204a code=0x7ffc0000 [ 2184.014226] audit: type=1326 audit(1764510184.833:6218): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34251 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f2d0b843a04 code=0x7ffc0000 13:43:04 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x1e00, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:43:04 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0xc00}], 0x1, 0x0) 13:43:04 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)}) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/44, 0x2c) [ 2184.042006] audit: type=1326 audit(1764510184.833:6219): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34251 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 13:43:04 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x4000, 0x34) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000100)={{0x2, 0x2, 0x7, 0x2, 0x1844}, 0x1, 0x2}) [ 2184.068236] audit: type=1326 audit(1764510184.838:6220): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34251 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=259 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 13:43:04 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) [ 2184.089837] audit: type=1326 audit(1764510184.839:6221): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34251 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 13:43:05 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x2e, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) [ 2184.104049] audit: type=1326 audit(1764510184.839:6222): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34251 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 13:43:05 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0xa000000}}, &(0x7f00000001c0), 0x0) 13:43:05 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f0000000540)=ANY=[@ANYBLOB="73c4a2c69f66e2e9170000", @ANYRES32=r0, @ANYBLOB="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"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x8, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20004000}, 0x0, 0x0, r0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000040)) eventfd(0x4727) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000500), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x14) write(0xffffffffffffffff, &(0x7f0000000100)="5ed0b2ff68d76fb346352b602a2a1295cbe01cb3f64fbed9e7f9bc9be0f300cb97f6a204cc585145dfb949002f6117fc969dd435dd0c37c5077e5b10cfeafd75205e215b167323a3b971b0ec8583851f2567d30bf5baf28aabb598e6c3d4d825cae01271cb35cdd091e4872367f354e0dc81a7e4ac79775bc1dcaafe2f5079da7dd1989f1ddce6722fc438a7217526cfe75d53471624d6f091e19a7fb699ea27efa9e0fd1914e7c35f297afd9b9bad399bcc85ff0ce7a982f4fa0c172ea5f06479eec302f30e5df66273717e028f4ca7d4c5b6bc8a3c3c67f688195f22488a15d9e1f7e5fed3a6c2aba7bc308b0e2c5657f4538f4a3bf9b975bb887a901ab3c85261be3e331b741313e78b5ad63b7b1b378e9479dc4a95b2b4d15cd1d1b808844378f882a72af1e5b0eefd356e0247246e60643204c3b46183dbe4e066c55cb1dcdaa7b70ef43ab2fa4d2b8c4c1a89cb0e325fd9716874d3856cf368efcdf92d21214e55e4de647c37c71887d11f74f9afe1616e3054ceae601e4b3555e243c1882ad42c7730caeb309e7714ad87c55e9fba308cfc4161e562abde3ac4f3d7e0a3584d49f90692e4c7a4591928100197f102309b05c0b4b4898b0591bc1433af443478979f28e6136ffb21aaeac2be5490475a08e96bb94fd9d9d3aa2f8a1e147a80ba9bfd04dac3f476ff128476c693ea71f7be47a508c98eddc479eb703d6f", 0x200) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000340), 0x2400, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000004c0)=0xc) fork() r3 = fork() ptrace(0x10, r3) ptrace(0x8, r3) wait4(r3, 0x0, 0x60000001, &(0x7f0000000400)) 13:43:05 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) futimesat(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x8800, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x80) 13:43:14 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)}) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/44, 0x2c) 13:43:14 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0xd00}], 0x1, 0x0) 13:43:14 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000040)={0x0}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000180)={r1, 0x1, r2, 0x10001, 0x80000}) futimesat(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', 0x0) 13:43:14 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0x10000000}}, &(0x7f00000001c0), 0x0) 13:43:14 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1, 0x0, 0x0, 0x1}, 0x0, 0x80000001}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f00000000c0)={0x4, 0xaa, 0xfff000, 0x0, 0x1f}) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x2c0042, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000180)={0xf, 0x8, 0x3, 0x0, 0xf}) 13:43:14 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x30, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:43:14 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x2a00, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:43:14 executing program 3: fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000005c0)=ANY=[@ANYBLOB="73c4a2c69f66e2e9170000", @ANYRES32=r0, @ANYBLOB="254e1938057907becc68eccd083658474791aeaccdc60b7739041c7295d32d8a44bb79b25c6b3e2f2c3a9a2945b1e6ef188631dbe8a2f26f6456007ee347fc70e6804f6a5471390c020d13421d5e8321f2412a62a1d06551a4fd4f5b83b1d919ff54018b343deba1af11b30ad3bfe6c379b27138379decda63d6c95d05bc84ab2b2fd99e7251898c23b20e20e11acc702a864528dc20aea1c19091e57dee38faf5239f115f0372055d9e0f12e9fee626eb96db877317b3faacea0a56159ad6045a7213cdd7010d6365fa66956d493b430264186e9475f38445889481d9000000000000"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x4, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000040)) eventfd(0x4727) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="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", 0x200) fork() r2 = fork() ptrace(0x10, r2) ptrace(0x8, r2) wait4(r2, 0x0, 0x20000000, &(0x7f0000000400)) [ 2193.541790] kauditd_printk_skb: 50 callbacks suppressed [ 2193.541820] audit: type=1326 audit(1764510194.460:6273): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34510 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 13:43:14 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x7ffcfffc}]}) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/44, 0x2c) [ 2193.590255] audit: type=1326 audit(1764510194.462:6274): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34510 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2193.602021] audit: type=1326 audit(1764510194.465:6275): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34510 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2193.614116] audit: type=1326 audit(1764510194.465:6276): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34510 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2193.635786] audit: type=1326 audit(1764510194.466:6277): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34511 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 13:43:14 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000440), 0x145802, 0x0) ioctl$SG_EMULATED_HOST(r0, 0x2282, &(0x7f00000013c0)) futimesat(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', 0x0) dup(r0) [ 2193.655085] audit: type=1326 audit(1764510194.467:6278): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34510 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 13:43:14 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0x20000000}}, &(0x7f00000001c0), 0x0) [ 2193.677147] audit: type=1326 audit(1764510194.467:6279): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34510 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2193.693455] audit: type=1326 audit(1764510194.468:6280): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34511 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=303 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 13:43:14 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x2c00, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) [ 2193.712725] audit: type=1326 audit(1764510194.468:6281): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34511 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2193.732302] audit: type=1326 audit(1764510194.468:6282): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34510 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 13:43:14 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0xe00}], 0x1, 0x0) 13:43:14 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x60, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:43:25 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x7ffcfffc}]}) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/44, 0x2c) 13:43:25 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0x40000000}}, &(0x7f00000001c0), 0x0) 13:43:25 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000140)={0x6, 0x9c8, 0x101}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f00000000c0)={0x1, 0x0, 0x3, 0x0, 0xf}) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0xffffffffffffffff}}) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) 13:43:25 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x3, 0x0, 0x0, 0x7ffcfffc}]}) renameat2(r0, &(0x7f0000000080)='./file0\x00', r0, &(0x7f00000000c0)='./file0\x00', 0x0) futimesat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) 13:43:25 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x2e00, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:43:25 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x300, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:43:25 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0x1100}], 0x1, 0x0) 13:43:25 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x20041, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f0000000e40)=ANY=[@ANYBLOB="73c4a2c69f66e2e9170000c3bb94a33cf422514fb4dac7d80f6106ce011c68bf268d0d39acfbb3b1943f362a84afdce863b8a610853b568cf3515d5c7dc45bd70fa03a746c60e7d849c49ddc126d6a1f669c827b3a1b6a498fc712fddd139892249f69933d4f8b", @ANYRES32=r0, @ANYRESOCT]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000040)) eventfd(0x4727) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="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", 0x200) fork() r3 = fork() ptrace(0x10, r3) ptrace(0x8, r3) r4 = syz_mount_image$nfs4(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x1000, 0x6, &(0x7f0000000a40)=[{&(0x7f00000023c0)="911d45c35093b0a9221b112aa1c646b012b692c8ccd81cd605f2dfa69d3b3891245e23d62b6722f5f5659a9c793dab0e64ee752b3f487595cfbb6e9625d13ba5e1df724dc67a7e16552898fc4d1a20ff9ea42d4196e5bbf4b6553fd1043577f1977620347b5951ce6e42174d762219686a65337c1304227d8a3cc132567231c68d4297a71ea38be95964902f0346ac3e897e8d0ffd37910dc821c25f3550fe3acf96ebd47ff0f993441f0d187ef23063005ab7c21e962349e5618de160f80bec37360a08e9e38696579e264341ea3e69801e30e81f3b91731088566479756325d043731920be65771da6943c627ceb3c51bcc5b6e34ee705694f53c83848fc46cb6f1a882f9a7417578136f9ade2fe427e18ab356a29979a6b3387b95cdbd138d3a3e6be4f7e1f43e231a9278e18bbbfefe0c04910b5e1188e847e1a1a3e513804992c1e25f6b8a4d858031911fdf55ff6965b07b57a5a6405178048c438e1da4604bdd7defef85e02190037a567bef83eb2697883f81c2251bd24f363c4fe4d0be6ba21fae27887d258ecad0bfe7e04b0ae264477bacf22981925017268b44a45eb80563c8a3981f0977f53e3c6b7a0fd690eeeb8188395110fdbb328f20e7537dd5a9da9fb399057a4eeba9bdde9c0bf8ed7bfbe8b80b96dab62964906e70eab3c6fbb9020627f470a001796b726879c26acee6e0a7035de3ed10e806ee1b150a5ee499cc285b672b30c9229ed7e27e37a1f8bdaeb02f0a294f8406a70324e60ef1c5f55b12ed44ea4d77e1035597167fa4640dda10b6b02c235c4cb0b3b9b249f5f8cce530be350b6bae6e13010de3f63d93cc4e8c4af109e9cbd9aec9c867c3c5aac9a65247c801741220f0ae9f490d9cc89b0fbd5fe51e1bf9d73ddf9e357618995dfa5ee1188eb5a9d300ed3633c8011fa6a7078474340ef127f47a460e423fcedbef5d1254a3115731b936752ee722c173bf77ef0d72f6883895ab84e161d9e8a470ae7f2d7295d52d5415a79db6b5a6ea2cc78c3cd19d7452dcca477035636f6634a74d91efedb66ddf644708c384c6df2222d2ba10969356795f1f61e88fa2bde679eb554ec575001b1d2e20b08680ce0bf0c6b17ff956d8b35d9b65eee83096f60815a8fc8d73a2aa8dab26c90d83c9be6253f5ca40951f3745a29b5da1466fe4219291297ff9841b6478d57e95643dbb5597533a47ef22ede77dc4d59eb09d639ff1b3046984a9f992f1a9f2772c4d532ff8faf08d19efde043bd9777981c08d03eb730fa094eb62e9ce9c318ab994bc0bd7c95060675db8247d7fc699f37f0221451a04659010f74a69bf63f2ab167195ad73ccb7adaacfd6dad57ac4a0a1534568109d7670eeb4853f60180962183632c38affb1cc016d38f655f958d54511a544b1cb9c7e343abd155262a9aadb0326c0df343ff4dce9140895b0d8f88f72ba41ec2215d4cfc1f35ef5f2c76b34462fcb0c4309f7f4210260abf66a512081a4f640f05ba304a74f6994535ae4194ef19ef06f15e214011b685efdc4b695cfd666c495cbb9f081afbf74f61c982716f78f868e3a67f06236797334633f305606ccc294036a7dfad065a566de4c6f4d929a2b0298702bad2e88f0abc87c87504064e348786e1d35652aab8deb775be143b417a65bfd459f2cac18823a579ed57a40e334fede7a5ec61863bd6a5631fb4d124ef3d04f4edacfb22d751ebc5178b95daef7eed89e596f1fe872435fb06ea33a762c975dbece52baa588a1575c77174b5240a994dceea36cce67190f8c4c962978c0bcb462ae80cb578221759a38257b63e09b71be135e42ffc8824cb80761b7b4d2ba5e6a7b46d4c0dfdb6bebd2b54d3d9228274c19c8901761ad547de81dd1d7de74ae7fdefecfaef7c2b118b08c938eee1573b17848143be3b493e8b8a290875b3912334fa10197f4a8da8e90f24cce4bf33a730d905739f9b5313b211cc83cbbeadc1ddb9646449da7654277634b96a8863b1ab95845420e2f923ae9a4362f23dd879552d800785cc44b6b8d73d4ed979fd018ba17f21aadf66802f46ccd8b2b1421bc61cc8aedf27df7b9d1fd0026b8887a48e1cc69b4a4a15c1f7171b45e2c01deb6a285389751f413ecb44a263a26c172b0a88ceefc20323603685ee0abc2a8074cf15c2333585a8801bd91a03dee60cdbbbd08302f5a3d47f72fd599481b9e463194ee33bdb47933a00d7f72552b539912efaab6fcca31f3921ea6404cff5e299485101e997046f276232ccf9d645ca8e93cf4412248a29dc43f715bd7bee2e25cd580edd504dc4416a2fa9eb29d2008d426ae96f46f6fdd10ae6bfe9fd843f76b857e3c5da44ae5b2d0276db8885eff836d352a999f71b0a4341653aaac9a9a3c3621a74316c4b562015068cbeaedde0945125cf694e4eb62530cfa6327ff90424f238b268ded26ce09b12f619e95922c9cc771f1bc4edd354c7c1812cf28b427676acd157d2128bc5fd654fcc68a2f042bcd30b672d94ff5207861dc96240701ed44a5712687d11b7db93215aa9122661309bfd0adae9c835edfd0a40e2dafa87b7f35b54e168eb0b08d749136f43cafa0b4d6a6011429924337e5aeec79125765aa503f9e119e7ab969f890f6842b1837f1de85a27fc34f0c5ca5905a28cf4769f84bc343ce3cc5e9bae54c7330a105ab1870a65741844b786aaf716ceb9a742b0b6f76dfdb4bafd5fba980b7ff90112415859dfaf8c8ddc0b20f4c3d36cede723cd4126c508a6120c79541b0204c02845a5d9b07baad7e04a1e7c3f50d211dba46ba419f6f738c64afdb46566262add2966d84ebbf1857eac1fdeb4c6aa37db2d30c1f99218144988802c098fa436d7fbcbcdb451f5c1250860588ca4e2f81ec2c458d8ace34dd790555f96c763cc119df6f53778e8ad5884b446d39dc5d8432adf7b24ea5686e706ef6993c88669174e523ea569a26003264dba0a305aadf24d94c289a24f0edec79621c605f39bae454968071d41506c99a15bb48fdd12c645b3536d03a8180d0bc8a83f127e47c5faa27a6009bb56c9b830300dab97235f3ded6252f8ae181baeabfdac505fe8a2ed1f829a8d37d6a56263898eee184152142af05d4fd6eec0a905f6398d6200bc2c36f2cc4fa24c9e28caf5424a27d1193622f52674bc15068a35474f40de147cc514b19b17c7021e8633fa38a5dcde81c1ee401dfd161f88f488a863a4bfe10a2ed7cab8159c5b55afc22af5b2336798f26ffd3a00a716d72c951f066985764943922da72663087ea63687df90cc88bf4a505ed309e4c9496a7acd2f2dbf8ea4ba49fb3f12beaa4da9871c5c1e0afde0c41faa11b7f4675e69751a23ac219c6ac559fcef1ea1a21564e4608307761170f89c5cd0852ef82b00bbfc05c7b53e436243bd2e56cbdd050b16098b1a0c05ffb956f65bc9f4c75ea102449f5175912eaca84e739491d34b9a0899c53d75d64247f11863b474e26d45eb72f1d09f9cc170fc85185a83c7b38a020b99c582d99f41e96a2eaf1c00e84c7c91284c5a8283a04188693eb9739bb1814c1608e720c432bc81af50d2c561d81f3f7a31a6ee20da1acef0a98af32ba8e84c7bd091a704d870fd8fc1bcaf68cf03de2df9735cac3dcb1f78e5d78860f5a8d56fd97b611bb4e8ac239f5e29537c5b9cee06baa9b225229f19c48e627668492f93da649bbcd57c438d57260833cdd590ab0055e1f8ab91d4fb06781a70bec102bf05a43f5e2f1e31a8d36b78326bc47b27e6d388af66edd3d5b832867cdf468f9aca9ff86822dd68a784ddb3e3f574a9d11183235352f8fb5ffd29f8edac5b0c75f9ff68dfc36f31f0c3a26f9ae2bbce9eb8d9241b8caff936a505e07c0ea1a002cee265e274c36a89c07290d37c33411d170d47d341bb4974ea06e6b9197c8a3cbf70b9c0700393801857d52146af2d9c76f08a0ee4b5570fe6267727c461ad2d9373f9034bcb781dc7984a9c309f21d9ddd04dd33aca3c4d310e5ad732c4462855cb8c93cf33f19434fade12963cf7154dedf7272f6683c3eba17daf86769341cae53b6ba066409c30e41757ff10add352bc6ec9949f34582ab37cb7f6f8ca42df67eed468a8cbd4a31d504605ddc86b457cee82f15cc6580bdcea1f68f3a40bf36f92d200c4c0ddba817cf1f7ac76bc595944b3b21e1d7a652e2a5c6a11d0c8db0f63e773fc09b35464886163c67eb89696692e38bf5f4f9165b8d47e423ed615ca491db8e9807e659e30e0380ba667b70d25c82631f2c0559d789bea85be5c291d0c002937161269b16487bb5e1cdbb2519e6668be772812eba3702adf746b124c33d100fd190c83c993bc1337537dcc2f346affd1e3d3a18f4cd59f3b38e65bb7708ebca5f8ec6a32f7a754c4ec9383d74f2dd5579d304da8959093e253fffd6eb22ae3b116d395b00255cfc5f1c5e8b90516866f57e926230fbf3f4b8c7d65f9c04639922ff614d91c4bbbd425c4b53b142c9f8821b1ac2b7d45eeda4da1e7a697a36b9d8065b7352f667b04e1aac59d21b8f59fde856c1df7e43b26405120f516192ff5ab75a06e61f831fbbdd01ebd070f7947f8102c6ed447236586845dd6f5994c6a6832bb0a972399fa6925a99d7aaf0a8cbe38b1ec1b1027c7a57007b07647a68ed9769d08816d109457d0df4d715ef92597133c619f11e3c8d316da1a3061d59aae3aca8286852bf97e2d443668c081f933be116446a25eb33922603212a82e695aa3453163c808e15850f3a38ab14a0619e3f250ec1124de01ac033d98c03168d8b58823cadb3fc17fc9f0877c96df3bc0fcfa0dd7c7b77cf38438e1bc50e1fe8d1f8271c0405e60246a4eb3cdfb1175e061056fb14f0f01fd7a9042cfe35f911c56ab8a3d1481e6ef9a8fdfcdc60aef606c0634e5b6dd0f45ab8f0108c21e353b0e6a8374f6f5e8fa930d8fbeaab9644ed6281d2558f0fc3d9c380c916fb8451c9b2d7cb5da24ebd1cb004c59e6f613c2740ea52a00173d055d953c6f7a74cb6978ba2dde12bd9e83ffca4b632866c3083fa4c865ec7fe15c33df4334e45b02d8ec78c4c302d862816aac4449682134ea40a0835705c86acf93f78d5320a90278995c42447eae041af13085fa38da202aaf41becd4d4dc73d826d00a4b4e96018829557d8a86f41bab3fea1a3017ea891eba12b93f4bbb32c921624597d93f94843c68ecaebff0bfabfb46d4bbb22c4d22eaece465f7c97478021be4289a00a614a93fd170513fc948152df70a43bfcc16afe401bd1f7d5e6ec094109b17820c2f61c098ab47cced42e6495178e31751f62327943b34282655f8dced6f83de85b63af4468e12c16c0f3d84d3931f7d9f6c8c7abc1a4b5728db87298efc483767879a93d0ca504f8e7cafab6f465195351d696b2121938fef0a4f4e065931e1138a9ad06c097e73cb27bf0e753ae2c5312055b4d0be6675ee7de40a1dd95d38967a54b37a6f0ff31907830713d5ead683a298577536c45537521a1a6cda0c6b496c8b7c22bdee1a4971ccfde5e9dda817354e43468bb70435794ce2e03799c2de35c6d28b0bfed39e071c87ee5da76c7b759a70c31289e382e5af1c61579257c68186011964f40d4e73b24ac708c8fbaed549a800e3ce414a998beeb9fa10d14b2498ec81c5a92769ed77486d8e9ed381cbd04f4d141316f520d0f20e6f98dbf94a1d3f2baa21466ecb4125ac9e76d1d4960d2619378e32a915036a83098c2142fa25205bf438aa40d1c973f5ef9b3e4e37fae8ef3e9b54aa477cc0278129a5561", 0x1000, 0xc6}, {&(0x7f00000006c0)="34b38b1ef76ce761c6d35eb19324d9ea8782560bf348ef3f81102730d13829e72b9a87d4a995fd754b7638bd2e048f25b5a0ecb22a17e1f557638a100bc9533f6d05ce3364cff33a901caeabbf3dd8776003c3ba9fb26dec19a736401ef2ad03d9179724ae866e83dfc42d7829bccdd8ff1c9f8edcef60149cec8adf2db9295ee0ebffef994f2baad62e5ee4167e56553bc86159eca83d82ab72297d7d9ec8a73962ed1e499eff547521bdd70ebf08b5fbcd036ce2357ce24bcfdfd04d2b2e067a5bdc08bd5fee436f1a5136395ce70e7254e46af1cf67dd5dea67a77478abe330a64c6c95847f2ee26ed6b6187091165ea1f1d71976dbff8838436fb889", 0xfe, 0xab2}, {&(0x7f00000007c0)="359dbeeb8a66921fcd0aabc80752cf97a62eb48bc75318b237c0b44ee5ea11b7eb43b4dca25ef19b801a5e0b4a210fa6b3571c3cb616cf89dba90506057ced77a76a7cc20ffc6d471fd398ec459c78a14151b395e771b8c85eb3b2f00eb2b8c839248d9e9e05d1eea5b7ad6aad152bb9bb86b52daaba35fd4a3c7b4cf61719e68cef59cf33a2dbcb04ad8cc5a42f18e36c020d", 0x93, 0x7}, {&(0x7f0000000880)="663bda60fd21b7142e9ac0d43396d53ddb894c2dfa6c7c25e0aa11ef31d133e1a77a349a8f24ef7cf87e097b8520cd90d5018426774f55066a920a21970cbae2e17425df24025d6b264cbb1d1069ced047598048ce0df6ffc9692db748059c378bde0f3633e0f35a7974df0a97882af2dc1e691d5b8b86ef3fd352771ba57a97f219e650b3a2f939a798b658a44e5a68597663158c64bcaa863f", 0x9a, 0x80000001}, {&(0x7f0000000940)="2da0bd35a740d1875a8d9b8c54bca05b6738478251727ef5a1faa1fbaaf290582dfe3e74a00347bac15c404bb5bfa539fdf139d960555fd7c8edfc882d8b5600aa8b7630f344e43239dfea9e36efa663d80d704a1600659886e148d0d2e1f095976aa9001badcd7d6125fb2af75506ed484c16c9ed544c8c6ed80dae6c618a0fbab1da31aa9e0a67dec830eed36f846995ae2b11795c253732d9660ccc806f51b0d04d7eb4ea80116176d3d51b3ccd1c6262cf7487e9a3ea83c54accbbee91f87f9c432eb3d6d729356c44d29fa36e148b197fafd32ac69f0d1112e406fa9a7d5861cba6d72578303a858dfa5e01e4e9", 0xf0, 0x2}, {&(0x7f0000000540)="10613cd5f5a7d5effbe2436fd293619fb013c5d92accb62d89cb2d", 0x1b, 0x3}], 0xa00000, &(0x7f0000000d00)=ANY=[@ANYBLOB='/dev/vcsa\x00,.^,,/dev/vcsa\x00,/dev/vcsa\x00,fscontext=root,fsmagic=0x0000000000000005,euid<', @ANYRESDEC, @ANYBLOB="0100309ac8464070dbd227c40d508b7cb2ad9c3920cb0ba53d015637c9f03a6e9bdc8e56f8196210b5abc564bdab21836fecf603f2888e8d5c3b6862b69e80df01040000002d3a5f9ec15a4996cabede15c1e2233f22cefd5b7667b91cae718704cdbfa738513f4c2afa290418ce87e60e1db855889d4f0f5044985ba7c9ac0ef818538b4cad4cfdfb6c569b7775396e822161aae0e9e690b663bc3e59e5aa4fb1d8000000000000800183a4887a495c10833ea9f3c550"]) sendfile(0xffffffffffffffff, r4, &(0x7f0000000580)=0x1000, 0x3) wait4(r1, 0x0, 0x1, &(0x7f0000000400)) [ 2205.005397] kauditd_printk_skb: 33 callbacks suppressed [ 2205.005420] audit: type=1326 audit(1764510205.924:6316): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34662 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2205.026453] audit: type=1326 audit(1764510205.928:6317): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34662 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=303 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2205.049317] audit: type=1326 audit(1764510205.928:6318): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34662 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2205.066781] audit: type=1326 audit(1764510205.933:6319): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34662 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=83 compat=0 ip=0x7f2d0b88fc27 code=0x7ffc0000 13:43:25 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x7ffcfffc}]}) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/44, 0x2c) 13:43:25 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0x1200}], 0x1, 0x0) [ 2205.087279] audit: type=1326 audit(1764510205.933:6320): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34662 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=165 compat=0 ip=0x7f2d0b89204a code=0x7ffc0000 13:43:26 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x2}, 0x9}) [ 2205.106788] audit: type=1326 audit(1764510205.940:6321): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34662 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f2d0b843a04 code=0x7ffc0000 13:43:26 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x3000, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) [ 2205.123562] audit: type=1326 audit(1764510205.944:6322): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34662 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2205.152914] audit: type=1326 audit(1764510205.947:6323): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34662 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=259 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 13:43:26 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0x8cffffff}}, &(0x7f00000001c0), 0x0) [ 2205.177732] audit: type=1326 audit(1764510205.948:6324): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34662 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2205.198037] audit: type=1326 audit(1764510205.948:6325): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34662 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 13:43:26 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[]) unlinkat(r0, &(0x7f0000000200)='./file0\x00', 0x0) readlinkat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/105, 0x69) r1 = syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) futimesat(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', 0x0) r2 = openat2(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={0x20000, 0x0, 0x3}, 0x18) renameat(r1, &(0x7f0000000180)='./file0\x00', r2, &(0x7f0000000280)='./file0\x00') 13:43:26 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x500, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:43:26 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x6000, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:43:26 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]}) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/44, 0x2c) 13:43:26 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0x1400}], 0x1, 0x0) [ 2205.527437] tmpfs: Unknown parameter '' 13:43:26 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0xf2ffffff}}, &(0x7f00000001c0), 0x0) 13:43:26 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f0000000800)=ANY=[@ANYBLOB="73c4a2c69f66e2e9170800000000000000212515a89ef3c653b1bc0a57d2cb4055ccd75e1fbc3b2495d7f8bade75a2aed1419a4aff254f6f79e8a70a2e5c32a30764ed011e0043a565ac1b4d3a1aa03b4acc27dc0288b80136913677f450500ac4afca2b718694df983bee81590f73519b3e10575793dae7352cd474fa1abf7cc0b4", @ANYRES32=r0, @ANYBLOB="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"]) faccessat2(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8, 0x1000) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600), 0x1}, 0x0, 0x0, 0x0, 0xd8ac06bd4fcd9f5f, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000040)) eventfd(0x4727) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="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", 0x200) fork() r3 = fork() r4 = syz_open_dev$mouse(&(0x7f00000005c0), 0xe8d4, 0x105000) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x1e, 0x81, 0x5, 0x76, 0x0, 0x2000000, 0x9010, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x70, 0x2, @perf_config_ext={0x3, 0xc27}, 0x10206, 0xf4, 0x46, 0x6, 0x4, 0x7, 0x1, 0x0, 0xfffff596, 0x0, 0x6}, r1, 0x2, r4, 0x1) ptrace(0x10, r3) ptrace(0x8, r3) wait4(r3, 0x0, 0x20000000, &(0x7f0000000400)) 13:43:37 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f00000000c0)={{0x0, 0x2, 0x7, 0x2, 0x4}, 0x9, 0x1ff, 'id1\x00', 'timer0\x00', 0x0, 0x9, 0x8, 0xff, 0x3}) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) 13:43:37 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) r1 = signalfd4(r0, &(0x7f0000000040)={[0xf0fb]}, 0x8, 0x80800) faccessat2(r1, &(0x7f0000000080)='./file0\x00', 0x131, 0x200) futimesat(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', 0x0) syz_emit_vhci(&(0x7f00000000c0)=@HCI_SCODATA_PKT={0x3, {0xc8, 0x15}, "8a500c2ad5fdd51fa0ddd2a71bd33714554a037867"}, 0x19) 13:43:37 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]}) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/44, 0x2c) 13:43:37 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000006c0)=ANY=[@ANYBLOB="73c4a2c69f66e2e9170000", @ANYRES32=r0, @ANYBLOB="254e1938057907becc68eccd083658474791aeaccdc60b7739041c7295d32d8a44bb79b25c6b3e2f2c3a9a2945b1e6ef188631dbe8a2f26f6456007ee347fc70e6804f6a5471390c020d13421d5e8321f2412a62a1d065510700000000000000ff54018b343deba1af11b30ad3bfe6c379b27138379decda63d6c95d05bc84ab2b2fd99e7251898c23b20e20e11acc702a864528dc20aea1c19091e57dee38faf5239f115f0372055d9e0f12e9fee626eb96db877317b3faacea0a56159ad6203c6b06ee9a32362ab9a56155045a7213cdd7010d6365fa66956d493b430264186e9475f38445889481d9000000000000"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000040)) eventfd(0x4727) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000300)='./file0\x00', 0x0) syz_io_uring_setup(0x4f7a, &(0x7f0000000340)={0x0, 0xea37, 0x8, 0x0, 0x307, 0x0, r2}, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000004c0), &(0x7f0000000500)) write(0xffffffffffffffff, &(0x7f0000000100)="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", 0x200) fork() r3 = fork() ptrace(0x10, r3) ptrace(0x8, r3) wait4(r3, 0x0, 0x20000000, &(0x7f0000000400)) 13:43:37 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0x1600}], 0x1, 0x0) 13:43:37 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0xa00, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:43:37 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0xf6ffffff}}, &(0x7f00000001c0), 0x0) 13:43:37 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0xc6e7, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) [ 2216.567768] kauditd_printk_skb: 44 callbacks suppressed [ 2216.567784] audit: type=1326 audit(1764510217.486:6370): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34927 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2216.578972] Bluetooth: hci1: SCO packet for unknown connection handle 200 [ 2216.581678] audit: type=1326 audit(1764510217.486:6371): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34927 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=289 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2216.594716] audit: type=1326 audit(1764510217.493:6372): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34927 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2216.606554] audit: type=1326 audit(1764510217.493:6373): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34927 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=439 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 13:43:37 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0xe7c6, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) [ 2216.622074] audit: type=1326 audit(1764510217.493:6374): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34927 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2216.634756] audit: type=1326 audit(1764510217.494:6375): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34927 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=261 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2216.645430] audit: type=1326 audit(1764510217.494:6376): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34927 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 13:43:37 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='setgroups\x00') readv(r0, &(0x7f0000000680)=[{&(0x7f0000000180)=""/201, 0xc9}], 0x1) write$P9_RUNLINKAT(r0, 0x0, 0x0) sendmsg$NL80211_CMD_NEW_MPATH(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYBLOB="5c000000fcd448279ea4e8db4702e161535cb0a1e4ccd1f2f17dac7a7117653cc3252c07b1f60624fe8e319ec5b39560a8b5078e3faf1b06890f804e1c9847dfa1800f2afb4fe9b700b5c5945d71285c83fef5550635d91315e1d7e31e94d40ab1f471f78937245e15016dc66e83bc5a7a6a2b6fd40d87c61d1bee5c9400ae940143ae35273bac067abc3c8bddd8879a560319f1d9dc2c9cee479fba83ca853571fa796723b8", @ANYRES16=0x0, @ANYBLOB="00022bbd7000ffdbdf25170000000a001a00ffffffffffff00000a001a0008021100000100000a001a0008021100000100000a00060008021100000100000a00060008021100000100000a000600ffffffffffff0000"], 0x5c}, 0x1, 0x0, 0x0, 0x240000c0}, 0x4004000) syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x56, 0x8, 0x20, 0x3f}]}) timerfd_create(0x6, 0x0) futimesat(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', 0x0) [ 2216.659856] audit: type=1326 audit(1764510217.494:6377): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34927 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f5a06d055ff code=0x7ffc0000 [ 2216.666419] audit: type=1326 audit(1764510217.498:6378): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34927 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2216.672784] audit: type=1326 audit(1764510217.498:6379): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34927 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=83 compat=0 ip=0x7f5a06d51c27 code=0x7ffc0000 13:43:37 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0xb00, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:43:37 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x3, 0x0, 0x20000, 0x1, 0x6}, 0x3, 0x6}) 13:43:37 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0xff00, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:43:37 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0x1800}], 0x1, 0x0) 13:43:47 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x11000, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:43:47 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0xfeffffff}}, &(0x7f00000001c0), 0x0) 13:43:47 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]}) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/44, 0x2c) 13:43:47 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x140) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f0000000700)=ANY=[@ANYBLOB="73c4a2c69f66e2e917000002353ac76b8a180a9f6459f4881457967d28f6d294ab3dcbf8d5ee14fef8d429dc61e7b7fae1470f92c8860c5e351f900073e6f06b472a93ffe9", @ANYRES32=r0, @ANYBLOB="254e1938057907becc68eccd083658474791aeaccdc60b7739041c7295d32d8a44bb79b25c6b3e2f2c3a9a2945b1e6ef188631dbe8a2f26f6456007ee347fc70e6804f6a5471390c020d13421d5e8321f2412a62a1d06551a4fd4f5b83b1d919ff54018b343deba1af11b30ad3bfe6c379b27138379decda63d6c95d05bc84ab2b2fd99e7251898c23b20e20e11acc702a864528dc20aea1c19091e57dee38faf5239f115f0372055d9e0f12e9fee626eb96db877317b3faacea0a56159ad6045a7213cdd7010d6365fa66956d493b430264186e9475f38445889481d9000000000000"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000040)) eventfd(0x4727) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="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", 0x200) fork() r2 = fork() ptrace(0x10, r2) ptrace(0x8, r2) wait4(r2, 0x0, 0x20000000, &(0x7f00000004c0)) 13:43:47 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0xc00, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:43:47 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0xee00, 0xee00}}, './file0\x00'}) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) 13:43:47 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0x1a00}], 0x1, 0x0) 13:43:47 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) futimesat(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='setgroups\x00') readv(r0, &(0x7f0000000680)=[{&(0x7f0000000180)=""/201, 0xc9}], 0x1) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='setgroups\x00') readv(r1, &(0x7f0000000680)=[{&(0x7f0000000180)=""/201, 0xc9}], 0x1) write$P9_RUNLINKAT(r1, 0x0, 0x0) write$P9_RUNLINKAT(r0, 0x0, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0), 0x100000000, 0xa0081) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000040)) [ 2226.233834] kauditd_printk_skb: 17 callbacks suppressed [ 2226.233849] audit: type=1326 audit(1764510227.153:6397): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35076 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2226.244289] audit: type=1326 audit(1764510227.157:6398): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35076 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2226.252715] audit: type=1326 audit(1764510227.157:6399): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35076 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=261 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2226.263859] audit: type=1326 audit(1764510227.158:6400): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35076 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2226.275503] audit: type=1326 audit(1764510227.158:6401): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35076 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f5a06d05a04 code=0x7ffc0000 [ 2226.284183] audit: type=1326 audit(1764510227.161:6402): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35076 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 13:43:47 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x30000, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) [ 2226.295119] audit: type=1326 audit(1764510227.162:6403): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35076 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=19 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 13:43:47 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0xd00, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) [ 2226.306841] audit: type=1326 audit(1764510227.162:6404): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35076 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2226.318700] audit: type=1326 audit(1764510227.166:6405): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35076 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f5a06d05a04 code=0x7ffc0000 [ 2226.327679] audit: type=1326 audit(1764510227.167:6406): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35076 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 13:43:47 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x20a0006, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) openat2(r0, &(0x7f0000000080)='.\x00', &(0x7f00000000c0)={0x200000, 0x88, 0x8}, 0x18) futimesat(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', 0x0) 13:43:47 executing program 5: ioctl$SNDRV_TIMER_IOCTL_GPARAMS(0xffffffffffffffff, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f00000000c0)={0xc, 0x6, 0xfffffff9, 0x0, 0x7}) 13:43:47 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0x1c00}], 0x1, 0x0) 13:43:57 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0xffffff8c}}, &(0x7f00000001c0), 0x0) 13:43:57 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000200)={0xffffffffffffffff, 0x2, 0x81, 0x0, 0xf14}) epoll_create(0x1000) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(0xffffffffffffffff, 0x40345410, &(0x7f00000002c0)={{0x1, 0x3, 0x7f}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000140)={0x6, 0x9c8, 0x101}) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r2, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000140)={0x6, 0x9c8, 0xff}) r3 = socket$nl_sock_diag(0x10, 0x3, 0x4) r4 = dup2(r3, r1) r5 = openat2(r4, &(0x7f0000000280)='./file0\x00', &(0x7f0000000100)={0x521800, 0x6a, 0x12}, 0x18) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r5, 0x40505412, &(0x7f0000000140)={0x3, 0x4, 0x80, 0x0, 0x7}) ioctl$SNDRV_TIMER_IOCTL_TREAD(r5, 0x40045402, &(0x7f0000000240)) signalfd(r5, &(0x7f00000001c0)={[0x80000001]}, 0x8) r6 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r6, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r6, 0x40505412, &(0x7f0000000140)={0x6, 0x9c8, 0x101}) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1, 0x0, 0x0, 0x0, 0x800}}) 13:43:57 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x34000, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:43:57 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0xe00, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:43:57 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x4, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) futimesat(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', 0x0) 13:43:57 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0x1e00}], 0x1, 0x0) 13:43:57 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f0000000700)=ANY=[@ANYBLOB="366bacc82eb023f9713f0442ad8ae1eb3417aaa32ead2199c5a437cbc4a19e81e9db859b65012a9b88cd34ac6ee561e2fbc157b432ce0928c3b21bc0e2283a9ee1557ba48e1b53c4a12088a089744c3ae33981e0aafcc95a51b8b26bf783000000000000", @ANYRES32=r0, @ANYBLOB="256097064e1938057907becc68eccd083658474791aeaccdc60b8c39041c7295d32d8a44bb79262df94897258e61eb71e505c414b25c6b3e2f2c3a9a2945b1e6ef2e8631dbe8a2f26f6456007ee347fc70e6804f6a5471390c020013421d5e8321f2412a62a1d06551a4fd4f5b83b1d919ff54018b34bdeba1af11b30ad3bfe6c379b27138379decda63d6c95d05bc84ab2b2fd99e7251898c23b20e20e11acc702a864528dc20aea1c19091e57dee38faf5239f115f0372055d9e0f12e9fee626eb96db877317b3faacea0a56159ad6045a7213cdd7010d6365fa66956d493b430265186e9475f38445889481d9000000"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0xfffffffffffffffe, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000040)) eventfd(0x4727) unlinkat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x0) getdents64(0xffffffffffffffff, &(0x7f00000004c0)=""/163, 0xa3) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, r0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="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", 0x200) fork() r2 = fork() ptrace(0x10, r2) ptrace(0x8, r2) wait4(0x0, 0x0, 0x1, &(0x7f0000000400)) 13:43:57 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, &(0x7f0000000080)=""/44, 0x2c) [ 2236.956367] kauditd_printk_skb: 40 callbacks suppressed [ 2236.956390] audit: type=1326 audit(1764510237.871:6447): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35218 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2236.975958] audit: type=1326 audit(1764510237.880:6448): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35218 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=303 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2236.998113] audit: type=1326 audit(1764510237.880:6449): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35218 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2237.014534] audit: type=1326 audit(1764510237.881:6450): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35218 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=83 compat=0 ip=0x7f2d0b88fc27 code=0x7ffc0000 [ 2237.029281] audit: type=1326 audit(1764510237.881:6451): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35218 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=165 compat=0 ip=0x7f2d0b89204a code=0x7ffc0000 13:43:57 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0x2a00}], 0x1, 0x0) 13:43:57 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x0) [ 2237.058817] audit: type=1326 audit(1764510237.882:6452): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35225 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2237.074951] audit: type=1326 audit(1764510237.886:6453): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35218 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f2d0b843a04 code=0x7ffc0000 [ 2237.094718] audit: type=1326 audit(1764510237.886:6454): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35225 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=89 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2237.121540] audit: type=1326 audit(1764510237.886:6455): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35225 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 13:43:58 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0xfffffff2}}, &(0x7f00000001c0), 0x0) 13:43:58 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x40000, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) [ 2237.141387] audit: type=1326 audit(1764510237.891:6456): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35218 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 13:43:58 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x1100, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:43:58 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0/file0\x00', r0, &(0x7f0000000080)='./file0\x00', 0x60) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x2000000000000000, &(0x7f0000000100)=[{0x5, 0x1, 0x50, 0x7}]}) futimesat(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', 0x0) 13:43:58 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000000c0), 0x105601, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r2, 0x40345410, &(0x7f0000000100)={{0x2, 0xc61fd50f7256d761, 0x0, 0x2, 0x9}}) 13:43:58 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0x2c00}], 0x1, 0x0) 13:44:06 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x80000, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:44:06 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0x2e00}], 0x1, 0x0) 13:44:06 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1, 0x0, 0xfffffffc}, 0x2, 0x5}) 13:44:06 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000005c0)=ANY=[@ANYBLOB="73c4a2c69f66e2e9170000", @ANYRES32=r0, @ANYBLOB="254e1938057907becc68eccd083658474791aeaccdc60b7739041c7295d32d8a44bb79b25c6b3e2f2c3a9a2945b1e6ef188631dbe8a2f26f6456007ee347fc70e6804f6a5471390c020d13421d5e8321f2412a62a1d06551a4fd4f5b83b1d919ff54018b343deba1af11b30ad3bfe6c379b27138379decda63d6c95d05bc84ab2b2fd99e7251898c23b20e20e11acc702a864528dc20aea1c19091e57dee38faf5239f115f0372055d9e0f12e9fee626eb96db877317b3faacea0a56159ad6045a7213cdd7010d6365fa66956d493b430264186e9475f38445889481d9000000000000"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x3, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000040)) eventfd(0x4727) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="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", 0x200) fork() r3 = fork() ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f0000000380)=@req={0x28, &(0x7f0000000340)={'syz_tun\x00', @ifru_addrs=@in={0x2, 0x0, @remote}}}) ptrace(0x10, r3) ptrace(0x8, r3) wait4(r3, 0x0, 0x20000000, &(0x7f0000000400)) 13:44:06 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x0) (fail_nth: 1) 13:44:06 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount_setattr(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x8000, &(0x7f0000000240)={0x2, 0x10007a, 0x120000}, 0x20) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x40481, 0x0) mknodat$loop(r0, &(0x7f00000001c0)='./file0\x00', 0x1000, 0x1) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x1206, 0xdc, 0x10, 0x7ffcfffc}]}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1, {0x6c8000}}, './file0\x00'}) r3 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r3, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r3, 0x40505412, &(0x7f0000000140)={0x6, 0x9c8, 0x101}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000180)={0x0, 0x2, r3, 0x5}) futimesat(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', 0x0) 13:44:06 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0xfffffff6}}, &(0x7f00000001c0), 0x0) 13:44:07 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x1200, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:44:07 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f00000000c0)={{0x2, 0x1, 0x9, 0x3}, 0x7fffffff, 0x132}) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) [ 2246.144907] kauditd_printk_skb: 38 callbacks suppressed [ 2246.144921] audit: type=1326 audit(1764510247.064:6495): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35374 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2246.155979] FAULT_INJECTION: forcing a failure. [ 2246.155979] name failslab, interval 1, probability 0, space 0, times 0 [ 2246.156895] CPU: 1 UID: 0 PID: 35383 Comm: syz-executor.0 Not tainted 6.18.0-rc7-next-20251128 #1 PREEMPT(voluntary) [ 2246.156933] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2246.156951] Call Trace: [ 2246.156961] [ 2246.156972] dump_stack_lvl+0xfa/0x120 [ 2246.157028] should_fail_ex+0x4d7/0x5e0 [ 2246.157068] ? audit_log_start.part.0+0x257/0x910 [ 2246.157106] should_failslab+0xc2/0x120 [ 2246.157123] kmem_cache_alloc_noprof+0x80/0x710 [ 2246.157135] ? lock_release+0xc8/0x270 [ 2246.157150] ? lock_is_held_type+0x9e/0x120 [ 2246.157172] ? audit_log_start.part.0+0x257/0x910 [ 2246.157187] audit_log_start.part.0+0x257/0x910 [ 2246.157204] ? __pfx_audit_log_start.part.0+0x10/0x10 [ 2246.157219] ? __bpf_prog_run32+0x9c/0xe0 [ 2246.157233] ? __pfx___bpf_prog_run32+0x10/0x10 [ 2246.157246] ? find_held_lock+0x2b/0x80 [ 2246.157257] ? __pfx_audit_filter+0x10/0x10 [ 2246.157268] ? lock_is_held_type+0x9e/0x120 [ 2246.157289] audit_log_start+0x63/0x90 [ 2246.157305] audit_seccomp+0x60/0x200 [ 2246.157320] __seccomp_filter+0x9f2/0x1260 [ 2246.157336] ? __pfx___seccomp_filter+0x10/0x10 [ 2246.157351] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 2246.157368] ? ksys_write+0x1a3/0x240 [ 2246.157386] __secure_computing+0x1ac/0x290 [ 2246.157399] syscall_trace_enter+0x8d/0x230 [ 2246.157415] do_syscall_64+0x326/0x420 [ 2246.157428] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2246.157441] RIP: 0033:0x7f68ebbcdb19 [ 2246.157450] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2246.157461] RSP: 002b:00007f68e9143188 EFLAGS: 00000246 ORIG_RAX: 0000000000000059 [ 2246.157473] RAX: ffffffffffffffda RBX: 00007f68ebce0f60 RCX: 00007f68ebbcdb19 [ 2246.157481] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2246.157487] RBP: 00007f68e91431d0 R08: 0000000000000000 R09: 0000000000000000 [ 2246.157494] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2246.157500] R13: 00007ffcc978ab6f R14: 00007f68e9143300 R15: 0000000000022000 [ 2246.157517] [ 2246.157522] audit: audit_lost=21 audit_rate_limit=0 audit_backlog_limit=64 [ 2246.173596] audit: out of memory in audit_log_start [ 2246.178896] audit: type=1326 audit(1764510247.067:6496): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35374 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2246.190842] audit: type=1326 audit(1764510247.074:6497): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35374 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f68ebb80a04 code=0x7ffc0000 [ 2246.203653] audit: type=1326 audit(1764510247.075:6498): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35374 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f68ebb805ff code=0x7ffc0000 [ 2246.217102] audit: type=1326 audit(1764510247.135:6499): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35374 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=0 compat=0 ip=0x7f68ebb8069c code=0x7ffc0000 [ 2246.220894] audit: type=1326 audit(1764510247.140:6500): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35374 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f68ebb805ff code=0x7ffc0000 [ 2246.227912] audit: type=1326 audit(1764510247.142:6501): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35384 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2246.237126] audit: type=1326 audit(1764510247.144:6502): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35374 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7f68ebb8072b code=0x7ffc0000 13:44:07 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) futimesat(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x81, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000180)="80588fb9d18113b0ff685e0e2514b58e9997a364f78c8f42b90998f0c35136e05fed6d54ca6b35dbd6f7014e7087ccf79457ef3f73dc9100ee2f99646253a334fae0756df3d713a9acd7c3bad968ab3c4048f63540a58d489c6d85cc78f3137903e75870fde6db1098c97fa659953a15a01bd7c862ce8a99db69397e8f2a544bb98ee74493611a6261858035bcd6bc5904b3eba1850ffc5cde1ca631d2c1ec8e4c4afb98670d68f2d92607a878320b51505402f7c405cedaf82c40d5478cb5b06c31612afe7f1c45ef9b684fa6d0cb3d90ca9b451583fc33d92f01949dcb488e", 0xe0, 0x8000}, {&(0x7f0000000280)="54b85a346d4a7210573700b29e0beb8327168d0becaf92bed718b27a6099a71e9029d26ffd89b42d855c60f2fdc12f9c4817ab824bb2737c3f4089a8d6a65dee97153b02e9e0e1a83695d788326472ee5ab63ca52f1e477b95a7f71c48f4046aaec850decd0570949c00c034dfe13bb01e2d93bd0a8775522ca1d1834b0beab106967cb756e1caa9cd1170d3e0dd385575533b188ba4e97d2c16e617b3b87747ca67a839a3aeadcaaa27d80bd7ec81c0aaeb86e7abd4628d2ce21c8ff1b23389381eed0dd993ce09b00fe560d44476e8f2be9b1ccc469d15210103b2c2ace7cab639866da13080c4c5", 0xe9, 0x5}], 0xa040, &(0x7f0000000380)={[], [{@subj_user}, {@dont_hash}, {@smackfsdef={'smackfsdef', 0x3d, '!'}}, {@smackfshat={'smackfshat', 0x3d, ':,:]'}}]}) 13:44:07 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x1400, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) [ 2246.252368] loop1: detected capacity change from 0 to 128 13:44:07 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x200003) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f00000000c0)={{0x1, 0x2, 0x7, 0x0, 0x6}, 0x1, 0x6}) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x3, 0x1, 0x0, 0x1, 0xfffffffd}, 0x40000000, 0x800}) 13:44:07 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x100100, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:44:07 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x0) (fail_nth: 2) 13:44:07 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0x3000}], 0x1, 0x0) 13:44:07 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x6) pread64(r1, &(0x7f0000000180)=""/196, 0xc4, 0x6) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r0, {0x7fffffff}}, './file0/file0\x00'}) r4 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r4, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r4, 0x40505412, &(0x7f0000000140)={0x6, 0x9c8, 0x101}) r5 = memfd_secret(0x0) io_submit(0x0, 0x3, &(0x7f0000000380)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2, 0xffff, r1, &(0x7f0000000000)="534acc48b54b695271cf194bf2b71620a2ee3ece423b9ca6ccf0ae85c92455d242478fe1a30f2d52a87298200cf69099", 0x30, 0x8, 0x0, 0x0, r2}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x7, r0, &(0x7f0000000280)="cafcddd7a88d40181bb01f8198588465c5ef92e814ab836122c21c394fa10f0596e0205297b561200dcb3ce4dc4068", 0x2f, 0x8, 0x0, 0x2, r3}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0xe7, r4, &(0x7f0000000a00)="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", 0x1000, 0x1, 0x0, 0x2, r5}]) futimesat(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', 0x0) 13:44:15 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x1600, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:44:15 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c7800) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) 13:44:15 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0xfffffffe}}, &(0x7f00000001c0), 0x0) 13:44:15 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x0) (fail_nth: 3) 13:44:15 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x8001, 0x0, 0x0, 0x0, 0x0) futimesat(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0x0, 0x7ff, 0xf31, 0x4, 0x43ff}) 13:44:15 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x400300, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:44:15 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f0000000700)=ANY=[@ANYBLOB="73c4617070e9df1508fcadb0fc1dff00"/26, @ANYRES32=r0, @ANYBLOB="254e1938057907becc68eccd083658474791aeaccdc60b7739041c7295d32d8a44bb79b25c6b3e2f2c3a9a2945b1e6ef188631dbe8a2f26f6456007ee347fc70e6804f6a5471390c020d13421d5e8321f2412a62a1d06551a4fd4f5b83b1d919ff54018b343deba1af11b30ad3bfe6c379b27138379decda63d6c95d05bc84ab2b2fd99e7251898c23b20e20e11acc702a864528dc20aea1c19091e57dee38faf5239f115f0372055d9e0f12e9fee626eb96db877317b3faacea0a56159ad6045a7213cdd7010d6365fa66956d493b430264186e9475f38445889481d9000000000000"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000040)) eventfd(0x4727) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) sendmsg$NL80211_CMD_SET_BSS(r2, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000004c0)={&(0x7f0000000540)={0x14, 0x0, 0x100, 0x70bd27, 0x25dfdbfb, {{}, {@void, @void}}}, 0x14}, 0x1, 0x0, 0x0, 0x41}, 0x48044) write(0xffffffffffffffff, &(0x7f0000000100)="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", 0x200) fork() r3 = fork() ptrace(0x10, r3) ptrace(0x8, r3) wait4(r3, 0x0, 0x20000000, &(0x7f0000000400)) 13:44:15 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0x6000}], 0x1, 0x0) [ 2255.015263] kauditd_printk_skb: 63 callbacks suppressed [ 2255.015278] audit: type=1326 audit(1764510255.934:6566): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35529 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2255.031164] audit: type=1326 audit(1764510255.939:6567): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35529 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2255.043396] audit: type=1326 audit(1764510255.941:6568): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35529 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=303 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 13:44:15 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f00000000c0)={0x0, 0x6, 0x5, 0x0, 0x7}) [ 2255.057306] audit: type=1326 audit(1764510255.942:6569): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35529 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2255.067649] audit: type=1326 audit(1764510255.942:6570): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35529 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=83 compat=0 ip=0x7f2d0b88fc27 code=0x7ffc0000 [ 2255.074233] audit: audit_lost=22 audit_rate_limit=0 audit_backlog_limit=64 [ 2255.075442] audit: out of memory in audit_log_start [ 2255.079275] audit: type=1326 audit(1764510255.942:6571): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35529 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=165 compat=0 ip=0x7f2d0b89204a code=0x7ffc0000 [ 2255.091643] audit: type=1326 audit(1764510255.945:6572): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35529 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f2d0b843a04 code=0x7ffc0000 13:44:16 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0xc0df}], 0x1, 0x0) [ 2255.101757] audit: type=1326 audit(1764510255.945:6573): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35529 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 13:44:16 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x1800, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:44:16 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0xffffffff}}, &(0x7f00000001c0), 0x0) 13:44:16 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x1000000, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:44:16 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000140)={0x6, 0x9c8, 0x101}) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x8, &(0x7f0000000180)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@posixacl}, {@posixacl}, {@version_u}, {@noextend}], [{@hash}]}}) futimesat(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', 0x0) 13:44:16 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000140)={0x6, 0x9c8, 0x101}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000140)={0x6, 0x6}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) ppoll(&(0x7f00000000c0)=[{r0, 0x10}, {0xffffffffffffffff, 0x40}], 0x2, &(0x7f0000000140)={r2, r3+10000000}, &(0x7f0000000180)={[0x5]}, 0x8) r4 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r4, 0x40345410, &(0x7f0000000040)={{0x1}}) [ 2255.303398] 9p: Bad value for 'rfdno' [ 2255.320927] 9p: Bad value for 'rfdno' 13:44:25 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10}, &(0x7f00000001c0), 0x0) 13:44:25 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$BTRFS_IOC_FS_INFO(r0, 0x8400941f, &(0x7f0000000200)) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x24, r1, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_4ADDR={0x5, 0x53, 0x1}]}, 0x24}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_BEACONS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10200008}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r1, 0x4, 0x70bd25, 0x25dfdbfd, {{}, {@val={0x8, 0x1, 0x48}, @val={0x8, 0x3, r3}, @void}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x2400c091}, 0x3377a62a214d8644) r4 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r4, 0x40345410, &(0x7f0000000040)={{0x1}}) 13:44:25 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x1a00, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:44:25 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) syz_open_dev$vcsn(&(0x7f00000000c0), 0x200, 0x0) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file1\x00') futimesat(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', 0x0) 13:44:25 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000005c0)=ANY=[@ANYBLOB="73c4a2c69f66e2e9170000", @ANYRES32=r0, @ANYBLOB="254e1938057907becc68eccd083658474791aeaccdc60b7739041c7295d32d8a44bb79b25c6b3e2f2c3a9a2945b1e6ef188631dbe8a2f26f6456007ee347fc70e6804f6a5471390c020d13421d5e8321f2412a62a1d06551a4fd4f5b83b1d919ff54018b343deba1af11b30ad3bfe6c379b27138379decda63d6c95d05bc84ab2b2fd99e7251898c23b20e20e11acc702a864528dc20aea1c19091e57dee38faf5239f115f0372055d9e0f12e9fee626eb96db877317b3faacea0a56159ad6045a7213cdd7010d6365fa66956d493b430264186e9475f38445889481d9000000000000"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000040)) eventfd(0x4727) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, &(0x7f0000000340)={0x8}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="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", 0x200) fork() r2 = fork() ptrace(0x10, r2) ptrace(0x8, r2) r3 = fork() wait4(r3, 0x0, 0x4, &(0x7f0000000400)) 13:44:25 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0xdfc0}], 0x1, 0x0) 13:44:25 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x2000000, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:44:25 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x0) (fail_nth: 4) [ 2264.686921] kauditd_printk_skb: 49 callbacks suppressed [ 2264.686937] audit: type=1326 audit(1764510265.605:6623): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35677 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2264.697639] audit: type=1326 audit(1764510265.609:6624): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35677 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f68ebb80a04 code=0x7ffc0000 [ 2264.706667] audit: type=1326 audit(1764510265.610:6625): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35677 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f68ebb805ff code=0x7ffc0000 [ 2264.717148] audit: type=1326 audit(1764510265.610:6626): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35677 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=89 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2264.726223] audit: type=1326 audit(1764510265.614:6627): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35677 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=0 compat=0 ip=0x7f68ebb8069c code=0x7ffc0000 13:44:25 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x0) (fail_nth: 5) [ 2264.737175] audit: type=1326 audit(1764510265.614:6628): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35677 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f68ebb805ff code=0x7ffc0000 [ 2264.751893] audit: type=1326 audit(1764510265.614:6629): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35677 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7f68ebb8072b code=0x7ffc0000 [ 2264.762357] audit: type=1326 audit(1764510265.615:6630): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35677 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 13:44:25 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0xffffffffffffffff, 0x0, 0xfffffffd, 0x3}}) [ 2264.777363] audit: type=1326 audit(1764510265.666:6631): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35675 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2264.788309] audit: type=1326 audit(1764510265.673:6632): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35675 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=303 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 13:44:25 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x3000000, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:44:25 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x141000) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x40806685, &(0x7f0000000340)={0x1, 0x2, 0x1000, 0x3c, &(0x7f00000002c0)="0c206402635b88f4399678d9ba608856dd0e73c3e62488488112241d7e92aa46eaec2a211f334a070705629c70c9376168aa20d450aab1ce3f70e301", 0x3c, 0x0, &(0x7f0000000300)="b34859e04c7dd9215a817883916d35da15f4f6eec2620b07d6b80df3e69eaad4b134c838ee7b319b31e3b429b381d27fb73730ce8180e045648b9bce"}) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x3, 0x0, 0x1000}, 0x80, 0x2}) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f0000000240)={{0x2, 0x0, 0x5, 0x2, 0x8001}, 0x8, 0x5}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='oom_adj\x00') ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f00000001c0)={{0x0, 0x2, 0x4, 0x2, 0x4}, 0x9, 0x400}) fdatasync(0xffffffffffffffff) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) copy_file_range(r2, 0x0, 0xffffffffffffffff, &(0x7f0000000140)=0x4c, 0x7, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201) write$rfkill(r2, &(0x7f0000000100)={0x8, 0x0, 0x3}, 0x8) 13:44:25 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x0) (fail_nth: 6) 13:44:25 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0xff00}], 0x1, 0x0) 13:44:25 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0x0, 0x2}}, &(0x7f00000001c0), 0x0) 13:44:25 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x200000, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="1000000002000000b16fd14b00004000feffff7d00000000"], &(0x7f00000000c0), 0x1400) futimesat(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', 0x0) 13:44:25 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) r1 = openat2(r0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x22280, 0x106}, 0x18) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f0000000540)=ANY=[@ANYRESHEX, @ANYRES32, @ANYRES16]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000040)) eventfd(0x4727) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="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", 0x200) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000500)={'bond0\x00', &(0x7f00000004c0)=@ethtool_stats={0x1d, 0x6, [0x1, 0xffffffff, 0x1f8d, 0x3, 0x3ff, 0x7f]}}) fork() r4 = fork() ptrace(0x10, r4) ptrace(0x8, r4) wait4(r4, 0x0, 0x20000000, &(0x7f0000000400)) 13:44:25 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x1c00, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:44:36 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x5000000, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:44:36 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000005c0)=ANY=[@ANYBLOB="73c4a2c69f66e2e9170000", @ANYRES32=r0, @ANYBLOB="254e1938057907becc68eccd083658474791aeaccdc60b7739041c7295d32d8a44bb79b25c6b3e2f2c3a9a2945b1e6ef188631dbe8a2f26f6456007ee347fc70e6804f6a5471390c020d13421d5e8321f2412a62a1d06551a4fd4f5b83b1d919ff54018b343deba1af11b30ad3bfe6c379b27138379decda63d6c95d05bc84ab2b2fd99e7251898c23b20e20e11acc702a864528dc20aea1c19091e57dee38faf5239f115f0372055d9e0f12e9fee626eb96db877317b3faacea0a56159ad6045a7213cdd7010d6365fa66956d493b430264186e9475f38445889481d9000000000000"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000040)) eventfd(0x4727) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000140)={0x6, 0x9c8, 0x101}) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/101, 0x65, 0x74) write(0xffffffffffffffff, &(0x7f0000000100)="5ed0b2ff68d76fb346352b602a2a1295cbe01cb3f64fbed9e7f9bc9be0f300cb97f6a204cc585145dfb949002f6117fc969dd435dd0c37c5077e5b10cfeafd75205e215b167323a3b971b0ec8583851f2567d30bf5baf28aabb598e6c3d4d825cae01271cb35cdd091e4872367f354e0dc81a7e4ac79775bc1dcaafe2f5079da7dd1989f1ddce6722fc438a7217526cfe75d53471624d6f091e19a7fb699ea27efa9e0fd1914e7c35f297afd9b9bad399bcc85ff0ce7a982f4fa0c172ea5f06479eec302f30e5df66273717e028f4ca7d4c5b6bc8a3c3c67f688195f22488a15d9e1f7e5fed3a6c2aba7bc308b0e2c5657f4538f4a3bf9b975bb887a901ab3c85261be3e331b741313e78b5ad63b7b1b378e9479dc4a95b2b4d15cd1d1b808844378f882a72af1e5b0eefd356e0247246e60643204c3b46183dbe4e066c55cb1dcdaa7b70ef43ab2fa4d2b8c4c1a89cb0e325fd9716874d3856cf368efcdf92d21214e55e4de647c37c71887d11f74f9afe1616e3054ceae601e4b3555e243c1882ad42c7730caeb309e7714ad87c55e9fba308cfc4161e562abde3ac4f3d7e0a3584d49f90692e4c7a4591928100197f102309b05c0b4b4898b0591bc1433af443478979f28e6136ffb21aaeac2be5490475a08e96bb94fd9d9d3aa2f8a1e147a80ba9bfd04dac3f476ff128476c693ea71f7be47a508c98eddc479eb703d6f", 0x200) fork() r2 = fork() ptrace(0x10, r2) ptrace(0x8, r2) wait4(r2, 0x0, 0x20000000, &(0x7f0000000400)) 13:44:36 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x8000000, 0x0, 0x0, 0x0, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[]) unlinkat(r0, &(0x7f0000000200)='./file0\x00', 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) chdir(&(0x7f00000000c0)='./file0\x00') futimesat(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', 0x0) 13:44:36 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0x0, 0x3}}, &(0x7f00000001c0), 0x0) 13:44:36 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x0) (fail_nth: 7) 13:44:36 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0x11000}], 0x1, 0x0) 13:44:36 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x1e00, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:44:36 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) readv(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)=""/172, 0xac}], 0x1) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000140)={0x6, 0x9c8, 0x101}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f00000001c0)={0x4, 0x7, 0xfffffff8, 0x0, 0xc}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x81}}, './file0\x00'}) ioctl$SNDRV_TIMER_IOCTL_STATUS32(r2, 0x80585414, &(0x7f00000002c0)) [ 2275.392888] kauditd_printk_skb: 67 callbacks suppressed [ 2275.392915] audit: type=1326 audit(1764510276.311:6698): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35939 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2275.397188] FAULT_INJECTION: forcing a failure. [ 2275.397188] name failslab, interval 1, probability 0, space 0, times 0 [ 2275.399026] CPU: 1 UID: 0 PID: 35942 Comm: syz-executor.0 Not tainted 6.18.0-rc7-next-20251128 #1 PREEMPT(voluntary) [ 2275.399046] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2275.399055] Call Trace: [ 2275.399060] [ 2275.399066] dump_stack_lvl+0xfa/0x120 [ 2275.399096] should_fail_ex+0x4d7/0x5e0 [ 2275.399117] should_failslab+0xc2/0x120 [ 2275.399138] __kmalloc_node_track_caller_noprof+0xd7/0x820 [ 2275.399157] ? lock_acquire+0x15e/0x2d0 [ 2275.399177] ? sidtab_sid2str_get+0x85/0x6f0 [ 2275.399194] ? sidtab_sid2str_get+0x17e/0x6f0 [ 2275.399215] ? kmemdup_noprof+0x2b/0x60 [ 2275.399236] kmemdup_noprof+0x2b/0x60 [ 2275.399257] sidtab_sid2str_get+0x17e/0x6f0 [ 2275.399276] sidtab_entry_to_string+0x33/0x110 [ 2275.399295] security_sid_to_context_core+0x350/0x620 [ 2275.399314] selinux_lsmprop_to_secctx+0xdf/0x1c0 [ 2275.399332] ? __pfx_selinux_lsmprop_to_secctx+0x10/0x10 [ 2275.399351] ? skb_put+0x138/0x1b0 [ 2275.399375] security_lsmprop_to_secctx+0x140/0x190 [ 2275.399394] audit_log_subj_ctx.part.0+0x230/0x3a0 [ 2275.399416] ? __pfx_audit_log_subj_ctx.part.0+0x10/0x10 [ 2275.399442] audit_log_task_context+0xb8/0x100 [ 2275.399461] ? __pfx_audit_log_task_context+0x10/0x10 [ 2275.399478] ? from_kuid+0x8d/0xd0 [ 2275.399501] ? __pfx_audit_log_start.part.0+0x10/0x10 [ 2275.399523] audit_log_task+0x1c9/0x3c0 [ 2275.399537] ? __pfx_audit_log_task+0x10/0x10 [ 2275.399557] audit_seccomp+0x79/0x200 [ 2275.399580] __seccomp_filter+0x9f2/0x1260 [ 2275.399599] ? __pfx___seccomp_filter+0x10/0x10 [ 2275.399627] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 2275.399649] ? ksys_write+0x1a3/0x240 [ 2275.399671] __secure_computing+0x1ac/0x290 [ 2275.399686] syscall_trace_enter+0x8d/0x230 [ 2275.399706] do_syscall_64+0x326/0x420 [ 2275.399722] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2275.399738] RIP: 0033:0x7f68ebbcdb19 [ 2275.399748] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2275.399762] RSP: 002b:00007f68e9143188 EFLAGS: 00000246 ORIG_RAX: 0000000000000059 [ 2275.399776] RAX: ffffffffffffffda RBX: 00007f68ebce0f60 RCX: 00007f68ebbcdb19 [ 2275.399785] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2275.399793] RBP: 00007f68e91431d0 R08: 0000000000000000 R09: 0000000000000000 [ 2275.399801] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2275.399809] R13: 00007ffcc978ab6f R14: 00007f68e9143300 R15: 0000000000022000 [ 2275.399829] [ 2275.416813] audit: type=1326 audit(1764510276.314:6699): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35939 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f68ebb80a04 code=0x7ffc0000 [ 2275.417101] audit: error in audit_log_subj_ctx [ 2275.425107] audit: type=1326 audit(1764510276.314:6700): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35939 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f68ebb805ff code=0x7ffc0000 [ 2275.439157] audit: type=1326 audit(1764510276.350:6702): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35934 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 13:44:36 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x8000000, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) [ 2275.452297] audit: type=1326 audit(1764510276.352:6703): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35936 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2275.466197] tmpfs: Unknown parameter '' [ 2275.467323] audit: type=1326 audit(1764510276.353:6704): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35936 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2275.480716] audit: type=1326 audit(1764510276.354:6705): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35934 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=80 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 13:44:36 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x0) (fail_nth: 8) [ 2275.526757] audit: type=1326 audit(1764510276.355:6706): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35934 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2275.540415] audit: type=1326 audit(1764510276.356:6707): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35936 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=303 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 13:44:36 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0x30000}], 0x1, 0x0) 13:44:36 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x2a00, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:44:36 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0xa000000, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:44:36 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0x0, 0x4}}, &(0x7f00000001c0), 0x0) 13:44:36 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) r1 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x2, 0x0, 0x0, 0x98008, &(0x7f0000000100)=ANY=[]) unlinkat(r1, &(0x7f0000000200)='./file0\x00', 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) poll(&(0x7f00000001c0)=[{r2, 0x2000}, {r1, 0x2010}, {r0, 0x242}], 0x3, 0x2) r3 = dup2(r1, r0) renameat(r1, &(0x7f00000000c0)='./file0\x00', r3, &(0x7f0000000180)='./file0\x00') fchmodat(r1, &(0x7f0000000040)='./file0\x00', 0x44) futimesat(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f0000000240)=""/153, 0x99) 13:44:36 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x0) (fail_nth: 9) 13:44:36 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0xb000000, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) [ 2275.716848] FAULT_INJECTION: forcing a failure. [ 2275.716848] name failslab, interval 1, probability 0, space 0, times 0 [ 2275.717916] CPU: 1 UID: 0 PID: 36027 Comm: syz-executor.0 Not tainted 6.18.0-rc7-next-20251128 #1 PREEMPT(voluntary) [ 2275.717932] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2275.717940] Call Trace: [ 2275.717944] [ 2275.717949] dump_stack_lvl+0xfa/0x120 [ 2275.717977] should_fail_ex+0x4d7/0x5e0 [ 2275.717996] ? audit_log_d_path+0xdd/0x1d0 [ 2275.718014] should_failslab+0xc2/0x120 [ 2275.718031] __kmalloc_cache_noprof+0x80/0x730 [ 2275.718052] ? get_mm_exe_file+0x27/0x1a0 [ 2275.718068] ? find_held_lock+0x2b/0x80 [ 2275.718084] ? audit_log_d_path+0xdd/0x1d0 [ 2275.718100] audit_log_d_path+0xdd/0x1d0 [ 2275.718117] audit_log_d_path_exe+0x47/0x80 [ 2275.718133] audit_log_task+0x2fe/0x3c0 [ 2275.718146] ? __pfx_audit_log_task+0x10/0x10 [ 2275.718162] audit_seccomp+0x79/0x200 [ 2275.718178] __seccomp_filter+0x9f2/0x1260 [ 2275.718194] ? __pfx___seccomp_filter+0x10/0x10 [ 2275.718210] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 2275.718228] ? ksys_write+0x1a3/0x240 [ 2275.718247] __secure_computing+0x1ac/0x290 [ 2275.718261] syscall_trace_enter+0x8d/0x230 [ 2275.718277] do_syscall_64+0x326/0x420 [ 2275.718291] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2275.718304] RIP: 0033:0x7f68ebbcdb19 [ 2275.718314] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2275.718325] RSP: 002b:00007f68e9143188 EFLAGS: 00000246 ORIG_RAX: 0000000000000059 [ 2275.718337] RAX: ffffffffffffffda RBX: 00007f68ebce0f60 RCX: 00007f68ebbcdb19 [ 2275.718346] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2275.718352] RBP: 00007f68e91431d0 R08: 0000000000000000 R09: 0000000000000000 [ 2275.718360] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2275.718367] R13: 00007ffcc978ab6f R14: 00007f68e9143300 R15: 0000000000022000 [ 2275.718384] 13:44:47 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0x34000}], 0x1, 0x0) 13:44:47 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000005c0)=ANY=[@ANYBLOB="73c4a2c69f66e2e9170000", @ANYRES32=r0, @ANYBLOB="254e1938057907becc68eccd083658474791aeaccdc60b7739041c7295d32d8a44bb79b25c6b3e2f2c3a9a2945b1e6ef188631dbe8a2f26f6456007ee347fc70e6804f6a5471390c020d13421d5e8321f2412a62a1d06551a4fd4f5b83b1d919ff54018b343deba1af11b30ad3bfe6c379b27138379decda63d6c95d05bc84ab2b2fd99e7251898c23b20e20e11acc702a864528dc20aea1c19091e57dee38faf5239f115f0372055d9e0f12e9fee626eb96db877317b3faacea0a56159ad6045a7213cdd7010d6365fa66956d493b430264186e9475f38445889481d9000000000000"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000340)={0x0, @remote, @private=0x589}, 0xc) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000040)) eventfd(0x4727) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x80000, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="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", 0x200) fork() connect$inet(0xffffffffffffffff, &(0x7f0000000380)={0x2, 0x4e22, @private=0xa010101}, 0x10) r2 = fork() ptrace(0x10, r2) ptrace(0x8, r2) wait4(r2, 0x0, 0x20000000, &(0x7f0000000400)) 13:44:47 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0xc000000, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:44:47 executing program 5: ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000140)={0x7, 'veth0_to_bridge\x00', {0x6}, 0x8}) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x500) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f00000000c0)={{0x0, 0x0, 0x10001, 0x2, 0x2}, 0xfffffffffffffff8, 0x2}) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) 13:44:47 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x2c00, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:44:47 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0x0, 0x5}}, &(0x7f00000001c0), 0x0) 13:44:47 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000100)={r2, 0x1, 0x6, @multicast}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000001700)={r2, 0x1, 0x6, @multicast}, 0x10) futimesat(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', 0x0) 13:44:47 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x0) (fail_nth: 10) [ 2286.684694] kauditd_printk_skb: 86 callbacks suppressed [ 2286.684726] audit: type=1326 audit(1764510287.603:6793): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36090 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 13:44:47 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x0) (fail_nth: 11) [ 2286.724866] audit: type=1326 audit(1764510287.604:6794): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36090 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2286.740116] audit: type=1326 audit(1764510287.605:6795): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36090 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f68ebb80a04 code=0x7ffc0000 13:44:47 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0x0, 0x6}}, &(0x7f00000001c0), 0x0) [ 2286.763063] audit: type=1326 audit(1764510287.606:6796): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36090 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f68ebb805ff code=0x7ffc0000 [ 2286.780802] audit: type=1326 audit(1764510287.606:6797): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36090 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=89 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2286.793394] audit: type=1326 audit(1764510287.607:6798): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36090 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=0 compat=0 ip=0x7f68ebb8069c code=0x7ffc0000 [ 2286.795025] mac80211_hwsim hwsim16 wlan1: entered promiscuous mode 13:44:47 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0xd000000, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) [ 2286.806722] audit: type=1326 audit(1764510287.608:6799): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36090 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f68ebb805ff code=0x7ffc0000 [ 2286.824961] audit: type=1326 audit(1764510287.608:6800): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36090 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7f68ebb8072b code=0x7ffc0000 [ 2286.829957] mac80211_hwsim hwsim16 wlan1: left promiscuous mode [ 2286.840438] audit: type=1326 audit(1764510287.609:6801): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36090 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 13:44:47 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0x40000}], 0x1, 0x0) [ 2286.863657] mac80211_hwsim hwsim16 wlan1: entered promiscuous mode 13:44:47 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) r1 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x9, 0x40) ioctl$SNDRV_TIMER_IOCTL_STATUS32(r1, 0x80585414, 0xfffffffffffffffd) [ 2286.874625] mac80211_hwsim hwsim16 wlan1: left promiscuous mode [ 2286.879117] audit: type=1326 audit(1764510287.610:6802): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36091 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 13:44:47 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x2e00, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:44:47 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) 13:44:47 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x0) (fail_nth: 12) 13:44:47 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0xe000000, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) [ 2287.058382] FAULT_INJECTION: forcing a failure. [ 2287.058382] name failslab, interval 1, probability 0, space 0, times 0 [ 2287.059414] CPU: 1 UID: 0 PID: 36211 Comm: syz-executor.0 Not tainted 6.18.0-rc7-next-20251128 #1 PREEMPT(voluntary) [ 2287.059431] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2287.059439] Call Trace: [ 2287.059443] [ 2287.059448] dump_stack_lvl+0xfa/0x120 [ 2287.059476] should_fail_ex+0x4d7/0x5e0 [ 2287.059494] ? audit_log_start.part.0+0x257/0x910 [ 2287.059513] should_failslab+0xc2/0x120 [ 2287.059532] kmem_cache_alloc_noprof+0x80/0x710 [ 2287.059545] ? lock_release+0xc8/0x270 [ 2287.059566] ? lock_is_held_type+0x9e/0x120 [ 2287.059590] ? audit_log_start.part.0+0x257/0x910 [ 2287.059606] audit_log_start.part.0+0x257/0x910 [ 2287.059625] ? __pfx_audit_log_start.part.0+0x10/0x10 [ 2287.059642] ? __bpf_prog_run32+0x9c/0xe0 [ 2287.059657] ? __pfx___bpf_prog_run32+0x10/0x10 [ 2287.059673] ? __pfx_audit_filter+0x10/0x10 [ 2287.059684] ? kmem_cache_free+0x2cd/0x660 [ 2287.059697] ? audit_log_end+0x1f/0x30 [ 2287.059718] audit_log_start+0x63/0x90 [ 2287.059743] audit_seccomp+0x60/0x200 [ 2287.059760] __seccomp_filter+0x9f2/0x1260 [ 2287.059777] ? __pfx___seccomp_filter+0x10/0x10 [ 2287.059794] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 2287.059814] ? ksys_write+0x1a3/0x240 [ 2287.059833] __secure_computing+0x1ac/0x290 [ 2287.059847] syscall_trace_enter+0x8d/0x230 [ 2287.059865] do_syscall_64+0x326/0x420 [ 2287.059879] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2287.059893] RIP: 0033:0x7f68ebb8069c [ 2287.059903] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2287.059915] RSP: 002b:00007f68e9143170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2287.059928] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f68ebb8069c [ 2287.059937] RDX: 000000000000000f RSI: 00007f68e91431e0 RDI: 0000000000000003 [ 2287.059944] RBP: 00007f68e91431d0 R08: 0000000000000000 R09: 0000000000000000 [ 2287.059952] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2287.059959] R13: 00007ffcc978ab6f R14: 00007f68e9143300 R15: 0000000000022000 [ 2287.059978] 13:44:58 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0x0, 0x7}}, &(0x7f00000001c0), 0x0) 13:44:58 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000005c0)=ANY=[@ANYBLOB="7303773eaf66ffe9170000", @ANYRES32=r0, @ANYBLOB="254e1938057907becc68eccd083658474791aeaccdc60b7739041c7295d32d8a44bb79b25c6b3e2f2c3a9a2945b1e6ef188631dbe8a2f26f6456007ee347fc70e6804f6a5471390c020d13421d5e8321f2412a62a1d06551a4fd4f5b83b1d919ff54018b343deba1af11b30ad3bfe6c379b27138379decda63d6c95d05bc84ab2b2fd99e7251898c23b20e20e11acc702a864528dc20aea1c19091e57dee38faf5239f115f0372055d9e0f12e9fee626eb96db877317b3faacea0a56159ad6045a7213cdd7010d6365fa66956d493b430264186e9475f38445889481d9000000000000"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x3, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) close_range(r2, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002b80)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r3, r2) r4 = eventfd2(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r4}}) eventfd(0x4727) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) 13:44:58 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x10000000, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:44:58 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x3000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:44:58 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) readv(r0, &(0x7f0000000300)=[{&(0x7f00000000c0)=""/150, 0x96}, {&(0x7f0000000180)=""/113, 0x71}, {&(0x7f0000000200)=""/237, 0xed}], 0x3) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1, 0x0, 0x401, 0x0, 0xffffffff}, 0x0, 0x8000000}) bind$bt_sco(r1, &(0x7f0000000340), 0x8) 13:44:58 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x200, &(0x7f0000000180)) futimesat(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', 0x0) 13:44:58 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0x80000}], 0x1, 0x0) 13:44:58 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x0) (fail_nth: 13) [ 2297.339989] kauditd_printk_skb: 81 callbacks suppressed [ 2297.340013] audit: type=1326 audit(1764510298.258:6882): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36249 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2297.352393] FAULT_INJECTION: forcing a failure. [ 2297.352393] name failslab, interval 1, probability 0, space 0, times 0 [ 2297.354331] CPU: 1 UID: 0 PID: 36255 Comm: syz-executor.0 Not tainted 6.18.0-rc7-next-20251128 #1 PREEMPT(voluntary) [ 2297.354363] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2297.354376] Call Trace: [ 2297.354385] [ 2297.354394] dump_stack_lvl+0xfa/0x120 [ 2297.354441] should_fail_ex+0x4d7/0x5e0 [ 2297.354476] should_failslab+0xc2/0x120 [ 2297.354509] kmem_cache_alloc_node_noprof+0x87/0x730 [ 2297.354538] ? __alloc_skb+0x159/0x430 [ 2297.354579] ? __alloc_skb+0x159/0x430 [ 2297.354600] __alloc_skb+0x159/0x430 [ 2297.354623] ? __alloc_skb+0x369/0x430 [ 2297.354647] ? __pfx___alloc_skb+0x10/0x10 [ 2297.354673] ? kmem_cache_alloc_noprof+0x49a/0x710 [ 2297.354695] ? lock_is_held_type+0x9e/0x120 [ 2297.354731] ? lockdep_init_map_type+0x4b/0x220 [ 2297.354772] audit_log_start.part.0+0x312/0x910 [ 2297.354810] ? __pfx_audit_log_start.part.0+0x10/0x10 [ 2297.354840] ? __bpf_prog_run32+0x9c/0xe0 [ 2297.354868] ? __pfx___bpf_prog_run32+0x10/0x10 [ 2297.354896] ? __pfx_audit_filter+0x10/0x10 [ 2297.354917] ? kmem_cache_free+0x2cd/0x660 [ 2297.354942] ? audit_log_end+0x1f/0x30 [ 2297.354978] audit_log_start+0x63/0x90 [ 2297.355010] audit_seccomp+0x60/0x200 [ 2297.355043] __seccomp_filter+0x9f2/0x1260 [ 2297.355073] ? __pfx___seccomp_filter+0x10/0x10 [ 2297.355104] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 2297.355140] ? ksys_write+0x1a3/0x240 [ 2297.355174] __secure_computing+0x1ac/0x290 [ 2297.355200] syscall_trace_enter+0x8d/0x230 [ 2297.355231] do_syscall_64+0x326/0x420 [ 2297.355257] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2297.355281] RIP: 0033:0x7f68ebb8069c [ 2297.355299] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2297.355321] RSP: 002b:00007f68e9143170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2297.355344] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f68ebb8069c [ 2297.355360] RDX: 000000000000000f RSI: 00007f68e91431e0 RDI: 0000000000000003 [ 2297.355375] RBP: 00007f68e91431d0 R08: 0000000000000000 R09: 0000000000000000 [ 2297.355389] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2297.355403] R13: 00007ffcc978ab6f R14: 00007f68e9143300 R15: 0000000000022000 [ 2297.355441] [ 2297.360304] audit: type=1326 audit(1764510298.263:6883): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36249 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f68ebb80a04 code=0x7ffc0000 [ 2297.360958] audit: audit_lost=25 audit_rate_limit=0 audit_backlog_limit=64 [ 2297.370729] audit: type=1326 audit(1764510298.271:6884): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36249 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f68ebb805ff code=0x7ffc0000 [ 2297.371379] audit: out of memory in audit_log_start [ 2297.377713] audit: type=1326 audit(1764510298.271:6885): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36249 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=89 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 13:44:58 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0x100100}], 0x1, 0x0) 13:44:58 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0x0, 0x8}}, &(0x7f00000001c0), 0x0) 13:44:58 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x3b63, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:44:58 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x11000000, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) [ 2297.523876] audit: type=1326 audit(1764510298.309:6886): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36251 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2297.543099] audit: type=1326 audit(1764510298.310:6887): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36251 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=303 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2297.562360] audit: type=1326 audit(1764510298.310:6888): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36251 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2297.581692] audit: type=1326 audit(1764510298.311:6889): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36251 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=83 compat=0 ip=0x7f2d0b88fc27 code=0x7ffc0000 13:44:58 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x0) (fail_nth: 14) 13:44:58 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file1\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f00000000c0)="5f342858d716ea", 0x7, 0x5}], 0x820d8, &(0x7f00000001c0)={[{@dots}, {@fat=@nocase}, {@fat=@fmask={'fmask', 0x3d, 0x9}}, {@fat=@nocase}, {@nodots}, {@fat=@codepage={'codepage', 0x3d, '775'}}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@dont_hash}, {@obj_type={'obj_type', 0x3d, '.*^'}}, {@fowner_gt={'fowner>', 0xee00}}, {@smackfshat}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}) futimesat(r0, &(0x7f00000009c0)='./file0\x00', 0x0) [ 2297.768179] FAULT_INJECTION: forcing a failure. [ 2297.768179] name failslab, interval 1, probability 0, space 0, times 0 [ 2297.769982] CPU: 1 UID: 0 PID: 36382 Comm: syz-executor.0 Not tainted 6.18.0-rc7-next-20251128 #1 PREEMPT(voluntary) [ 2297.770012] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2297.770024] Call Trace: [ 2297.770031] [ 2297.770039] dump_stack_lvl+0xfa/0x120 [ 2297.770081] should_fail_ex+0x4d7/0x5e0 [ 2297.770111] should_failslab+0xc2/0x120 [ 2297.770142] kmem_cache_alloc_node_noprof+0x87/0x730 [ 2297.770167] ? __alloc_skb+0x159/0x430 [ 2297.770196] ? __alloc_skb+0x159/0x430 [ 2297.770215] __alloc_skb+0x159/0x430 [ 2297.770235] ? __alloc_skb+0x369/0x430 [ 2297.770256] ? __pfx___alloc_skb+0x10/0x10 [ 2297.770279] ? kmem_cache_alloc_noprof+0x49a/0x710 [ 2297.770299] ? lock_is_held_type+0x9e/0x120 [ 2297.770331] ? lockdep_init_map_type+0x4b/0x220 [ 2297.770367] audit_log_start.part.0+0x312/0x910 [ 2297.770401] ? __pfx_audit_log_start.part.0+0x10/0x10 [ 2297.770428] ? __bpf_prog_run32+0x9c/0xe0 [ 2297.770453] ? __pfx___bpf_prog_run32+0x10/0x10 [ 2297.770478] ? __pfx_audit_filter+0x10/0x10 [ 2297.770496] ? kmem_cache_free+0x2cd/0x660 [ 2297.770518] ? audit_log_end+0x1f/0x30 [ 2297.770551] audit_log_start+0x63/0x90 [ 2297.770586] audit_seccomp+0x60/0x200 [ 2297.770615] __seccomp_filter+0x9f2/0x1260 [ 2297.770641] ? __pfx___seccomp_filter+0x10/0x10 [ 2297.770668] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 2297.770699] ? xfd_validate_state+0x55/0x180 [ 2297.770738] __secure_computing+0x1ac/0x290 [ 2297.770761] syscall_trace_enter+0x8d/0x230 [ 2297.770789] do_syscall_64+0x326/0x420 [ 2297.770812] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2297.770833] RIP: 0033:0x7f68ebb8069c [ 2297.770850] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2297.770870] RSP: 002b:00007f68e9143170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2297.770890] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f68ebb8069c [ 2297.770904] RDX: 000000000000000f RSI: 00007f68e91431e0 RDI: 0000000000000003 [ 2297.770917] RBP: 00007f68e91431d0 R08: 0000000000000000 R09: 0000000000000000 [ 2297.770929] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2297.770941] R13: 00007ffcc978ab6f R14: 00007f68e9143300 R15: 0000000000022000 [ 2297.770971] 13:45:09 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0x400300}], 0x1, 0x0) 13:45:09 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000005c0)=ANY=[@ANYBLOB="73c4bb11795c29c82ef4a4", @ANYRES32=r0, @ANYBLOB="254e1938057907becc68eccd083658474791aeaccdc60b7739041c7295d32d8a44bb79b25c6b3e2f2c3a9a2945b1e6ef188631dbe8a2f26f6456007ee347fc70e6804f6a5471390c020d13421d5e8321f2412a62a1d06551a4fd4f5b83b1d919ff54018b343deba1af11b30ad3bfe6c379b27138379decda63d6c95d05bc84ab2b2fd99e7251898c23b20e20e11acc702a864528dc20aea1c19091e57dee38faf5239f11020072055d9e0f12e9fee6e8db96db877317b3faacea0a56159ad6045a7213cdd7010d6365fa66956d493b430264186e9475f38445889481d9000000000000"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000040)) eventfd(0x4727) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="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", 0x200) fork() r2 = fork() ptrace(0x10, r2) ptrace(0x8, r2) r3 = fork() wait4(r3, 0x0, 0x20000000, &(0x7f00000004c0)) 13:45:09 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x12000000, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:45:09 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0x0, 0xa}}, &(0x7f00000001c0), 0x0) 13:45:09 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x6000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:45:09 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x0) (fail_nth: 15) 13:45:09 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x5, 0x5, 0x0, 0x7ffd0000}, {0x401, 0x9}]}) pread64(r0, &(0x7f0000000040), 0x0, 0xd739) futimesat(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', 0x0) 13:45:09 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x8100) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000180)=ANY=[@ANYBLOB="01400100000000008a0000000a02642f02c0ab9e7701ab7b9751de3588688384c4b8a7d7900c8eb47c1fac42d947afa85aee0df865ded1a1c5fc1628c8ffb486d68c1803d4b5bfbbd0c4fd6cefba86125000c1f910dcdafbd908aa28a546d60a9b65872f7c1458", @ANYRES32=r0, @ANYBLOB="03002000060000a80000000000000000"]) ioctl$SNDRV_TIMER_IOCTL_STATUS32(r1, 0x80585414, &(0x7f0000000100)) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000000)=0x100) 13:45:09 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x14000000, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) [ 2308.728746] kauditd_printk_skb: 68 callbacks suppressed [ 2308.728762] audit: type=1326 audit(1764510309.647:6956): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36406 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2308.737638] audit: audit_lost=27 audit_rate_limit=0 audit_backlog_limit=64 [ 2308.738816] audit: out of memory in audit_log_start 13:45:09 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0x1000000}], 0x1, 0x0) [ 2308.748462] audit: type=1326 audit(1764510309.648:6957): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36406 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f68ebb80a04 code=0x7ffc0000 13:45:09 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f00000001c0)={{0x1, 0x1, 0x6, 0x1, 0x5}, 0xb84f, 0x4}) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000140)={0x6, 0x9c8, 0x101}) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f00000000c0)={{0xffffffffffffffff, 0x3, 0x1, 0x0, 0x6}, 0xfffffffffffffff9, 0xfffffffffffffc01}) read(0xffffffffffffffff, &(0x7f0000000240)=""/56, 0x38) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) [ 2308.767683] audit: type=1326 audit(1764510309.652:6958): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36406 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f68ebb805ff code=0x7ffc0000 [ 2308.781958] audit: type=1326 audit(1764510309.656:6959): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36406 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=89 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2308.791126] audit: type=1326 audit(1764510309.663:6960): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36406 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f68ebb805ff code=0x7ffc0000 [ 2308.805022] audit: type=1326 audit(1764510309.663:6961): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36406 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7f68ebb8072b code=0x7ffc0000 13:45:09 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x633b, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) [ 2308.816239] audit: type=1326 audit(1764510309.663:6962): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36406 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2308.822735] audit: type=1326 audit(1764510309.666:6963): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36406 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 13:45:09 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x0) (fail_nth: 16) 13:45:09 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0x0, 0x10}}, &(0x7f00000001c0), 0x0) 13:45:09 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0x2000000}], 0x1, 0x0) 13:45:09 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)}) shmat(0x0, &(0x7f0000872000/0x9000)=nil, 0x6000) madvise(&(0x7f0000870000/0x4000)=nil, 0x4000, 0x17) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='setgroups\x00') readv(r1, &(0x7f0000000680)=[{&(0x7f0000000180)=""/201, 0xc9}], 0x1) write$P9_RUNLINKAT(r1, 0x0, 0x0) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff}, 0x82800) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000080)={0x0, 0x0, r2, 0x40, 0x80000}) r3 = pkey_alloc(0x0, 0x1) pkey_mprotect(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x9, r3) mbind(&(0x7f0000872000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x3) futimesat(r0, &(0x7f00000009c0)='./file0\x00', 0x0) 13:45:18 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0x0, 0xf2}}, &(0x7f00000001c0), 0x0) 13:45:18 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0x3000000}], 0x1, 0x0) 13:45:18 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000005c0)=ANY=[@ANYBLOB="73c4a2c69f66e2e9170000", @ANYRES32=r0, @ANYBLOB="254e1938057907becc68eccd083658474791aeaccdc60b7739041c7295d32d8a44bb79b25c6b3e2f2c3a9a2945b1e6ef188631dbe8a2f26f6456007ee347fc70e6804f6a5471390c020d13421d5e8321f2412a62a1d06551a4fd4f5b83b1d919ff54018b343deba1af11b30ad3bfe6c379b27138379decda63d6c95d05bc84ab2b2fd99e7251898c23b20e20e11acc702a864528dc20aea1c19091e57dee38faf5239f115f0372055d9e0f12e9fee626eb96db877317b3faacea0a56159ad6045a7213cdd7010d6365fa66956d493b430264186e9475f38445889481d9000000000000"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000040)) eventfd(0x4727) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="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", 0x200) fork() r3 = fork() ptrace(0x10, r3) fork() ptrace(0x4208, r3) clone3(&(0x7f00000007c0)={0x20000000, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000004c0), {0x3a}, &(0x7f0000000500)=""/113, 0x71, &(0x7f00000006c0)=""/244, &(0x7f0000000580)=[0x0, r3], 0x2, {r2}}, 0x58) wait4(r3, 0x0, 0x2, &(0x7f0000000400)) 13:45:18 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x0) (fail_nth: 17) 13:45:18 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x7f, 0x0, 0x0, 0x80000000}, {0x3, 0x2, 0x3f, 0x7}]}) futimesat(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', 0x0) 13:45:18 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1}, 0x2}) 13:45:18 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x16000000, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:45:18 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0xff00, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) [ 2317.318174] kauditd_printk_skb: 34 callbacks suppressed [ 2317.318202] audit: type=1326 audit(1764510318.231:6998): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36546 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 13:45:18 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) futimesat(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x100000001) [ 2317.341733] audit: type=1326 audit(1764510318.231:6999): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36546 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=317 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2317.362812] audit: type=1326 audit(1764510318.232:7000): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36546 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2317.389216] FAULT_INJECTION: forcing a failure. [ 2317.389216] name failslab, interval 1, probability 0, space 0, times 0 [ 2317.390235] CPU: 1 UID: 0 PID: 36561 Comm: syz-executor.0 Not tainted 6.18.0-rc7-next-20251128 #1 PREEMPT(voluntary) [ 2317.390250] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2317.390257] Call Trace: [ 2317.390261] [ 2317.390266] dump_stack_lvl+0xfa/0x120 [ 2317.390292] should_fail_ex+0x4d7/0x5e0 [ 2317.390309] should_failslab+0xc2/0x120 [ 2317.390326] __kmalloc_node_track_caller_noprof+0xd7/0x820 [ 2317.390341] ? lock_acquire+0x15e/0x2d0 [ 2317.390357] ? sidtab_sid2str_get+0x85/0x6f0 [ 2317.390372] ? sidtab_sid2str_get+0x17e/0x6f0 [ 2317.390389] ? kmemdup_noprof+0x2b/0x60 [ 2317.390407] kmemdup_noprof+0x2b/0x60 [ 2317.390424] sidtab_sid2str_get+0x17e/0x6f0 [ 2317.390442] sidtab_entry_to_string+0x33/0x110 [ 2317.390457] security_sid_to_context_core+0x350/0x620 [ 2317.390473] selinux_lsmprop_to_secctx+0xdf/0x1c0 [ 2317.390489] ? __pfx_selinux_lsmprop_to_secctx+0x10/0x10 [ 2317.390505] ? skb_put+0x138/0x1b0 [ 2317.390526] security_lsmprop_to_secctx+0x140/0x190 [ 2317.390542] audit_log_subj_ctx.part.0+0x230/0x3a0 [ 2317.390565] ? __pfx_audit_log_subj_ctx.part.0+0x10/0x10 [ 2317.390587] audit_log_task_context+0xb8/0x100 [ 2317.390603] ? __pfx_audit_log_task_context+0x10/0x10 [ 2317.390618] ? from_kuid+0x8d/0xd0 [ 2317.390636] ? __pfx_audit_log_start.part.0+0x10/0x10 [ 2317.390655] audit_log_task+0x1c9/0x3c0 [ 2317.390667] ? __pfx_audit_log_task+0x10/0x10 [ 2317.390684] audit_seccomp+0x79/0x200 [ 2317.390700] __seccomp_filter+0x9f2/0x1260 [ 2317.390714] ? __pfx___seccomp_filter+0x10/0x10 [ 2317.390730] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 2317.390748] ? ksys_write+0x1a3/0x240 [ 2317.390766] __secure_computing+0x1ac/0x290 [ 2317.390779] syscall_trace_enter+0x8d/0x230 [ 2317.390795] do_syscall_64+0x326/0x420 [ 2317.390809] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2317.390822] RIP: 0033:0x7f68ebb8069c [ 2317.390831] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2317.390843] RSP: 002b:00007f68e9143170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2317.390855] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f68ebb8069c [ 2317.390863] RDX: 000000000000000f RSI: 00007f68e91431e0 RDI: 0000000000000003 [ 2317.390870] RBP: 00007f68e91431d0 R08: 0000000000000000 R09: 0000000000000000 [ 2317.390877] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2317.390883] R13: 00007ffcc978ab6f R14: 00007f68e9143300 R15: 0000000000022000 [ 2317.390901] [ 2317.394888] audit: type=1326 audit(1764510318.232:7001): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36546 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=261 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2317.395190] audit: error in audit_log_subj_ctx [ 2317.398341] audit: type=1326 audit(1764510318.232:7002): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36546 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 13:45:18 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x11000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:45:18 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0x0, 0x300}}, &(0x7f00000001c0), 0x0) 13:45:18 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x18000000, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:45:18 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) futimesat(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', 0x0) 13:45:18 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x0) (fail_nth: 18) [ 2317.527241] audit: type=1326 audit(1764510318.232:7003): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36546 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=83 compat=0 ip=0x7f5a06d51c27 code=0x7ffc0000 13:45:18 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000140)={0x6, 0x9c8, 0x101}) dup(r0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f00000000c0)={{0x2, 0x2, 0x6, 0x3, 0x7}, 0x101, 0x1}) [ 2317.546876] audit: type=1326 audit(1764510318.233:7004): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36546 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2317.559463] audit: type=1326 audit(1764510318.233:7005): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36546 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=317 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 13:45:18 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0x5000000}], 0x1, 0x0) [ 2317.588919] audit: type=1326 audit(1764510318.234:7006): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36546 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 13:45:18 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000005c0)=ANY=[@ANYBLOB="73c4a2c69f66e2e9170000", @ANYRES32=r0, @ANYBLOB="254e1938057907becc68eccd083658474791aeaccdc60b7739041c7295d32d8a44bb79b25c6b3e2f2c3a9a2945b1e6ef188631dbe8a2f26f6456007ee347fc70e6804f6a5471390c020d13421d5e8321f2412a62a1d06551a4fd4f5b83b1d919ff54018b343deba1af11b30ad3bfe6c379b27138379decda63d6c95d05bc84ab2b2fd99e7251898c23b20e20e11acc702a864528dc20aea1c19091e57dee38faf5239f115f0372055d9e0f12e9fee626eb96db877317b3faacea0a56159ad6045a7213cdd7010d6365fa66956d493b430264186e9475f38445889481d9000000000000"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000040)) eventfd(0x4727) ioctl$KDMKTONE(r0, 0x4b30, 0x6) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="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", 0x200) fork() r2 = fork() ptrace(0x10, r2) ptrace(0x8, r2) wait4(r2, 0x0, 0x20000000, &(0x7f0000000400)) ptrace$peeksig(0x4209, 0x0, &(0x7f0000000340)={0x2, 0x0, 0xa}, &(0x7f00000006c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}]) 13:45:18 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) futimesat(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', 0x0) setxattr$security_evm(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080), &(0x7f00000000c0)=@sha1={0x1, "0f0a437ed823fe98c67253007c429f22d8ef9acc"}, 0x15, 0x3) 13:45:27 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x1a000000, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:45:27 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0x0, 0x500}}, &(0x7f00000001c0), 0x0) 13:45:27 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000005c0)=ANY=[@ANYBLOB="73c4a2c69f66e2e9170000", @ANYRES32=r0, @ANYBLOB="254e1938057907becc68eccd083658474791aeaccdc60b7739041c7295d32d8a44bb79b25c6b3e2f2c3a9a2945b1e6ef188631dbe8a2f26f64560076e347fc70e6804f6a5471390c020d13421d5e8321f2412a62a1d06551a4fd4f5b83b1d919ff54018b343deba1af11b30ad3bfe6c379b27138379decda63d6c95d05bc84ab2b2fd99e7251898c23b20e20e11acc702a864528dc20aea1c19091e57dee38faf5239f115f0372055d9e0f12e9fee626eb96db877317b3faacea0a56159ad6045a7213cdd7010d6365fa66956d493b430264186e9475f38445889481d9000000000000"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000040)) eventfd(0x4727) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="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", 0x200) fork() r2 = fork() ptrace(0x10, r2) ptrace(0x8, r2) wait4(r2, 0x0, 0x20000000, &(0x7f0000000400)) 13:45:27 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f00000000c0)={0x7, 0x5, 0x2, 0x0, 0xe}) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1, 0x3, 0xfffffffc, 0x0, 0x98a}, 0x0, 0xe8}) 13:45:27 executing program 1: prctl$PR_SET_SECUREBITS(0x1c, 0x8) prctl$PR_SET_SECUREBITS(0x1c, 0x11) syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x81400, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) futimesat(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', 0x0) 13:45:27 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x30000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:45:27 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0x8000000}], 0x1, 0x0) 13:45:27 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x0) (fail_nth: 19) [ 2326.333409] kauditd_printk_skb: 70 callbacks suppressed [ 2326.333438] audit: type=1326 audit(1764510327.252:7077): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36806 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2326.339821] FAULT_INJECTION: forcing a failure. [ 2326.339821] name failslab, interval 1, probability 0, space 0, times 0 [ 2326.340876] CPU: 1 UID: 0 PID: 36811 Comm: syz-executor.0 Not tainted 6.18.0-rc7-next-20251128 #1 PREEMPT(voluntary) [ 2326.340892] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2326.340899] Call Trace: [ 2326.340903] [ 2326.340908] dump_stack_lvl+0xfa/0x120 [ 2326.340934] should_fail_ex+0x4d7/0x5e0 [ 2326.340951] ? audit_log_d_path+0xdd/0x1d0 [ 2326.340969] should_failslab+0xc2/0x120 [ 2326.340986] __kmalloc_cache_noprof+0x80/0x730 [ 2326.341006] ? get_mm_exe_file+0x27/0x1a0 [ 2326.341021] ? find_held_lock+0x2b/0x80 [ 2326.341037] ? audit_log_d_path+0xdd/0x1d0 [ 2326.341053] audit_log_d_path+0xdd/0x1d0 [ 2326.341070] audit_log_d_path_exe+0x47/0x80 [ 2326.341087] audit_log_task+0x2fe/0x3c0 [ 2326.341099] ? __pfx_audit_log_task+0x10/0x10 [ 2326.341116] audit_seccomp+0x79/0x200 [ 2326.341131] __seccomp_filter+0x9f2/0x1260 [ 2326.341146] ? __pfx___seccomp_filter+0x10/0x10 [ 2326.341161] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 2326.341180] ? ksys_write+0x1a3/0x240 [ 2326.341198] __secure_computing+0x1ac/0x290 [ 2326.341211] syscall_trace_enter+0x8d/0x230 [ 2326.341227] do_syscall_64+0x326/0x420 [ 2326.341241] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2326.341254] RIP: 0033:0x7f68ebb8069c [ 2326.341263] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2326.341274] RSP: 002b:00007f68e9143170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2326.341286] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f68ebb8069c [ 2326.341293] RDX: 000000000000000f RSI: 00007f68e91431e0 RDI: 0000000000000003 [ 2326.341300] RBP: 00007f68e91431d0 R08: 0000000000000000 R09: 0000000000000000 [ 2326.341307] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2326.341314] R13: 00007ffcc978ab6f R14: 00007f68e9143300 R15: 0000000000022000 [ 2326.341330] [ 2326.367616] audit: type=1326 audit(1764510327.257:7078): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36806 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f68ebb80a04 code=0x7ffc0000 [ 2326.388440] audit: type=1326 audit(1764510327.257:7079): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36806 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f68ebb805ff code=0x7ffc0000 [ 2326.396842] audit: type=1326 audit(1764510327.258:7080): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36806 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=89 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 13:45:27 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x0) (fail_nth: 20) [ 2326.406931] audit: type=1326 audit(1764510327.259:7081): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36806 comm="syz-executor.0" exe="" sig=0 arch=c000003e syscall=0 compat=0 ip=0x7f68ebb8069c code=0x7ffc0000 [ 2326.416282] audit: type=1326 audit(1764510327.280:7082): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36806 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f68ebb805ff code=0x7ffc0000 [ 2326.426686] audit: type=1326 audit(1764510327.280:7083): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36806 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7f68ebb8072b code=0x7ffc0000 [ 2326.432920] audit: type=1326 audit(1764510327.280:7084): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36806 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2326.441960] audit: type=1326 audit(1764510327.302:7085): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36809 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2326.454543] audit: type=1326 audit(1764510327.303:7086): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36809 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=261 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 13:45:27 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x34000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:45:27 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x1c000000, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) [ 2326.488442] FAULT_INJECTION: forcing a failure. [ 2326.488442] name failslab, interval 1, probability 0, space 0, times 0 [ 2326.489448] CPU: 1 UID: 0 PID: 36881 Comm: syz-executor.0 Not tainted 6.18.0-rc7-next-20251128 #1 PREEMPT(voluntary) [ 2326.489464] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2326.489471] Call Trace: [ 2326.489475] [ 2326.489483] dump_stack_lvl+0xfa/0x120 [ 2326.489509] should_fail_ex+0x4d7/0x5e0 [ 2326.489526] ? audit_log_d_path+0xdd/0x1d0 [ 2326.489544] should_failslab+0xc2/0x120 [ 2326.489561] __kmalloc_cache_noprof+0x80/0x730 [ 2326.489581] ? get_mm_exe_file+0x27/0x1a0 [ 2326.489596] ? find_held_lock+0x2b/0x80 [ 2326.489612] ? audit_log_d_path+0xdd/0x1d0 [ 2326.489627] audit_log_d_path+0xdd/0x1d0 [ 2326.489645] audit_log_d_path_exe+0x47/0x80 [ 2326.489662] audit_log_task+0x2fe/0x3c0 [ 2326.489674] ? __pfx_audit_log_task+0x10/0x10 [ 2326.489690] audit_seccomp+0x79/0x200 [ 2326.489706] __seccomp_filter+0x9f2/0x1260 [ 2326.489721] ? __pfx___seccomp_filter+0x10/0x10 [ 2326.489736] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 2326.489758] __secure_computing+0x1ac/0x290 [ 2326.489771] syscall_trace_enter+0x8d/0x230 [ 2326.489787] do_syscall_64+0x326/0x420 [ 2326.489801] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2326.489813] RIP: 0033:0x7f68ebb8069c [ 2326.489823] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2326.489834] RSP: 002b:00007f68e9143170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2326.489846] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f68ebb8069c [ 2326.489854] RDX: 000000000000000f RSI: 00007f68e91431e0 RDI: 0000000000000003 [ 2326.489860] RBP: 00007f68e91431d0 R08: 0000000000000000 R09: 0000000000000000 [ 2326.489867] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2326.489873] R13: 00007ffcc978ab6f R14: 00007f68e9143300 R15: 0000000000022000 [ 2326.489890] 13:45:27 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) futimesat(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', 0x0) r1 = accept4$unix(0xffffffffffffffff, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e, 0x0) fcntl$dupfd(r0, 0x0, r1) socketpair(0xa, 0x800, 0x8001, &(0x7f0000000180)={0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f00000001c0), 0x0, 0x40000) 13:45:27 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0x0, 0x600}}, &(0x7f00000001c0), 0x0) 13:45:27 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0xa000000}], 0x1, 0x0) 13:45:36 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x0) (fail_nth: 21) 13:45:36 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0xb000000}], 0x1, 0x0) 13:45:36 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x40000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:45:36 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0x0, 0x700}}, &(0x7f00000001c0), 0x0) 13:45:36 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f0000000740)=ANY=[@ANYBLOB="5f57a363b84bd06857e8803255aa7c07a3a3f2d519f6440e78058c4ee1780ad219edd620c8424ab43c73622053e7696e856fe14e2f843bee8ac611dc64bb393b81049710a4d5b60feb49d60b39bda74867dc4eee9a36c1f0dc16b2211b0e1dc74abb91947b02e9cb5e42d2edc14fad662665d6882d7984ff6d9edf660bfbaea73979", @ANYRES32=r0, @ANYBLOB="254e1938057907becc68eccd083658474791aeaccdc60b7739041c7295d32d8a44bb79b25c6b3e2f2c3a9a2945b1e6ef188631dbe8a2f26f6456007ee347fc70e6804f6a5471390c020d13421d5e8321f2412a62a1d06551a4fd4f5b83b1d919ff54018b343deba1af11b30ad3bfe6c379b27138379decda63d6c95d05bc84ab2b2fd99e7251898c23b20e20e11acc702a864528dc20aea1c19091e57dee38faf5239f115f0372055d9e0f12e9fee626eb96db877317b3faacea0a56159ad6045a7213cdd7010d6365fa66956d493b430264186e9475f38445889481d9000000000000"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = eventfd(0x4727) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="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", 0x200) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000c80), 0xcc44fc3fc7cc2942, 0x0) poll(&(0x7f0000000cc0)=[{r3, 0x400}, {r2, 0x4}, {0xffffffffffffffff, 0x81}, {}, {0xffffffffffffffff, 0x4611}, {r4, 0x2}, {r0, 0x4000}, {r1, 0x8}], 0x8, 0x8) r5 = fork() ptrace(0x10, r5) ptrace(0x8, r5) ioctl$TIOCGETD(r3, 0x5424, &(0x7f0000000340)) wait4(r5, 0x0, 0xa0000002, &(0x7f00000004c0)) 13:45:36 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r1 = accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14, 0x80000) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"/1227], 0x4cb) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1, 0x0, 0x0, 0x2}, 0x0, 0xa38}) 13:45:36 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x1e000000, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:45:36 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10000, 0x0) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x8, 0x0, 0x7ffcfffc}]}) setuid(0x0) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000004a80)=[{{&(0x7f0000000140), 0x6e, &(0x7f00000006c0)=[{&(0x7f0000000a00)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/135, 0x87}, {&(0x7f0000000380)=""/56, 0x38}, {&(0x7f0000001a00)=""/4096, 0x1000}, {&(0x7f00000003c0)=""/5, 0x5}, {&(0x7f0000000400)=""/243, 0xf3}, {&(0x7f0000000500)=""/160, 0xa0}, {&(0x7f00000005c0)=""/40, 0x28}, {&(0x7f0000000600)=""/129, 0x81}, {&(0x7f0000002a00)=""/4096, 0x1000}], 0xa}}, {{&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000003bc0)=[{&(0x7f0000000800)=""/191, 0xbf}, {&(0x7f00000008c0)=""/182, 0xb6}, {&(0x7f0000000980)=""/40, 0x28}, {&(0x7f0000003a00)=""/29, 0x1d}, {&(0x7f0000003a40)=""/211, 0xd3}, {&(0x7f0000003b40)=""/79, 0x4f}], 0x6, &(0x7f0000003c40)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x28}}, {{&(0x7f0000003c80)=@abs, 0x6e, &(0x7f00000040c0)=[{&(0x7f0000003d00)=""/191, 0xbf}, {&(0x7f0000003dc0)=""/181, 0xb5}, {&(0x7f0000003e80)=""/134, 0x86}, {&(0x7f0000003f40)=""/109, 0x6d}, {&(0x7f0000003fc0)=""/225, 0xe1}], 0x5, &(0x7f0000004140)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}}, {{0x0, 0x0, &(0x7f0000004400)=[{&(0x7f0000004240)=""/184, 0xb8}, {&(0x7f0000004300)=""/218, 0xda}], 0x2, &(0x7f0000004440)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000004480)=@abs, 0x6e, &(0x7f0000004600)=[{&(0x7f0000004500)=""/37, 0x25}, {&(0x7f0000004540)=""/16, 0x10}, {&(0x7f0000004580)=""/126, 0x7e}], 0x3, &(0x7f0000004640)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x148}}, {{&(0x7f00000047c0), 0x6e, &(0x7f00000049c0)=[{&(0x7f0000004840)=""/29, 0x1d}, {&(0x7f0000004880)=""/143, 0x8f}, {&(0x7f0000004940)=""/86, 0x56}], 0x3, &(0x7f0000004a00)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x50}}], 0x6, 0x4000, &(0x7f0000004c00)={0x0, 0x989680}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) syz_mount_image$tmpfs(&(0x7f00000005c0), &(0x7f0000000600)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@mpol={'mpol', 0x3d, {'interleave', '=relative', @val={0x3a, [0x30]}}}}, {@gid={'gid', 0x3d, r3}}]}) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) syz_mount_image$tmpfs(&(0x7f00000005c0), &(0x7f0000000600)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@mpol={'mpol', 0x3d, {'interleave', '=relative', @val={0x3a, [0x30]}}}}, {@gid={'gid', 0x3d, r5}}]}) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) syz_mount_image$tmpfs(&(0x7f00000005c0), &(0x7f0000000600)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@mpol={'mpol', 0x3d, {'interleave', '=relative', @val={0x3a, [0x30]}}}}, {@gid={'gid', 0x3d, r7}}]}) statx(0xffffffffffffffff, &(0x7f0000004c40)='./file0\x00', 0x7000, 0x20, &(0x7f0000004c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) syz_mount_image$tmpfs(&(0x7f00000005c0), &(0x7f0000000600)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@mpol={'mpol', 0x3d, {'interleave', '=relative', @val={0x3a, [0x30]}}}}, {@gid={'gid', 0x3d, r10}}]}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000004d80)={{}, {}, [{0x2, 0x1, 0xee01}, {0x2, 0x3}, {}, {0x2, 0x2, r1}], {0x4, 0x6}, [{0x8, 0x1, r3}, {0x8, 0x2}, {0x8, 0x2}, {0x8, 0x4, r5}, {0x8, 0x6, r7}, {0x8, 0x6, 0xee00}, {0x8, 0x1, r8}, {0x8, 0x2, r10}, {0x8, 0x5, 0xffffffffffffffff}, {0x8, 0x2, 0xee01}], {0x10, 0x4}}, 0x94, 0x2) futimesat(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', 0x0) pread64(r0, &(0x7f0000000280)=""/253, 0xfd, 0x100000000) [ 2335.198295] kauditd_printk_skb: 57 callbacks suppressed [ 2335.198311] audit: type=1326 audit(1764510336.117:7144): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36953 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2335.207962] FAULT_INJECTION: forcing a failure. [ 2335.207962] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2335.209045] CPU: 1 UID: 0 PID: 36960 Comm: syz-executor.0 Not tainted 6.18.0-rc7-next-20251128 #1 PREEMPT(voluntary) [ 2335.209063] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2335.209070] Call Trace: [ 2335.209075] [ 2335.209081] dump_stack_lvl+0xfa/0x120 [ 2335.209108] should_fail_ex+0x4d7/0x5e0 [ 2335.209127] _copy_to_user+0x32/0xd0 [ 2335.209145] simple_read_from_buffer+0xe0/0x180 [ 2335.209164] proc_fail_nth_read+0x18a/0x240 [ 2335.209186] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 2335.209207] ? security_file_permission+0x22/0x90 [ 2335.209227] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 2335.209248] vfs_read+0x1eb/0xc70 [ 2335.209265] ? __pfx___mutex_lock+0x10/0x10 [ 2335.209277] ? __fget_files+0x34/0x3b0 [ 2335.209294] ? __pfx_vfs_read+0x10/0x10 [ 2335.209310] ? lock_release+0xc8/0x270 [ 2335.209331] ? __fget_files+0x20d/0x3b0 [ 2335.209354] ksys_read+0x121/0x240 [ 2335.209370] ? __pfx_ksys_read+0x10/0x10 [ 2335.209386] ? __secure_computing+0x18d/0x290 [ 2335.209405] do_syscall_64+0xbf/0x420 [ 2335.209419] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2335.209433] RIP: 0033:0x7f68ebb8069c [ 2335.209444] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2335.209456] RSP: 002b:00007f68e9143170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2335.209469] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f68ebb8069c [ 2335.209478] RDX: 000000000000000f RSI: 00007f68e91431e0 RDI: 0000000000000003 [ 2335.209485] RBP: 00007f68e91431d0 R08: 0000000000000000 R09: 0000000000000000 [ 2335.209493] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2335.209500] R13: 00007ffcc978ab6f R14: 00007f68e9143300 R15: 0000000000022000 [ 2335.209519] [ 2335.227675] audit: type=1326 audit(1764510336.120:7145): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36953 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2335.238729] audit: type=1326 audit(1764510336.120:7146): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36953 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f68ebb80a04 code=0x7ffc0000 [ 2335.250022] audit: type=1326 audit(1764510336.125:7147): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36953 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f68ebb805ff code=0x7ffc0000 [ 2335.256361] audit: type=1326 audit(1764510336.125:7148): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36953 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=89 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2335.268355] audit: type=1326 audit(1764510336.127:7149): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36953 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=0 compat=0 ip=0x7f68ebb8069c code=0x7ffc0000 13:45:36 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x0) 13:45:36 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x2a000000, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) [ 2335.279258] audit: type=1326 audit(1764510336.144:7150): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36953 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f68ebb805ff code=0x7ffc0000 [ 2335.293256] audit: type=1326 audit(1764510336.153:7151): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36953 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f68ebb805ff code=0x7ffc0000 [ 2335.298962] audit: type=1326 audit(1764510336.154:7152): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36953 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=231 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2335.308685] audit: type=1326 audit(1764510336.166:7153): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36952 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2335.317402] tmpfs: Invalid gid '0x00000000ffffffff' [ 2335.336837] tmpfs: Invalid gid '0x00000000ffffffff' 13:45:36 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0xc000000}], 0x1, 0x0) [ 2335.356349] tmpfs: Invalid gid '0x00000000ffffffff' 13:45:36 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x80000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) [ 2335.378272] tmpfs: Invalid gid '0x00000000ffffffff' 13:45:36 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0x0, 0xa00}}, &(0x7f00000001c0), 0x0) [ 2335.430023] tmpfs: Invalid gid '0x00000000ffffffff' [ 2335.440662] tmpfs: Invalid gid '0x00000000ffffffff' [ 2335.448026] tmpfs: Invalid gid '0x00000000ffffffff' 13:45:36 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$FITRIM(r1, 0xc0185879, &(0x7f00000000c0)={0xfffffffffffffff8, 0x1ff, 0x7f}) [ 2335.466673] tmpfs: Invalid gid '0x00000000ffffffff' 13:45:36 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x2) 13:45:45 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x100100, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:45:45 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f0000000700)=ANY=[@ANYBLOB="73c4a2c69f43d2e9170000", @ANYRES32=r0, @ANYBLOB="254e19efda87e1d23d123d32f3d138057907becc68eccd083658474791aeaccdc60b7739041c7295d32d8a44bb79b25c6b3e2f2c3a9a2945b1e6ef188631dbe8a2f26f6456007ee347fc92e6804f6a5471390c020d13421d5e8321f2412a62a1d06551a4fd4f5b83b1d919ff54098b343deba1af11b30ad3bfe6c379b27138379decda63d6c95d05bc84ab2b2fd99e7251898c23b20e20e11acc702a864528dc20aea1c19091e57dee38faf5239f115f0372055d9e0f12e9fee626eb96db877317b3faacea0a56159ad6045a7213cdd7010d7065fa66956d493b430264186e9475f38445889481d900000000000037cf232a2b74"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000340)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000040)) ioctl$NS_GET_OWNER_UID(r0, 0xb704, &(0x7f0000000380)=0x0) setuid(r2) eventfd(0x4727) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="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", 0x200) fork() r3 = fork() ptrace(0x10, r3) ptrace(0x8, r3) wait4(0x0, 0x0, 0x80000000, &(0x7f0000000400)) 13:45:45 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0xd000000}], 0x1, 0x0) 13:45:45 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$FIOCLEX(r1, 0x5451) 13:45:45 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x2c000000, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:45:45 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0x0, 0x2000}}, &(0x7f00000001c0), 0x0) 13:45:45 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mount$9p_rdma(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x44800, &(0x7f0000000640)={'trans=rdma,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@sq={'sq', 0x3d, 0x1f}}, {@sq={'sq', 0x3d, 0x1}}, {@rq={'rq', 0x3d, 0x101}}, {@sq={'sq', 0x3d, 0x3ff}}, {@sq={'sq', 0x3d, 0x3f}}, {@timeout}], [{@dont_hash}, {@dont_measure}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsname={'fsname', 0x3d, '@'}}, {@fsname={'fsname', 0x3d, '@)\\-'}}, {@uid_gt={'uid>', r0}}, {@uid_gt={'uid>', 0xee01}}, {@smackfshat={'smackfshat', 0x3d, '\'&-'}}, {@audit}]}}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) futimesat(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', 0x0) 13:45:45 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x3) [ 2344.174168] kauditd_printk_skb: 78 callbacks suppressed [ 2344.174182] audit: type=1326 audit(1764510345.093:7232): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37107 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2344.183393] audit: type=1326 audit(1764510345.096:7233): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37107 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=303 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2344.196664] audit: type=1326 audit(1764510345.096:7234): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37107 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2344.204800] audit: type=1326 audit(1764510345.096:7235): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37107 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=83 compat=0 ip=0x7f2d0b88fc27 code=0x7ffc0000 [ 2344.216651] audit: type=1326 audit(1764510345.096:7236): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37107 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=165 compat=0 ip=0x7f2d0b89204a code=0x7ffc0000 [ 2344.226493] audit: type=1326 audit(1764510345.101:7237): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37107 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f2d0b843a04 code=0x7ffc0000 [ 2344.234705] audit: type=1326 audit(1764510345.102:7238): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37107 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2344.244646] audit: type=1326 audit(1764510345.105:7239): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37107 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2344.250676] audit: type=1326 audit(1764510345.106:7240): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37107 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=259 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 13:45:45 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x2e000000, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:45:45 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0x0, 0x4000}}, &(0x7f00000001c0), 0x0) [ 2344.264647] audit: type=1326 audit(1764510345.107:7241): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37107 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 13:45:45 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x400300, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:45:45 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x4) 13:45:45 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0xe000000}], 0x1, 0x0) 13:45:45 executing program 5: r0 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000140)={0xed33, 0x3ee8, 0x7, 0x5, 0x4}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) ioctl$BTRFS_IOC_WAIT_SYNC(r1, 0x40089416, &(0x7f00000001c0)) signalfd(r0, &(0x7f0000000100)={[0x3]}, 0x8) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r2, 0x40345410, &(0x7f0000000040)={{0x1}}) 13:45:45 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x401, 0x3c, 0x0, 0x800, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[]) unlinkat(r1, &(0x7f0000000200)='./file0\x00', 0x0) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x2) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x1f, 0x7ffcfffc}]}) openat(r0, &(0x7f0000000040)='./file0\x00', 0xd9d24909e3396a5c, 0x28) futimesat(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', 0x0) 13:45:45 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0x0, 0xf2ff}}, &(0x7f00000001c0), 0x0) [ 2344.470888] tmpfs: Unknown parameter '' 13:45:56 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x1000000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:45:56 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0x10000000}], 0x1, 0x0) 13:45:56 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x30000000, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:45:56 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0x0, 0xfff2}}, &(0x7f00000001c0), 0x0) 13:45:56 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0xbf1, 0x1, 0x9, 0x5}, {0xfffa, 0x80, 0x4, 0x9}, {0x3ff, 0x2, 0x1, 0x1}]}) futimesat(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='setgroups\x00') readv(r0, &(0x7f0000000680)=[{&(0x7f0000000180)=""/201, 0xc9}], 0x1) write$P9_RUNLINKAT(r0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0), r0) 13:45:56 executing program 5: ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) renameat(r0, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r2, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f00000000c0)={{0x1, 0x0, 0xff0, 0x0, 0x7}, 0x81, 0x3}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000200)={0x5, 0x4, 0xffff8000, 0x0, 0x1}) 13:45:56 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000005c0)=ANY=[@ANYBLOB="73c4a2c69f66e2e9170000", @ANYRES32=r0, @ANYBLOB="254e1938057907becc68eccd083658474791aeaccdc60b7739041c7295d32d8a44bb79b25c6b3e2f2c3a9a2945b1e6ef188631dbe8a2f26f6456007ee347fc70e6804f6a5471390c020d13421d5e8321f2412a62a1d06551a4fd4f5b83b1d919ff54018b343deba1af11b30ad3bfe6c379b27138379decda63d6c95d05bc84ab2b2fd99e7251898c23b20e20e11acc702a864528dc20aea1c19091e57dee38faf5239f115f0372055d9e0f12e9fee626eb96db877317b3faacea0a56159ad6045a7213cdd7010d6365fa66956d493b430264186e9475f38445889481d9000000000000"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000040)) eventfd(0x4727) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="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", 0x200) fork() write$P9_RUNLINKAT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xab, 0x8, 0x3, 0x81, 0x0, 0x4, 0x3020b, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0xffff, 0x1, @perf_bp={&(0x7f0000000340), 0x1}, 0x110a, 0x2, 0x7, 0x1, 0x2, 0x1, 0x2, 0x0, 0xf61, 0x0, 0x66c8}, 0x0, 0xf, 0xffffffffffffffff, 0x2) r2 = fork() ptrace(0x10, r2) ptrace(0x8, r2) wait4(r2, 0x0, 0x20000000, &(0x7f0000000400)) 13:45:56 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x5) [ 2355.487500] kauditd_printk_skb: 56 callbacks suppressed [ 2355.487522] audit: type=1326 audit(1764510356.404:7298): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37258 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2355.514526] audit: type=1326 audit(1764510356.412:7299): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37258 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=303 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2355.530809] audit: type=1326 audit(1764510356.413:7300): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37258 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2355.553210] audit: type=1326 audit(1764510356.419:7301): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37262 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 13:45:56 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0x11000000}], 0x1, 0x0) [ 2355.579723] audit: type=1326 audit(1764510356.421:7303): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37258 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=83 compat=0 ip=0x7f2d0b88fc27 code=0x7ffc0000 13:45:56 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x60000000, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:45:56 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000140)={0x6, 0x9c8, 0x101}) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) [ 2355.597893] audit: type=1326 audit(1764510356.420:7302): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37262 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=317 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2355.619080] audit: type=1326 audit(1764510356.421:7304): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37258 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=165 compat=0 ip=0x7f2d0b89204a code=0x7ffc0000 13:45:56 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x6) [ 2355.636495] audit: type=1326 audit(1764510356.422:7305): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37262 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2355.654464] audit: type=1326 audit(1764510356.423:7307): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37262 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 13:45:56 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x2000000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) [ 2355.677845] audit: type=1326 audit(1764510356.425:7308): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37262 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=261 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 13:45:56 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@reiserfs_3={0xc, 0x3, {0xffff8001, 0x9, 0x4}}, &(0x7f00000000c0), 0x1000) futimesat(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', 0x0) 13:45:56 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0x0, 0x80000}}, &(0x7f00000001c0), 0x0) 13:45:56 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0x12000000}], 0x1, 0x0) 13:46:05 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_STATUS32(0xffffffffffffffff, 0x80585414, &(0x7f00000000c0)) 13:46:05 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0x0, 0x1000000}}, &(0x7f00000001c0), 0x0) 13:46:05 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0xc000, 0x1) 13:46:05 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0x14000000}], 0x1, 0x0) 13:46:05 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000006c0)=""/4097, 0x1001) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000005c0)=ANY=[@ANYBLOB="73c4a2c69f66e2e9170000", @ANYRES32=r0, @ANYBLOB="254e1938057907becc68eccd083658474791aeaccdc60b7739041c7295d32d8a44bb79b25c6b3e2f2c3a9a2945b1e6ef188631dbe8a2f26f6456007ee347fc70e6804f6a5471390c020d13421d5e8321f2412a62a1d06551a4fd4f5b83b1d919ff54018b343deba1af11b30ad3bfe6c379b27138379decda63d6c95d05bc84ab2b2fd99e7251898c23b20e20e11acc702a864528dc20aea1c19091e57dee38faf5239f115f0372055d9e0f12e9fee626eb96db877317b36276e8fffaacea0a56159ad6045a7213cdd7010d6365fa66956d493b430264186e9475f38445889481d90000"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000040)) eventfd(0x4727) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="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", 0x200) fork() r2 = fork() ptrace(0x10, r2) ptrace(0x8, 0x0) wait4(0x0, 0x0, 0x8, &(0x7f00000004c0)) ptrace(0x8, r2) wait4(r2, 0x0, 0x20000000, &(0x7f0000000400)) 13:46:05 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x3000000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:46:05 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0xe7c60000, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:46:05 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x7) [ 2365.055080] kauditd_printk_skb: 59 callbacks suppressed [ 2365.055106] audit: type=1326 audit(1764510365.974:7367): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37410 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2365.101220] audit: type=1326 audit(1764510365.974:7368): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37410 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=303 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 13:46:06 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x8) [ 2365.125872] audit: type=1326 audit(1764510365.975:7369): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37410 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2365.152911] audit: type=1326 audit(1764510365.975:7370): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37410 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=83 compat=0 ip=0x7f2d0b88fc27 code=0x7ffc0000 [ 2365.176760] audit: type=1326 audit(1764510365.975:7371): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37410 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=165 compat=0 ip=0x7f2d0b89204a code=0x7ffc0000 [ 2365.202038] audit: type=1326 audit(1764510365.977:7372): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37410 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f2d0b843a04 code=0x7ffc0000 [ 2365.220487] audit: type=1326 audit(1764510365.977:7373): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37410 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2365.238131] audit: type=1326 audit(1764510365.978:7374): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37410 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=259 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 13:46:06 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0xa) [ 2365.253300] audit: type=1326 audit(1764510365.979:7375): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37410 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2365.271895] audit: type=1326 audit(1764510365.980:7376): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37410 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 13:46:06 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x5000000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:46:06 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0xeffdffff, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:46:06 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0x0, 0x2000000}}, &(0x7f00000001c0), 0x0) 13:46:06 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0x16000000}], 0x1, 0x0) 13:46:06 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) futimesat(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1}, 0x0, 0x2000}) r1 = syz_open_dev$vcsa(&(0x7f00000000c0), 0x1000, 0x40000) fcntl$setstatus(r1, 0x4, 0x44000) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) mkdirat(r2, &(0x7f0000000240)='./file0\x00', 0x40) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000140)={0x6, 0x9c8, 0x101}) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x8, 0x9, 0x7037, 0x1, 0x401, 0x2}) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0x8) 13:46:06 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40345410, &(0x7f0000000040)={{0x1, 0x0, 0x0, 0x0, 0x2be}, 0x0, 0x2}) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r2, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000140)={0x6, 0x9c8, 0x101}) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, &(0x7f0000000240)={{0x2, 0x3, 0xfc8, 0x2, 0x8}, 0x3, 0x80, 'id1\x00', 'timer1\x00', 0x0, 0x40, 0x100000001, 0x7, 0x7}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000140)={0x6, 0x9c8, 0x101}) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x4, 0x1, 0xb}, 0x100, 0x7}) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r1, 0xc038943b, &(0x7f0000000200)={0xffffffff, 0x8, '\x00', 0x1, &(0x7f00000001c0)=[0x0]}) 13:46:06 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x10) 13:46:06 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0xfdffffff, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:46:14 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000005c0)=ANY=[@ANYBLOB="73c4a2c69f66e2e9170000", @ANYRES32=r0, @ANYBLOB="254e1938057907becc68eccd083658474791aeaccdc60b7739041c7295d32d8a44bb79b25c6b3e2f2c3a9a2945b1e6ef188631dbe8a2f26f6456007ee347fc70e6804f6a5471390c020d13421d5e8321f2412a62a1d06551a4fd4f5b83b1d919ff54018b343deba1af11b30ad3bfe6c379b27138379decda63d6c95d05bc84ab2b2fd99e7251898c23b20e20e11acc702a864528dc20aea1c19091e57dee38faf5239f115f0372055d9e0f12e9fee626eb96db877317b3faacea0a56159ad6045a7213cdd7010d6365fa66956d493b430264186e9475f38445889481d9000000000000"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000040)) eventfd(0x4727) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="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", 0x200) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000140)={0x6, 0x9c8, 0x101}) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f00000023c0)={0x0, "0ee7530f5da0615cfa6a47598eab9e45"}) fork() r2 = fork() ptrace(0x10, r2) ptrace(0x8, r2) wait4(r2, 0x0, 0x20000000, &(0x7f0000000400)) 13:46:14 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0x0, 0x3000000}}, &(0x7f00000001c0), 0x0) 13:46:14 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x2e8541) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) 13:46:14 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0xfeffffff, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:46:14 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000080)={0x7, &(0x7f0000000040)=[{0x0, 0x5b, 0x6, 0x10000}, {0xb1b4, 0x18, 0x0, 0x7fffffff}, {0xe46b, 0x0, 0x5, 0x7}, {0x5, 0x2, 0x5, 0x3}, {0xfe00, 0x9, 0x3, 0x5}, {0x1800, 0xf4, 0xc0, 0x7ff}, {0x9, 0x2, 0x7, 0x5}]}) futimesat(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', 0x0) 13:46:14 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0x18000000}], 0x1, 0x0) 13:46:14 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x300) 13:46:14 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x8000000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) [ 2373.793813] kauditd_printk_skb: 73 callbacks suppressed [ 2373.793828] audit: type=1326 audit(1764510374.712:7450): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37575 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2373.805850] audit: type=1326 audit(1764510374.717:7451): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37575 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=317 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2373.815047] audit: type=1326 audit(1764510374.718:7452): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37575 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 13:46:14 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0x1a000000}], 0x1, 0x0) [ 2373.830055] audit: type=1326 audit(1764510374.721:7453): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37575 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=261 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2373.839295] audit: type=1326 audit(1764510374.721:7454): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37575 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2373.851698] audit: type=1326 audit(1764510374.722:7455): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37575 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=83 compat=0 ip=0x7f5a06d51c27 code=0x7ffc0000 [ 2373.860284] audit: type=1326 audit(1764510374.722:7456): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37575 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2373.867228] audit: type=1326 audit(1764510374.731:7457): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37575 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=317 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2373.878352] audit: type=1326 audit(1764510374.751:7458): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37580 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2373.888487] audit: type=1326 audit(1764510374.755:7459): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37580 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=89 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 13:46:14 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0xff000000, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:46:14 executing program 1: ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000180)) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x6, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}, {0xb, 0x7e, 0x0, 0x1}, {0xedc6, 0x6, 0x1}, {0x1, 0x20, 0x1, 0x1}, {0x800, 0x81, 0x3, 0x3}, {0x8000, 0x8, 0x4, 0x4}]}) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x1a8) mount_setattr(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000080)={0x0, 0x3a, 0xe0000}, 0x20) futimesat(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', 0x0) fstat(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) newfstatat(0xffffffffffffff9c, &(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x4000) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0x5) setuid(r5) syz_mount_image$tmpfs(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000240)="9c41981470b929b761ff0b90efb843dc86977a833655b217f114dca66c30ca71fec96dc778c5fff5e3b5ec40e7c9f9439e29", 0x32, 0x3}, {&(0x7f0000000280)="4b453a94e51588c25b4c682c49b7403ab52933cd63f8359289a4f29dcea43a7c717790b8bb12d9895a7ab51173123441ac28691862e9c4c371ee2182c11b324229c0cfb4451e57d336c1bcdb0c82e73964f0940ce6027a623cc27c48e3622d0aba39432747a707d748698d6d892c114defed57708cdc835959126d7eb5c504522dc849", 0x83, 0x2}, {&(0x7f0000000340)="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", 0xfd, 0x101}], 0x412000, &(0x7f0000000600)={[{@huge_advise}, {@huge_within_size}, {@huge_never}, {@gid={'gid', 0x3d, r2}}, {@size={'size', 0x3d, [0x39, 0x0, 0x70]}}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x37]}}], [{@euid_eq={'euid', 0x3d, r3}}, {@subj_type}, {@subj_type}, {@smackfsfloor={'smackfsfloor', 0x3d, 'g/+,-(#'}}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, r5}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+\'-(.%($'}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, '\\/[\xa8[-'}}]}) fcntl$setstatus(r0, 0x4, 0x40000) 13:46:14 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x500) 13:46:14 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x2d}}, './file0\x00'}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000100)={0x4, 0x1ff, 0xfffffffd, 0x0, 0xe}) 13:46:14 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0x1c000000}], 0x1, 0x0) 13:46:14 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0x0, 0x4000000}}, &(0x7f00000001c0), 0x0) 13:46:14 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600)={0x0, 0x0}, &(0x7f0000000640)=0xc) syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0xd06, 0x6, &(0x7f0000000540)=[{&(0x7f0000000180)="45aad9d0bc1f2cb2caa901d7fb57c5e47482b072a445255b3170c049622a616e6855b2a7ef006d9f7ce4c26f7b289268233c27f306d723cdacb7103b1549d2536bf91d67d83d49dfc76438a17cdcba0b2d81c81059594cde5d0630989536af33e24dd00e2a12", 0x66, 0xda90e20}, {&(0x7f0000000200)="1f7a214363a91b6d520735ec49e40cf24b024ee742c3f626cc4a43ea366b66c23019581314ac40a089fd1404bb166a15185d0ca8157d968062eba860437a3d19df9e9231abe7146751064c9d1d6094046c08dff8dbba75aa95e97ca366733e22729005bcb0a7e75e1d728346cdd82ff21c2f50c8280f682521dc3ace278617960dedeb7d9b73f59147a1b280cc31ce8d60c515ae23ea1b4c32a3569242dc518c16f8e25e1fed7f9a5ea9a7ecee2dcfb0686b2b203dcdd87b35fb951d0603d226affc7c947998c9be57ff02bf6be57ce60f18db6b059d4fe593123ecdacd99adc093aabaa7f3ab975211e642c3f1a", 0xee, 0x1}, {&(0x7f0000000300)="47237b7224a5a61bf3e9e00caa57c296f1a101664d1914aa08ad6f92ee45ba6006850c91feef571c6fdf01dc062a64998ce0549f176a9dd713870691ca01022beb655733cf80c062d52634037bd55f5748abc48fd0b21e96c152c72224f98a6ac4821cb82f9fe1404be43e60e99687b5c9ed2e4778353d6111ccc463e7e2716ede2eb8d4e548", 0x86, 0x2}, {&(0x7f00000003c0)="bc5d2022ed926bde94742f7c5e7175106c16526b01da72ce2ec9d35959285c35d13d8cb596a0478b31741380e1bcdb1785d21b606d16f0bda75979ba3dbfeadbc524e10e6fb731eb805a388f3be842fda65df4bed398c4d5a1caffbc0c24898a31921810cd16f50885121f44b5daf7cad732056276f81abbf2248f0206dd4f6a9427d6f7086cde9c85130e71a691d00c17f6", 0x92, 0x40}, {&(0x7f0000000100)="e630a0766a1113671816c121dad043c2158c46d91a4f0a2bfdc582d07bd276cb59dc9860ea16df60311cfeec697eb4a2afa5345e15fbd5", 0x37, 0xffffffffffffff7f}, {&(0x7f0000000480)="3c730a85ce15f7bdcbb8080114abd38c4d3325a3ad8dae821431197ee49b00912a24d878942312f7db43bc90fcb27081a57c8ca10f53dd820d95f2ae58d18d0e1bf1a321f8807ea3714e778f2fc3ce4061392137ef46e8229f1343aefe70968611e7798cbf6c3138d3f05dbd95d74b95ea8e8812eb2e4902eba986597297f0467d2666dd719bee3c60851991067057608222d2ad744dde4ab323a837e5d69f353d983816b757cc630c1ee409e9c1d4f86d32fd8d37", 0xb5, 0x7}], 0x4000, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0x3}}, {@huge_always}], [{@uid_gt={'uid>', r1}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)}) futimesat(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', 0x0) mkdirat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x4) 13:46:14 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000007c0)=ANY=[@ANYBLOB="73c4a2c69f66e2e9170000107ee6fedbc8b8b3ec6aa8fe21ce4e130c8d96006b2720ed034f1867870653885d9876ed33fa8d99f1605d04", @ANYRES32=r0, @ANYBLOB="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"/387]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000040)) eventfd(0x4727) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="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", 0x200) fork() getsockname$inet6(r2, &(0x7f0000000340)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000380)=0x1c) r3 = fork() ptrace(0x10, r3) ptrace(0x8, r3) r4 = getpgrp(r3) wait4(r4, 0x0, 0x1000000, &(0x7f0000000400)) 13:46:14 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x600) [ 2374.066542] loop1: detected capacity change from 0 to 264192 [ 2374.071935] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 13:46:14 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0xa000000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:46:14 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0x1e000000}], 0x1, 0x0) [ 2374.101217] loop1: detected capacity change from 0 to 264192 [ 2374.106787] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 13:46:15 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f00000000c0)={{0x1, 0x1, 0x7fffffff, 0x0, 0xfffffffe}, 0x9, 0x9}) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) 13:46:23 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000005c0)=ANY=[@ANYBLOB="73c4a2c49f66e2e9170000", @ANYRES32=r0, @ANYBLOB="254e1938057907becc68eccd083658474791aeaccdc60b7739041c7295d32d8a44bb79b25c6b3e2f2c3a9a2945b1e6ef188631dbe8a2f26f6456007ee347fc70e6804f6a5471390c020d13421d5e8321f2412a62a1d06551a4fd4f5b83b1d919ff54018b343deba1af11b30ad3bfe6c379b27138379decda63d6c95d05bc84ab2b2fd99e7251898c23b20e20e11acc702a864528dc20aea1c19091e57dee38faf5239f115f0372055d9e0f12e9fee626eb96db877317b3faacea0a56159ad6045a7213cdd7010d6365fa66956d493b430264186e9475f38445889481d9000000000000"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x8}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000040)) eventfd(0x4727) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="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", 0x200) fork() r2 = fork() ptrace(0x10, r2) ptrace(0x8, r2) wait4(r2, 0x0, 0x20000000, &(0x7f0000000400)) 13:46:23 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r1 = ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) ioctl$BTRFS_IOC_FS_INFO(r1, 0x8400941f, &(0x7f00000000c0)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x100) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r2, 0x40345410, &(0x7f0000000040)={{0x1, 0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000140)={0x6, 0x9c8, 0x101}) r3 = fcntl$dupfd(r0, 0x0, r0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f00000004c0)={r3, 0xffffffffffffeb12, 0x1000, 0xff}) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) 13:46:23 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0xffff0000, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:46:23 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x700) 13:46:23 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0x0, 0x5000000}}, &(0x7f00000001c0), 0x0) 13:46:23 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000880)={{{@in=@multicast1, @in6=@ipv4={""/10, ""/2, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000200)=0xe8) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0xf6, 0x1, &(0x7f0000000300)=[{&(0x7f0000001a00)="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", 0x1000, 0x1}], 0x8a08c0, &(0x7f0000000340)={[{@mpol={'mpol', 0x3d, {'local', '=relative', @val={0x3a, [0x3a, 0x2d, 0x35]}}}}], [{@hash}, {@fowner_lt={'fowner<', r0}}]}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0x5) setuid(r3) r5 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x1}, 0x0, 0x0, r5) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0x5) setuid(r7) keyctl$chown(0x4, r5, r7, r4) r8 = creat(&(0x7f0000000240)='./file0\x00', 0x15) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000180)=[{&(0x7f0000000100)="7dc95cb6f858301bb38d2a394f07461a8fd6b348831cbcaf8798bc", 0x1b, 0x1}, {&(0x7f0000000a00)="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", 0x1000, 0xfffffffffffffff9}], 0x21000, &(0x7f0000000800)=ANY=[@ANYBLOB="6e6f6e756d7461696c3d302c757466383d312c7375626a5f755261723db6dc7379f49ed52fcf6b8e56643e", @ANYRESDEC=r3, @ANYBLOB=',smackfsroot=,\x00']) syz_open_dev$usbmon(&(0x7f0000000700), 0xfff, 0x20240) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) sendmsg$nl_xfrm(r8, &(0x7f00000007c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000000}, 0x5, &(0x7f0000000780)={&(0x7f0000000480)=@report={0x0, 0x20, 0x1, 0x70bd26, 0x25dfdbfe, {0x2b, {@in=@loopback, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e22, 0x0, 0x4e21, 0x1f, 0x2, 0xa0, 0xa0, 0x33}}, [@XFRMA_IF_ID, @algo_auth_trunc={0x0, 0x14, {{'poly1305-simd\x00'}, 0x0, 0x60, "e55672425600d3eb04b8ba55a38bb34f519f3492afcfc14127333f2028165030e5beb6b3ccdddce1773784c87e8abbf07289a2005df36c993d75329d195e41340ade1ffad0627b7d628af1f03e2d7bdd6fd955ce7f6f6d8cae0b9bd6b2ffab5165df7c4f9e538cfb"}}, @offload={0x0, 0x1c, {r1, 0x2}}]}, 0x2dc}, 0x1, 0x0, 0x0, 0x40010}, 0x2000a000) futimesat(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', 0x0) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'system.', '}\x00'}) 13:46:23 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0x2a000000}], 0x1, 0x0) 13:46:23 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0xb000000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) [ 2382.570018] kauditd_printk_skb: 34 callbacks suppressed [ 2382.570033] audit: type=1326 audit(1764510383.489:7494): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37838 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2382.580476] audit: type=1326 audit(1764510383.494:7495): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37838 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=89 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2382.589167] audit: type=1326 audit(1764510383.495:7496): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37838 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2382.600957] audit: type=1326 audit(1764510383.495:7497): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37838 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=317 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2382.609387] loop1: detected capacity change from 0 to 8 [ 2382.612471] audit: type=1326 audit(1764510383.498:7498): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37839 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 13:46:23 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0xa00) [ 2382.624115] audit: type=1326 audit(1764510383.499:7499): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37838 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2382.636196] audit: type=1326 audit(1764510383.499:7500): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37839 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=303 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2382.650786] audit: type=1326 audit(1764510383.499:7501): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37839 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2382.660891] audit: type=1326 audit(1764510383.505:7502): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37839 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=83 compat=0 ip=0x7f2d0b88fc27 code=0x7ffc0000 [ 2382.670781] audit: type=1326 audit(1764510383.505:7503): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37839 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=165 compat=0 ip=0x7f2d0b89204a code=0x7ffc0000 13:46:31 executing program 5: mount(&(0x7f00000001c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='adfs\x00', 0x202000, &(0x7f0000000280)='{^\x00') openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4400) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000000c0), 0x115703, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000100)={0x0, 0x40, 0x7, 0x0, 0xf}) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) write$binfmt_elf64(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x8, 0x2, 0x7, 0x8, 0xfffffffffffffff9, 0x2, 0x3, 0xcd6, 0x36e, 0x40, 0x1f9, 0x8, 0x2, 0x38, 0x1, 0xfffc, 0xf9bc, 0x4}, [{0x0, 0x0, 0x0, 0x0, 0x7, 0x12, 0x7f, 0x10001}, {0x5, 0x6, 0xffffffffffff0001, 0x58, 0x4494, 0x8, 0x100000000, 0x4}], "5927f98559f67673c77583728e637fe6c4611c99d4c6d268eccacd9f1be548412beae4cf99fb7f8e7eb6c909add8c650b55c8206266a619956a0ae98d2affee722e12c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x6f3) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000140)={0x6, 0x9c8, 0x101}) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f00000002c0)) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40345410, &(0x7f0000000040)={{0x1, 0x2}, 0x9}) 13:46:31 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0x2c000000}], 0x1, 0x0) 13:46:31 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0x0, 0x6000000}}, &(0x7f00000001c0), 0x0) 13:46:31 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x2000) 13:46:31 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0xfffffdef, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:46:31 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) futimesat(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', 0x0) 13:46:31 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0xc000000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:46:31 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000005c0)=ANY=[@ANYBLOB="73c4a2c69f66e2e9170000", @ANYRES32=r0, @ANYBLOB="254e1938057907becc68eccd083658474791aeaccdc60b7739041c7295d32d8a44bb79b25c6b3e2f2c3a9a2945b1e6ef188631dbe8a2f26f6456007ee347fc70e6804f6a5471390c020d13421d5e8321f2412a62a1d06551a4fd4f5b83b1d919ff54018b343deba1af11b30ad3bfe6c379b27138379decda63d6c95d05bc84ab2b2fd99e7251898c23b20e20e11acc702a864528dc20aea1c19091e57dee38faf5239f115f0372055d9e0f12e9fee626eb96db877317b3faacea0a56159ad6045a7213cdd7010d6365fa66956d493b430264186e9475f38445889481d9000000000000"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000040)) eventfd(0x4727) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) ioctl$INCFS_IOC_PERMIT_FILL(0xffffffffffffffff, 0x40046721, &(0x7f0000000000)) creat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="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", 0x200) fork() r2 = fork() ptrace(0x10, r2) ptrace(0x8, 0x0) waitid(0x0, r2, &(0x7f0000000340), 0x1000000, &(0x7f00000004c0)) ptrace(0x8, r2) wait4(r2, 0x0, 0x20000000, &(0x7f0000000400)) [ 2391.013977] kauditd_printk_skb: 11 callbacks suppressed [ 2391.013993] audit: type=1326 audit(1764510391.932:7515): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37975 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2391.026897] audit: type=1326 audit(1764510391.939:7516): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37975 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=303 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2391.035110] audit: type=1326 audit(1764510391.939:7517): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37975 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2391.045449] audit: type=1326 audit(1764510391.940:7518): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37975 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=83 compat=0 ip=0x7f2d0b88fc27 code=0x7ffc0000 [ 2391.056465] audit: type=1326 audit(1764510391.940:7519): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37975 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=165 compat=0 ip=0x7f2d0b89204a code=0x7ffc0000 13:46:31 executing program 5: r0 = fsmount(0xffffffffffffffff, 0x0, 0x78) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/module/nfsv4', 0x141040, 0x46) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r1, 0x408c5333, &(0x7f0000000140)={0x5, 0x9, 0x0, 'queue1\x00', 0x8}) inotify_add_watch(r0, &(0x7f00000000c0)='./file0\x00', 0x20000080) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r2, 0x40345410, &(0x7f0000000040)={{0x1}}) [ 2391.069675] audit: type=1326 audit(1764510391.944:7520): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37975 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f2d0b843a04 code=0x7ffc0000 [ 2391.079506] audit: type=1326 audit(1764510391.948:7521): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37975 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 13:46:32 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0x0, 0x7000000}}, &(0x7f00000001c0), 0x0) [ 2391.091654] audit: type=1326 audit(1764510391.951:7522): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37975 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=259 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2391.109130] audit: type=1326 audit(1764510391.954:7523): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37975 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2391.123913] audit: type=1326 audit(1764510391.963:7524): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37974 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 13:46:32 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0xd000000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:46:32 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0xfffffffd, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:46:32 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0x2e000000}], 0x1, 0x0) 13:46:32 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='blkio.bfq.io_service_bytes_recursive\x00', 0x0, 0x0) mknodat$loop(r0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) futimesat(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', 0x0) 13:46:32 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x4000) 13:46:32 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x20000) 13:46:32 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0x0, 0x8000000}}, &(0x7f00000001c0), 0x0) 13:46:32 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0x30000000}], 0x1, 0x0) 13:46:32 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x80000) 13:46:32 executing program 5: openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000140)={0x6, 0x9c8, 0x101}) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f00000000c0)={{0x2, 0x0, 0x5, 0x3}, 0x7fffffff, 0xfffffffffffffffe}) 13:46:32 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0xe000000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:46:41 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0xfffffffe, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:46:41 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x200000) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000100)={0x4, 0x6, 0x8f2, 0x0, 0x4}) 13:46:41 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) futimesat(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', 0x0) fchmodat(r0, &(0x7f0000000080)='./file0\x00', 0x10) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1, {0x80}}, './file0\x00'}) write$P9_RREADDIR(r2, &(0x7f00000000c0)={0x2a, 0x29, 0x1, {0xffffedfe, [{{0x0, 0x2, 0x8}, 0x7ff, 0x3, 0x7, './file0'}]}}, 0x2a) 13:46:41 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0x0, 0xa000000}}, &(0x7f00000001c0), 0x0) 13:46:41 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x10000000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:46:41 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x1000000) 13:46:41 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0x60000000}], 0x1, 0x0) 13:46:41 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000005c0)=ANY=[@ANYBLOB="73c4a2c69f66e2e9170000", @ANYRES32=r0, @ANYBLOB="254e1938057907becc68eccd083658474791aeaccdc60b7739041c7295d32d8a44bb79b25c6b3e2f2c3a9a2945b1e6ef188631dbe8a2f26f6456007ee347fc70e6804f6a5471390c020d13421d5e8321f2412a62a1d06551a4fd4f5b83b1d919ff54018b343deba1af11b30ad3bfe6c379b27138379decda63d6c95d05bc84ab2b2fd99e7251898c23b20e20e11acc702a864528dc20aea1c19091e57dee38faf5239f115f0372055d9e0f12e9fee626eb96db877317b3faacea0a56159ad6045a7213cdd7010d6365fa66956d493b430264186e9475f38445889481d9000000000000"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x8}, 0x0, 0x80000000000000, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000040)) eventfd(0x4727) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="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", 0x200) fork() r2 = fork() ptrace(0x10, r2) ptrace(0x8, r2) wait4(r2, 0x0, 0x20000000, &(0x7f0000000400)) [ 2400.293484] kauditd_printk_skb: 58 callbacks suppressed [ 2400.293498] audit: type=1326 audit(1764510401.212:7583): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38141 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2400.302370] audit: type=1326 audit(1764510401.217:7584): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38141 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=89 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2400.311664] audit: type=1326 audit(1764510401.217:7585): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38141 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2400.320700] audit: type=1326 audit(1764510401.219:7586): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38141 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=317 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2400.328213] audit: type=1326 audit(1764510401.219:7587): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38141 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2400.346847] audit: type=1326 audit(1764510401.264:7588): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38143 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2400.355179] audit: type=1326 audit(1764510401.264:7589): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38143 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2400.368444] audit: type=1326 audit(1764510401.265:7590): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38149 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2400.375177] audit: type=1326 audit(1764510401.266:7591): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38149 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=261 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2400.382406] audit: type=1326 audit(1764510401.266:7592): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38149 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 13:46:49 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x2000000) 13:46:49 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x2, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:46:49 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0xdfc00000}], 0x1, 0x0) 13:46:49 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='setgroups\x00') readv(r1, &(0x7f0000000680)=[{&(0x7f0000000180)=""/201, 0xc9}], 0x1) write$P9_RUNLINKAT(r1, 0x0, 0x0) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r2, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000140)={0x6, 0x9c8, 0x101}) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) mknodat$loop(r0, &(0x7f0000000780)='./file0\x00', 0x800, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0x5) setuid(r4) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000300)='./file0\x00', 0x5, 0x5, &(0x7f00000005c0)=[{&(0x7f0000000340)="027ab0ff971c5bb8777ccb92b775ea6c97d15325d26c23de4969951a8e280f5bbff94d45de134e0857e2ec77695333be73a1ce5a77ff0e4e6550490d1fb8fda481b75e17b5f3af95d71170c915eb0c3d8e94f144d37f9cbdd7869be00624", 0x5e, 0xfffffffffffffffc}, {&(0x7f00000003c0)="e3657d9acd1637584420bcfd5fcb1c0228e20b3c6958cbec32b8214029ce06669a3536ec0dd32775d367e51d7d41f80a0c14ebeff2c5c7c55b2f703a61a91f589c90ac351de81e7b503c2f0ae53d6b934eaa3a", 0x53, 0xffffffff}, {&(0x7f0000000440)="775b67f5fc79d26c9ec583a393d633260c27509172a619cd58bafa68bb67843c3547b750ec8e3f3f80f18393c6371dbe6df39d674f448b17f4b2608de7aa9d6d82a067d71f09a760f212556893d8f1d334", 0x51, 0x1000}, {&(0x7f0000001a00)="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", 0x1000, 0x4}, {&(0x7f00000004c0)="aa2efff6842d8e7526d21afbf762696851af5c157b92de0ff343e82c11777618b791ab8cc1a60fd621e8c5db4bd0ec71a22e03f0869d7b7c2ed28e78928422312b3c722c01c2ea67db0644ade3f1f4a404eb4fbe0c6f49a42c344a8232a04de9079001df49fccea7e295155b4f9c32c4e09ad94516ca3b568389f92b0de058c62b738342054c0fc6504df20e66b14b31696a85d2a9f11f3bc1f6e1f904e81b0712ac554bd6acb7692d3d21a2274c8f68cfd0ffc2f8afcbccfe00abb68638e8837efde7b981347b471eeb5a70849cee80c4e0d6417b208cc5d47177bc9df15990065d", 0xe2, 0x101}], 0xca0, &(0x7f0000000740)=ANY=[@ANYBLOB='jcfmt=vfsv0,hash,uid<', @ANYRESDEC=r5, @ANYBLOB=',fsname=-{$|,audit,\x00']) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x800004, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[], [{@smackfshat={'smackfshat', 0x3d, '}\',:*D&+][A&'}}, {@euid_lt={'euid<', r4}}, {@smackfshat={'smackfshat', 0x3d, '-{{'}}, {@audit}, {@fowner_eq={'fowner', 0x3d, r6}}, {@context={'context', 0x3d, 'staff_u'}}, {@subj_type}, {@audit}]}}) futimesat(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', 0x0) 13:46:49 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x59, 0x1, 0x9}, 0x3877, 0x12664c36, 'id0\x00', 'timer1\x00', 0x0, 0x1, 0x80, 0x0, 0x8}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='setgroups\x00') readv(r1, &(0x7f0000000680)=[{&(0x7f0000000180)=""/201, 0xc9}], 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) lseek(r2, 0x2d, 0x3) write$P9_RUNLINKAT(r1, 0x0, 0x0) r3 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r3, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r3, 0x40505412, &(0x7f0000000140)={0x6, 0x9c8, 0x101}) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r3, 0xf501, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000280)=ANY=[@ANYBLOB="01f6ffff00000000980008005dbae3ad4c10d52477d2eb3c58e8c8b54315b59aea14b5ba195f59492cde96c2f6948843edb60100010019ca47ff726adf8afec628f428c6363dadb07918426c79e228ad869dbc8383314cd6bb41fdeba88f05fd64a6436407f115", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) 13:46:49 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0x0, 0x10000000}}, &(0x7f00000001c0), 0x0) 13:46:49 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x11000000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:46:49 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000005c0)=ANY=[@ANYBLOB="73c4a2c69f66e2e9170000", @ANYRES32=r0, @ANYBLOB="254e1938057907becc68eccd083658474791aeaccdc60b7739041c7295d32d8a44bb79025c6b3e2f2c3a9a2945b1e6ef188631dbe8a2f26f6456007ee347fc70e6804f6a5471390c020d13421d5e8321f2412a62a1d06551a4fd4f5b83b1d919ff54018b343deba1af11b30ad3bfe6c379b27138379decda63d6c95d05bc84ab2b2fd99e7251898c23b20e20e11acc702a864528dc20aea1c19091e57dee38faf5239f115f0372055d9e0f12e9fee626eb96db877317b3faacea0a56159ad6045a7213cdd7010d6365fa66956d493b430264186e9475f38445889481d9000000000000"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000040)) eventfd(0x4727) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="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", 0x200) fork() r2 = fork() ptrace(0x10, r2) ptrace(0x8, r2) wait4(r2, 0x0, 0x20000000, &(0x7f0000000400)) [ 2408.650973] kauditd_printk_skb: 21 callbacks suppressed [ 2408.650988] audit: type=1326 audit(1764510409.570:7614): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38278 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 13:46:49 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(0xffffffffffffffff, 0x40345410, &(0x7f0000000040)={{0x1, 0x2, 0x0, 0xfffffffffffffffe}, 0x4}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000140)={0x6, 0x9c8, 0x101}) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f00000003c0)=0x1) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1, 0x3, 0x0, 0x3, 0x8}, 0x0, 0x2}) readv(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)=""/78, 0x4e}, {&(0x7f0000000140)=""/223, 0xdf}, {&(0x7f0000000240)=""/17, 0x11}], 0x3) r2 = fsmount(0xffffffffffffffff, 0x1, 0x80) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r2, 0x40485404, &(0x7f0000000400)={{0x0, 0x1, 0xedac, 0x3, 0xfffffff9}, 0x80000000, 0x2}) r3 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r3, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r3, 0x40505412, &(0x7f0000000140)={0x6, 0x9c8, 0x7}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r3, 0x40505412, &(0x7f0000000340)={0x4, 0x401, 0x81, 0x0, 0xf}) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f00000002c0)={{0x1, 0x2, 0x8, 0x0, 0x4}, 0xffffffffffffff21, 0x3}) [ 2408.667466] audit: type=1326 audit(1764510409.575:7615): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38278 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f5a06d05a04 code=0x7ffc0000 13:46:49 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x12000000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) [ 2408.681782] audit: type=1326 audit(1764510409.575:7616): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38278 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2408.692827] audit: type=1326 audit(1764510409.579:7617): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38270 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2408.700883] audit: type=1326 audit(1764510409.582:7618): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38270 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2408.712114] audit: type=1326 audit(1764510409.583:7619): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38275 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2408.720842] audit: type=1326 audit(1764510409.584:7620): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38275 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 13:46:49 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x3, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) [ 2408.731418] audit: type=1326 audit(1764510409.585:7621): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38278 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=19 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2408.742121] audit: type=1326 audit(1764510409.586:7622): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38278 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2408.750667] audit: type=1326 audit(1764510409.586:7623): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38278 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 13:46:49 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0x0, 0x20000000}}, &(0x7f00000001c0), 0x0) 13:46:49 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x3000000) 13:46:49 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0xeffdffff}], 0x1, 0x0) [ 2408.806983] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 13:46:49 executing program 3: r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000340), 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x24, r0, 0x400, 0x70bd2a, 0x25dfdbfe, {{}, {}, {0x8, 0x2, 0x400}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4004}, 0x4040040) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000580)='/sys/kernel/rcu_normal', 0x80, 0x70) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f00000005c0)=ANY=[@ANYBLOB="73c4a2c69f66e2e9170000", @ANYRES32=r1, @ANYBLOB="254e1938057907becc68eccd083658474791aeaccdc60b7739041c7295d32d8a44bb79b25c6b3e2f2c3a9a2945b1e6ef188631dbe8a2f26f6456007ee347fc70e6804f6a5471390c020d13421d5e8321f2412a62a1d06551a4fd4f5b83b1d919ff54018b343deba1af11b30ad3bfe6c379b27138379decda63d6c95d05bc84ab2b2fd99e7251898c23b20e20e11acc702a864528dc20aea1c19091e57dee38faf5239f115f0372055d9e0f12e9fee626eb96db877317b3faacea0a56159ad6045a7213cdd7010d6365fa66956d493b430264186e9475f38445889481d9000000000000"]) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r3, 0x1, 0x11, 0x0, &(0x7f0000000040)) eventfd(0x4727) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="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", 0x200) write(r2, &(0x7f00000006c0)="3db9e0ff837ed16b556891297bd6957112cb69790a705e828bac5d94b2137c92d39d2b2541e26f943b26c64bebfafa51fbeb0f011de295eadcebced561d7c0e89fe4750fde6c970b952ab0600125436dfe29fa5146c714f75a7e3418d70696c90d2a8fcc26304c5a04786b7893ff1807238e725bc8a4250b9aeaf7bdf0c6dfd042431cdc6ce872334e282fc67c2009ebc633b0fb6ecc16880fd4284e10d92ee15a32fc5b2721a4740e82425c8ff5e4cbb68e6c7da42c1ca103e598f69c43326ee1a4c6522953ba8ec79c8b2b1b7251b6ae6589f7479bc69886", 0xd9) fork() r4 = fork() ptrace(0x10, r4) ptrace(0x8, r4) wait4(r4, 0x0, 0x20000000, &(0x7f0000000400)) 13:46:49 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0xfdffffff}], 0x1, 0x0) 13:46:49 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x5, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:46:49 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)={0x1c, r1, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_FLUSH_PMKSA(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="000002000000"], 0x14}, 0x1, 0x0, 0x0, 0x14}, 0x4000) r3 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r3, 0x40345410, &(0x7f0000000040)={{0x1}, 0x0, 0xffffffffffffffff}) 13:46:49 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x14000000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:46:49 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000280)='./file0\x00', 0x401, 0x0, 0x0, 0x8, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[]) unlinkat(r0, &(0x7f0000000200)='./file0\x00', 0x0) move_mount(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00', 0x11) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x3, &(0x7f0000000100)=[{0x6, 0x0, 0x4, 0x7ffcfffc}, {0x1, 0x9, 0x1f, 0x4}, {0x9, 0x80, 0xf2, 0x101}]}) futimesat(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', 0x0) r1 = signalfd(r0, &(0x7f00000000c0)={[0x800003]}, 0x8) lsetxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000240)=@v2={0x2000000, [{0xe25, 0x7}, {0x2, 0x6}]}, 0x14, 0x2) lseek(r1, 0x1, 0x0) 13:46:49 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0xfeffffff}], 0x1, 0x0) 13:46:49 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x4000000) [ 2409.055258] tmpfs: Unknown parameter '' 13:46:49 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1, 0x2, 0x4}, 0x4000000004}) 13:46:50 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0x0, 0x40000000}}, &(0x7f00000001c0), 0x0) 13:46:50 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x200, &(0x7f0000000180)) futimesat(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', 0x0) 13:46:50 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000140)={0x6, 0x9c8, 0x101}) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f00000000c0)={{0x0, 0x3, 0x80000001, 0x1, 0x9}, 0x80, 0x1f}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x7ff) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) 13:46:59 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0xff000000}], 0x1, 0x0) 13:46:59 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000005c0)=ANY=[@ANYBLOB="73c4a2c69f66e2e9170000", @ANYRES32=r0, @ANYBLOB="254e1938057907becc68eccd083658474791aeaccdc60b7739041c7295d32d8a44bf79b25c6b3e2f2c3a9a2945b10000000000000005f26f6456007ee347fc70e6804f6a5471390c020d13421d5e8321f2412a62a1d06551a4fd4f5b83b1d919ff54018b343deba1af11b30ad3bfe6c379b27138379decda63d6c95d05bc84ab2b2fd99e7251898c23b20e20e11acc702a864528dc20aea1c19091e57dee38faf5239f115f0372055d9e0f12e9fee626eb96db877317b3faacea0a56159ad6045a7213cdd7010d6365fa66956d493b430264186e9475f38445889481d9000000000000"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000040)) eventfd(0x4727) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="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", 0x200) fork() r2 = fork() ptrace(0x10, r2) ptrace(0x8, r2) wait4(r2, 0x0, 0x20000000, &(0x7f0000000400)) 13:46:59 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0x0, 0x8cffffff}}, &(0x7f00000001c0), 0x0) 13:46:59 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x16000000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:46:59 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x200, &(0x7f0000000180)) futimesat(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', 0x0) 13:46:59 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x5000000) 13:46:59 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1}, 0xfffffffffffffffd}) 13:46:59 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x7, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) [ 2419.113326] kauditd_printk_skb: 107 callbacks suppressed [ 2419.113348] audit: type=1326 audit(1764510420.032:7731): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38549 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2419.130539] audit: type=1326 audit(1764510420.038:7732): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38549 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2419.144757] audit: type=1326 audit(1764510420.042:7734): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38549 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=303 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2419.160327] audit: type=1326 audit(1764510420.042:7735): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38549 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 13:47:00 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0xc, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) [ 2419.180745] audit: type=1326 audit(1764510420.043:7736): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38549 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2419.199110] audit: type=1326 audit(1764510420.043:7737): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38549 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=83 compat=0 ip=0x7f2d0b88fc27 code=0x7ffc0000 13:47:00 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/bus/platform', 0x400, 0x1) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000100)) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x9, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r2, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000140)={0x6, 0x9c8, 0x101}) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r2, 0x40485404, &(0x7f0000000140)={{0x2, 0x2, 0x6, 0x1, 0x10001}, 0x3a88bfb4, 0x1}) 13:47:00 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x18000000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) [ 2419.219025] audit: type=1326 audit(1764510420.045:7738): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38549 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=165 compat=0 ip=0x7f2d0b89204a code=0x7ffc0000 [ 2419.235386] audit: type=1326 audit(1764510420.047:7739): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38559 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2419.265745] audit: type=1326 audit(1764510420.047:7740): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38559 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2419.289258] audit: type=1326 audit(1764510420.040:7733): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38557 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 13:47:08 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x1a000000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:47:08 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x200, &(0x7f0000000180)) futimesat(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', 0x0) 13:47:08 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000005c0)=ANY=[@ANYBLOB="73c4a2c69f66e2e9170000", @ANYRES32=r0, @ANYBLOB="254e1938057907becc68eccd083658474791aeaccdc60b7739041c7295d32d8a44bb79b25c6b3e2f2c3a9a2945b1e6ef188631dbe8a2f26f6456007ee347fc70e6804f6a5471390c020d13421d5e8321f2412a62a1d06551a4fd4f5b83b1d919ff54018b343deba1af11b30ad3bfe6c379b27138379decda63d6c95d05bcae708a2f120ac3bc898c23b20e20e11acc702a814528dc20aea1c19091e57dee38faf5239f115f0372055d9e0f12e9fee626eb96db877317b3faacea0a56159ad6044e7213cdd7010d6365fa66956d493b430264186e9475f38445889481d9000000000000"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000040)) eventfd(0x4727) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="5ed0b2ff68d76fb346352b602a2a1295cbe01cb3f64fbed9e7f9bc9be0f300cb97f6a204cc585145dfb949002f6117fc969dd435dd0c37c5077e5b10cfeafd75205e215b167323a3b971b0ec8583851f2567d30bf5baf28aabb598e6c3d4d825cae01271cb35cdd091e4872367f354e0dc81a7e4ac79775bc1dcaafe2f5079da7dd1989f1ddce6722fc438a7217526cfe75d53471624d6f091e19a7fb699ea27efa9e0fd1914e7c35f297afd9b9bad399bcc85ff0ce7a982f4fa0c172ea5f06479eec302f30e5df66273717e028f4ca7d4c5b6bc8a3c3c67f688195f22488a15d9e1f7e5fed3a6c2aba7bc308b0e2c5657f4538f4a3bf9b975bb887a901ab3c85261be3e331b741313e78b5ad63b7b1b378e9479dc4a95b2b4d15cd1d1b808844378f882a72af1e5b0eefd356e0247246e60643204c3b46183dbe4e066c55cb1dcdaa7b70ef43ab2fa4d2b8c4c1a89cb0e325fd9716874d3856cf368efcdf92d21214e55e4de647c37c71887d11f74f9afe1616e3054ceae601e4b3555e243c1882ad42c7730caeb309e7714ad87c55e9fba308cfc4161e562abde3ac4f3d7e0a3584d49f90692e4c7a4591928100197f102309b05c0b4b4898b0591bc1433af443478979f28e6136ffb21aaeac2be5490475a08e96bb94fd9d9d3aa2f8a1e147a80ba9bfd04dac3f476ff128476c693ea71f7be47a508c98eddc479eb703d6f", 0x200) fork() r2 = fork() r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000340), 0x46e642561c3c72ad, 0x0) pidfd_send_signal(r3, 0x30, &(0x7f00000004c0)={0x25, 0xff, 0x3ff}, 0x0) ptrace(0x10, r2) ptrace(0x8, r2) wait4(0x0, 0x0, 0x8, &(0x7f0000000400)) 13:47:08 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0xffff0000}], 0x1, 0x0) 13:47:08 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0x0, 0xf2ffffff}}, &(0x7f00000001c0), 0x0) 13:47:08 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x6000000) 13:47:08 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x34, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:47:08 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000140)={0x6, 0x9c8, 0x101}) close_range(r0, 0xffffffffffffffff, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xa3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) [ 2427.912414] kauditd_printk_skb: 18 callbacks suppressed [ 2427.912428] audit: type=1326 audit(1764510428.831:7759): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38690 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2427.924385] audit: type=1326 audit(1764510428.831:7760): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38690 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2427.932136] audit: type=1326 audit(1764510428.836:7761): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38690 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=332 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 13:47:08 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000140)={0x6, 0x9c8, 0x101}) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000180)={{0x2, 0x3, 0x6, 0x0, 0x1000}, 0x8, 0x3}) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x20040, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000100)={0x2, 0x7f, 0x4, 0x0, 0x4}) [ 2427.946278] audit: type=1326 audit(1764510428.836:7762): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38690 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2427.954176] audit: type=1326 audit(1764510428.841:7763): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38690 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=261 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2427.967176] audit: type=1326 audit(1764510428.841:7764): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38690 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 13:47:08 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x200, &(0x7f0000000180)) [ 2427.987401] audit: type=1326 audit(1764510428.903:7765): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38700 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2427.997968] audit: type=1326 audit(1764510428.906:7766): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38700 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=89 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2428.004352] audit: type=1326 audit(1764510428.906:7767): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38700 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2428.013943] audit: type=1326 audit(1764510428.912:7768): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38700 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=317 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 13:47:08 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x289, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:47:18 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0xfffffdef}], 0x1, 0x0) 13:47:18 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x543, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:47:18 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0x0, 0xf6ffffff}}, &(0x7f00000001c0), 0x0) 13:47:18 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000005c0)=ANY=[@ANYBLOB="73c4a2c69f66e2e9170000", @ANYRES32=r0, @ANYBLOB="254e1938057907becc68eccd083658474791aeaccdc60b7739041c7295d32d8a44bb79b25c6b3e2f2c3a9a2945b1e6ef188631dbe8a2f26f6456007ee347fc70e6804f6a5471390c020d13421d5e8321f2412a62a1d06551a4fd4f5b83b1d919ff54018b343deba1af11b30ad3bfe6c379b27138379decda63d6c95d05bc84ab2b2fd99e7251898c23b20e20e11acc702a864528dc20aea1c19091e57dee38faf5239f115f0372055d9e0f12e9fee626eb96db877317b3faacea0a56159ad6045a7213cdd7010d6365fa66956d493b430264186e9475f38445889481d9000000000000"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000040)) eventfd(0x4727) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="5ed0b2ff68d76fb346352b602a2a1295cbe01cb3f64fbed9e7f9bc9be0f300cb97f6a204cc585145dfb949002f6117fc969dd435dd0c37c5077e5b10cfeafd75205e215b167323a3b971b0ec8583851f2567d30bf5baf28aabb598e6c3d4d825cae01271cb35cdd091e4872367f354e0dc81a7e4ac79775bc1dcaafe2f5079da7dd1989f1ddce6722fc438a7217526cfe75d53471624d6f091e19a7fb699ea27efa9e0fd1914e7c35f297afd9b9bad399bcc85ff0ce7a982f4fa0c172ea5f06479eec302f30e5df66273717e028f4ca7d4c5b6bc8a3c3c67f688195f22488a15d9e1f7e5fed3a6c2aba7bc308b0e2c5657f4538f4a3bf9b975bb887a901ab3c85261be3e331b741313e78b5ad63b7b1b378e9479dc4a95b2b4d15cd1d1b808844378f882a72af1e5b0eefd356e0247246e60643204c3b46183dbe4e066c55cb1dcdaa7b70ef43ab2fa4d2b8c4c1a89cb0e325fd9716874d3856cf368efcdf92d21214e55e4de647c37c71887d11f74f9afe1616e3054ceae601e4b3555e243c1882ad42c7730caeb309e7714ad87c55e9fba308cfc4161e562abde3ac4f3d7e0a3584d49f90692e4c7a4591928100197f102309b05c0b4b4898b0591bc1433af443478979f28e6136ffb21aaeac2be5490475a08e96bb94fd9d9d3aa2f8a1e147a80ba9bfd04dac3f476ff128476c693ea71f7be47a508c98eddc479eb703d6f", 0x200) fork() fcntl$setstatus(r1, 0x4, 0x80000) r2 = fork() ptrace(0x10, r2) ptrace(0x8, r2) wait4(r2, 0x0, 0x20000000, &(0x7f0000000400)) 13:47:18 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x7000000) 13:47:18 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x200, &(0x7f0000000180)) 13:47:18 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x1c000000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:47:18 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000140)={0x6, 0x9c8, 0x101}) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f00000000c0)=0x1) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) [ 2437.546265] kauditd_printk_skb: 17 callbacks suppressed [ 2437.546280] audit: type=1326 audit(1764510438.465:7786): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38825 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2437.555710] audit: type=1326 audit(1764510438.473:7787): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38825 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=89 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2437.568805] audit: type=1326 audit(1764510438.473:7788): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38825 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2437.577600] audit: type=1326 audit(1764510438.478:7789): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38825 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=317 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 13:47:18 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x200, &(0x7f0000000180)) 13:47:18 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0xfffffffd}], 0x1, 0x0) [ 2437.591797] audit: type=1326 audit(1764510438.479:7790): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38825 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2437.604730] audit: type=1326 audit(1764510438.484:7791): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38823 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2437.615520] audit: type=1326 audit(1764510438.488:7792): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38823 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=303 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2437.629255] audit: type=1326 audit(1764510438.488:7793): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38823 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2437.638089] audit: type=1326 audit(1764510438.495:7794): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38823 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=83 compat=0 ip=0x7f2d0b88fc27 code=0x7ffc0000 [ 2437.653016] audit: type=1326 audit(1764510438.495:7795): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38823 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=165 compat=0 ip=0x7f2d0b89204a code=0x7ffc0000 13:47:18 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x5c8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:47:18 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x8000000) 13:47:18 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0x0, 0xfeffffff}}, &(0x7f00000001c0), 0x0) 13:47:18 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x608, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:47:18 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x801) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000140)={0x6, 0x9c8, 0x101}) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r1, 0x80045400, &(0x7f00000000c0)) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) 13:47:18 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x1e000000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:47:18 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000005c0)=ANY=[@ANYBLOB="73c4a2c69f66e2e9170000", @ANYRES32=r0, @ANYBLOB="254e1938057907becc68eccd083658474791aeaccdc60b7739041c7295d32d8a44bb79b25c6b3e2f2c3a9a2945b1e6ef188631dbe8a2f26f6456007ee347fc70e6804f6a5471390c020d13421d5e8321f2412a62a1d06551a4fd4f5b83b1d919ff54018b343deba1af11b30ad3bfe6c379b27138379decda63d6c95d05bc84ab2b2fd99e7251898c23b20e20e11acc702a864528dc20aea1c19091e57dee38faf5239f115f0372055d9e0f12e9fee626eb96db877317b3faacea0a56159ad6045a7213cdd7010d6365fa66956d493b430264186e9475f38445889481d9000000000000"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000040)) eventfd(0x4727) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="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", 0x200) fork() r2 = fork() ptrace(0x10, r2) ptrace(0x8, r2) write$P9_RUNLINKAT(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=@flushpolicy={0x140, 0x1d, 0x1, 0x70fd2a, 0x25dfdbfd, "", [@XFRMA_SET_MARK={0x8, 0x1d, 0x8fa1}, @XFRMA_SET_MARK={0x8, 0x1d, 0x374}, @tfcpad={0x8, 0x16, 0x1}, @user_kmaddress={0x2c, 0x13, {@in6=@remote, @in=@local, 0x0, 0xa}}, @sa={0xe4, 0x6, {{@in6=@ipv4={'\x00', '\xff\xff', @private=0xa010102}, @in6=@mcast1, 0x4e23, 0x4, 0x4e24, 0x0, 0xa, 0x20, 0x20, 0x0, 0x0, 0xee01}, {@in6=@private2={0xfc, 0x2, '\x00', 0x1}, 0x4d3, 0x32}, @in6=@private2, {0x4, 0x7, 0x7, 0x8, 0xffffffff, 0x9, 0x88fe0000000, 0x1}, {0xffff, 0x5, 0x7fff, 0x7900}, {0x8, 0x8, 0x3f}, 0x70bd28, 0x3505, 0x2, 0x4, 0x20, 0x19}}, @XFRMA_SET_MARK={0x8, 0x1d, 0x3}]}, 0x140}, 0x1, 0x0, 0x0, 0x10000800}, 0x4000000) wait4(r2, 0x0, 0x20000000, &(0x7f0000000400)) 13:47:18 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}, 0xfffffffe}], 0x1, 0x0) 13:47:18 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x200, &(0x7f0000000180)) 13:47:18 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0xa000000) 13:47:18 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x2, 0x0) 13:47:18 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x200, &(0x7f0000000180)) 13:47:26 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0x0, 0xffffff8c}}, &(0x7f00000001c0), 0x0) 13:47:26 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000005c0)=ANY=[@ANYBLOB="73c4a2c69f66e2e9170000", @ANYRES32=r0, @ANYBLOB="254e1938057907becc68eccd083658474791aeaccdc60b7739041c7295d32d8a44bb79b25c6b3e2f2c3a9a2945b1e6ef188631dbe8a2f26f6456007ee347fc70e6804f6a5471390c020d13421d5e8321f2412a62a1d06551a4fd4f5b83b1d919ff54018b343deba1af11b30ad3bfe6c379b27138379decda63d6c95d05bc84ab2b2fd99e7251898c23b20e20e11acc702a864528dc20aea1c19091e57dee38faf5239f115f0372055d9e0f12e9fee626eb96db877317b3faacea0a56159ad6045a7213cdd7010d6365fa66956d493b430264186e9475f38445889481d9000000000000"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000040)) eventfd(0x4727) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="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", 0x200) fork() r3 = fork() ptrace(0x10, r3) ptrace(0x8, r3) wait4(r3, 0x0, 0x20000000, &(0x7f0000000400)) 13:47:26 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x10000000) 13:47:26 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x200, &(0x7f0000000180)) 13:47:26 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x3, 0x0) 13:47:27 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000001c0), 0x12000) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40345410, &(0x7f0000000040)={{0x2}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000140)={0x6, 0x9c8, 0x101}) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f0000000200)={{0xfffffffffffffffc, 0x3, 0x1d4, 0x2, 0x14d7}, 0x2, 0xfff}) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f00000000c0)={{0x2, 0x2, 0x9, 0x1, 0xa92}, 0x8, 0x7fff}) 13:47:27 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x2a000000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:47:27 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x689, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) [ 2446.119661] kauditd_printk_skb: 39 callbacks suppressed [ 2446.119677] audit: type=1326 audit(1764510447.038:7835): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=39093 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2446.128950] audit: type=1326 audit(1764510447.041:7836): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=39093 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2446.134247] audit: type=1326 audit(1764510447.043:7837): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=39093 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=332 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2446.142764] audit: type=1326 audit(1764510447.043:7838): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=39093 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 13:47:27 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x200, &(0x7f0000000180)) 13:47:27 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x1789, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) [ 2446.172521] audit: type=1326 audit(1764510447.091:7839): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=39099 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2446.186177] audit: type=1326 audit(1764510447.097:7840): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=39099 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=89 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2446.196942] audit: type=1326 audit(1764510447.098:7841): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=39099 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2446.205479] audit: type=1326 audit(1764510447.099:7842): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=39099 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=317 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2446.215260] audit: type=1326 audit(1764510447.101:7843): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=39099 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2446.222683] audit: type=1326 audit(1764510447.131:7844): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=39102 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 13:47:27 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x4, 0x0) 13:47:27 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x20000000) 13:47:34 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000004c0)=ANY=[@ANYBLOB="7384a2c69f66e2e91700f42aea6745f68231c68c0a00", @ANYRES32=r0, @ANYBLOB="254e1938057907becc68eccd083658474791aeaccdc60b7739041c7295d32d8a44bb79b25c6b3e2f2c3a9a2945b1e6ef188631dbe8a2f26f6456007ee347fc70e6804f6a5471390c020d13421d5e8321f2412a62a1d06551a4fd4f5b83b1d919ff54018b343deba1af11b30ad3bfe6c379b27138379decda63d6c95d05bc84ab2b2fd99e7251898c23b20e20e11acc702a864528dc20aea1c19091e57dee38faf5239f115f0372055d9e0f12e9fee626eb96db877317b3faacea0a56159ad6045a7213cdd7010d6365fa66956d493b430264186e9475f38445889481d9000000000000"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000040)) eventfd(0x4727) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="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", 0x200) fork() r2 = fork() ptrace(0x10, r2) ptrace(0x8, r2) wait4(r2, 0x0, 0x2, &(0x7f0000000400)) 13:47:34 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x40000000) 13:47:34 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x2c000000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:47:34 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x2f89, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:47:34 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0x0, 0xfffffff2}}, &(0x7f00000001c0), 0x0) 13:47:34 executing program 5: ioctl$SNDRV_TIMER_IOCTL_GPARAMS(0xffffffffffffffff, 0x40345410, &(0x7f0000000040)={{0x1, 0x0, 0x0, 0x3}}) 13:47:34 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x5, 0x0) 13:47:34 executing program 1: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x200, &(0x7f0000000180)) [ 2454.089750] kauditd_printk_skb: 20 callbacks suppressed [ 2454.089776] audit: type=1326 audit(1764510455.005:7865): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=39232 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 13:47:35 executing program 5: ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_ADD_TX_TS(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x64, 0x0, 0x300, 0x70bd28, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r0}, @void}}, [@NL80211_ATTR_ADMITTED_TIME={0x6, 0xd4, 0xb571}, @NL80211_ATTR_USER_PRIO={0x5}, @NL80211_ATTR_USER_PRIO={0x5, 0xd3, 0x3}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_ADMITTED_TIME={0x6, 0xd4, 0x2}, @NL80211_ATTR_TSID={0x5, 0xd2, 0x4}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TSID={0x5, 0xd2, 0xb}]}, 0x64}, 0x1, 0x0, 0x0, 0x20080}, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(0xffffffffffffffff, 0x40345410, &(0x7f0000000040)={{0x2, 0x0, 0xfffffffc, 0x1}, 0x0, 0x5}) [ 2454.116851] audit: type=1326 audit(1764510455.005:7866): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=39232 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=303 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2454.130761] audit: type=1326 audit(1764510455.005:7867): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=39232 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 13:47:35 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0x0, 0xfffffff6}}, &(0x7f00000001c0), 0x0) [ 2454.148177] audit: type=1326 audit(1764510455.006:7868): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=39232 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=83 compat=0 ip=0x7f2d0b88fc27 code=0x7ffc0000 [ 2454.163319] audit: type=1326 audit(1764510455.006:7869): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=39232 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=165 compat=0 ip=0x7f2d0b89204a code=0x7ffc0000 [ 2454.186604] audit: type=1326 audit(1764510455.007:7870): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=39232 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f2d0b843a04 code=0x7ffc0000 13:47:35 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f00000000c0)={0x5, 0x1f, 0x859, 0x0, 0x12}) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) [ 2454.203934] audit: type=1326 audit(1764510455.008:7871): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=39232 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2454.224897] audit: type=1326 audit(1764510455.009:7872): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=39232 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=259 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 13:47:35 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0xfeffffff) [ 2454.242527] audit: type=1326 audit(1764510455.009:7873): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=39232 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 13:47:35 executing program 1: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x200, &(0x7f0000000180)) 13:47:35 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x3580, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) [ 2454.266549] audit: type=1326 audit(1764510455.013:7874): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=39232 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 13:47:35 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x2e000000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:47:35 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x6, 0x0) 13:47:35 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000005c0)=ANY=[@ANYBLOB="73c4a2c69f66e2e9170000", @ANYRES32=r0, @ANYBLOB="254e1938057907becc68eccd083658474791aeaccdc60b7739041c7295d32d8a44bb79b25c6b3e2f2c3a9a2945b1e6ef188631dbe8a2f26f6456007ee347fc70e6804f6a5471390c020d13421d5e8321f2412a62a1d06551a4fd4f5b83b1d919ff54018b343deba1af11b30ad3bfe6c379b27138379decda63d6c95d05bc84ab2b2fd99e7251898c23b20e20e11acc702a864528dc20aea1c19091e57dee38faf5239f115f0372055d9e0f12e9fee626eb96db877317b3faacea0a56159ad6045a7213cdd7010d6365fa66956d493b430264186e9475f38445889481d9000000000000"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000040)) r2 = eventfd(0x4727) read$eventfd(r2, &(0x7f0000000340), 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="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", 0x200) fork() r3 = fork() ptrace(0x10, r3) ptrace(0x8, r3) wait4(r3, 0x0, 0x20000000, &(0x7f0000000400)) 13:47:35 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0x0, 0xfffffffe}}, &(0x7f00000001c0), 0x0) 13:47:35 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0xfffffffe) 13:47:35 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x4788, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:47:45 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{}, 0x0, 0xffffffff}}, &(0x7f00000001c0), 0x0) 13:47:45 executing program 1: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x200, &(0x7f0000000180)) 13:47:45 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x4888, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:47:45 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000005c0)=ANY=[@ANYBLOB="73c4a2c69f66e2e9170000", @ANYRES32=r0, @ANYBLOB="254e1938057907becc68eccd083658474791aeaccdc60b7739041c7295d32d8a44bb79b25c6b3e2f2c3a9a2945b1e6ef188631dbe8a2f26f6456007ee347fc70e6804f6a5471390c020d13421d5e8321f2412a62a1d06551a4fd4f5b83b1d919ff54018b343deba1af11b30ad3bfe6c379b27138379decda63d6c95d05bc84ab2b2fd99e7251898c23b20e20e11acc702a864528dc20aea1c19091e57dee38faf5239f115f0372055d9e0f12e9fee626eb96db877317b3faacea0a56159ad6045a7213cdd7010d6365fa66956d493b430264186e9475f38445889481d9000000000000"]) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000040)) eventfd(0x4727) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="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", 0x200) fork() r3 = fork() ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000004c0)={{0x1, 0x1, 0x18, r1, {0x0, 0xff}}, './file0\x00'}) ioctl$sock_TIOCINQ(r4, 0x541b, &(0x7f0000000380)) ptrace(0x10, r3) ptrace(0x8, r3) wait4(r3, 0x0, 0x20000000, &(0x7f0000000400)) 13:47:45 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x7, 0x0) 13:47:45 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x8000000000000) 13:47:45 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='setgroups\x00') readv(r0, &(0x7f0000000680)=[{&(0x7f0000000180)=""/201, 0xc9}], 0x1) write$P9_RUNLINKAT(r0, 0x0, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000640)) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000640), r3) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000a80)={'wpan0\x00', 0x0}) sendmsg$IEEE802154_LLSEC_DEL_DEV(r5, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000ac0)={0x1c, r4, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r6}]}, 0x1c}}, 0x0) r7 = fork() ptrace(0x10, r7) ptrace(0x8, r7) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x74, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r6}, @NL802154_ATTR_PID={0x8, 0x1c, r7}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x2}, @NL802154_ATTR_NETNS_FD={0x8, 0x1d, r0}, @NL802154_ATTR_NETNS_FD={0x8, 0x1d, r0}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_PHY={0x8}]}, 0x74}, 0x1, 0x0, 0x0, 0x40}, 0x8800) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="797a31396b339e0ee0b1ec231e3dc9acde1c5b141ba66e3db4d6822e40a13806e043dc3c8f14143e65af8a398a486fc49bc67142d3e26d5359f84d5c88c0a5771e2cc6e6340996b77a81827c7e90063daba3a35c73a0d52aaf4f940a00"], 0x5e) r8 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r8, 0x40345410, &(0x7f0000000040)={{0x1, 0x0, 0x0, 0x0, 0x3}, 0x100000000000b002, 0xffffffffffffffff}) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000004c0)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000000c0)=""/232, 0xe8}, {&(0x7f00000001c0)=""/123, 0x7b}, {&(0x7f0000000240)=""/180, 0xb4}], 0x3, &(0x7f0000000340)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x150}}], 0x1, 0x40020040, &(0x7f0000000500)={0x0, 0x989680}) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r9, 0x40485404, &(0x7f0000000540)={{0x3, 0x1, 0xe2f6, 0x0, 0xbce}, 0x8, 0x5}) 13:47:45 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x30000000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) [ 2464.196188] kauditd_printk_skb: 57 callbacks suppressed [ 2464.196204] audit: type=1326 audit(1764510465.114:7932): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=39494 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2464.210599] audit: type=1326 audit(1764510465.115:7933): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=39495 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2464.215632] audit: type=1326 audit(1764510465.118:7934): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=39494 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2464.222043] audit: type=1326 audit(1764510465.120:7935): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=39495 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=332 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2464.227382] audit: type=1326 audit(1764510465.120:7936): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=39495 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 13:47:45 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x100000000000000) [ 2464.238783] audit: type=1326 audit(1764510465.123:7937): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=39494 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=89 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2464.242357] audit: type=1326 audit(1764510465.123:7938): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=39494 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2464.246662] audit: type=1326 audit(1764510465.123:7939): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=39494 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2464.250253] audit: type=1326 audit(1764510465.124:7940): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=39494 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=317 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2464.255282] audit: type=1326 audit(1764510465.125:7941): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=39494 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 13:47:45 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x200, &(0x7f0000000180)) 13:47:45 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0xb, 0x0) 13:47:45 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x5865, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:47:45 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x3b630000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:47:45 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10}, &(0x7f00000001c0), 0x2) 13:47:54 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x6488, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:47:54 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x200000000000000) 13:47:54 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x60000000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:47:54 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10}, &(0x7f00000001c0), 0x3) 13:47:54 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x200, &(0x7f0000000180)) 13:47:54 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000005c0)=ANY=[@ANYBLOB="73c4a3c69f66e2c8170000", @ANYRES32=r0, @ANYBLOB="254e1938057907becc68eccd083658474791aeaccdc60b7739041c7295d32d8a44bb79b25c6b3e2f2c3a9a2945b1e6ef188631dbe8a2f26f6456007ee347fc70e6804f6a5471390c020d13421d5e8321f2412a62a1d06551a4fd4f5b83b1d919ff54018b343deba1af11b30ad3bfe6c379b27138379decda63d6c95d05bc84ab2b2fd99e7251898c23b20e20e11acc702a864528dc20aea1c19091e57dee38faf5239f115f0372055d9e0f12e9fee626eb96db877317b3faacea0a56159ad6045a7213cdd7010d6365fa66956d493b430264186e9475f38445889481d9000000000000"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000040)) eventfd(0x4727) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="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", 0x200) fork() r2 = fork() ptrace(0x10, r2) ptrace(0x8, r2) wait4(r2, 0x0, 0x20000000, &(0x7f0000000400)) 13:47:54 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1, 0x3, 0x0, 0x0, 0x800}, 0x0, 0x5}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f00000000c0)={0x2, 0x40, 0x400, 0x0, 0x12}) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x401, 0x7) r1 = socket$inet_tcp(0x2, 0x1, 0x0) dup(r1) 13:47:54 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0xc, 0x0) [ 2473.178315] kauditd_printk_skb: 28 callbacks suppressed [ 2473.178339] audit: type=1326 audit(1764510474.097:7970): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=39642 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2473.207791] audit: type=1326 audit(1764510474.103:7971): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=39642 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=303 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2473.229419] audit: type=1326 audit(1764510474.103:7972): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=39642 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 13:47:54 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x200, &(0x7f0000000180)) [ 2473.250245] audit: type=1326 audit(1764510474.105:7973): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=39642 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2473.265716] audit: type=1326 audit(1764510474.107:7974): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=39642 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=83 compat=0 ip=0x7f2d0b88fc27 code=0x7ffc0000 [ 2473.295704] audit: type=1326 audit(1764510474.107:7975): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=39642 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=165 compat=0 ip=0x7f2d0b89204a code=0x7ffc0000 13:47:54 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x11, 0x0) [ 2473.316751] audit: type=1326 audit(1764510474.117:7976): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=39642 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f2d0b843a04 code=0x7ffc0000 13:47:54 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10}, &(0x7f00000001c0), 0x4) 13:47:54 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0xff05, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) [ 2473.360118] audit: type=1326 audit(1764510474.117:7977): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=39642 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 13:47:54 executing program 5: r0 = accept$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e) vmsplice(r0, &(0x7f0000001480)=[{&(0x7f0000000180)="c81b9c7b13f46b406423d6b3428f86c9edbf0aa2693e308b0e9f3c3412a04905384532490b59333d7f4e74a76d98f101d6366c811ada3951fdbd22c2213409c2cacb8afd2e", 0x45}, {&(0x7f0000000200)="a38098a8fe3937139b916fe6e93b7258177fa514724c869f1561db57604115855b9152e39dc7841627170fb77857f679d949d946f11ff3ea70a71c3eb81ebbb5e3dafc36118feb69907d36969cdd598a827bb561f7d96f7e9a7022d236573a6a1167900e56f14131899bdb7c41490c544b172be8d1aa036d5e00951b7149cd762932f18bc0d83abc5af38f1848c0758a9ac19a2cce70046b6df15b76fc343ed3087d06d517ad1e2bdb7283c8f7fe1367", 0xb0}, {&(0x7f00000002c0)="9032c204e39db861243261c99c38c7f52e521b6f7d5341aa6229c74c5983b876f3dda40f0c6d382b8b7136e2482ab8a9a9e910f0a544a4af37aedaca8ccea1c46476d462551fcedc76e5d30a2a7c687a3f1798f31aadc67d8075491a1ca7a515198bd74e978aeb1226e2", 0x6a}, {&(0x7f0000000340)="efd48901f2ca767811a891d5c654189050f47c80a8c98f3234412027c0628ba2080e57cc2be1a50c8011ce2f40eb7eadc038693277687922a30385189ef8e72e693340520b812d6acaa7b4c8cbe1bd26e91c7970b4dc1e2d21dec854e81955f32af9ab8c5177121fc93b735fdbdc928c0279aa746fcaf103ed79662c989a3c0324", 0x81}, {&(0x7f0000000400)="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", 0x1000}, {&(0x7f0000001400)="8965760bae1007a786d1f2f7aac61994264fd432227cacc296ee711f5b9d7fdfab6ce189b704de7a97e42027e2f3baa1459b50a084d044649b90948b5124ff6695a8ebbe2b55402974eab36072435a377b3d300fcc99c31ec9b69aeef150271b9a0c5726", 0x64}], 0x6, 0x0) mount$9p_rdma(&(0x7f0000001500), &(0x7f0000001540)='./file0\x00', &(0x7f0000001580), 0x800000, &(0x7f00000015c0)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@common=@access_user}, {@timeout}], [{@subj_type={'subj_type', 0x3d, '{@'}}]}}) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) finit_module(r0, &(0x7f0000001640)='Y\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000001680), 0x400000, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r2, 0x54a2) [ 2473.378754] audit: type=1326 audit(1764510474.132:7979): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=39642 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=259 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2473.392012] audit: type=1326 audit(1764510474.131:7978): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=39642 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 13:47:54 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x300000000000000) 13:47:54 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0xeffdffff, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:47:54 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x509400) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000200)=ANY=[@ANYRES32=r0, @ANYRESDEC, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40345410, &(0x7f0000000040)) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000140)={0x6, 0x9c8, 0x101}) r2 = socket$inet6_icmp(0xa, 0x2, 0x3a) sendfile(r1, r2, &(0x7f00000001c0)=0x6, 0x9b5f) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(0xffffffffffffffff, 0x40485404, &(0x7f0000000100)={{0x2, 0x0, 0xfffffffb, 0x0, 0x2}, 0x8, 0x1}) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000180)={0x1, 0x2, 0x81, 0x2, 0x8}) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/class/backlight', 0x44000, 0x5) sendfile(r2, r3, &(0x7f0000000240)=0x9, 0xfef1) 13:47:54 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x2000, 0x0) 13:47:54 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x200, &(0x7f0000000180)) 13:47:54 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f0000000700)=ANY=[@ANYBLOB="73c4a8c69f66e2e91700001b34cbff636473d75d1e9fe5d65944b3df75faab7e7b5220daf20c51b3aae655d28c77408fa926e943157a657c7d5f8abbdea0c67408b868d2e592ca2dcba8f039f4f562", @ANYRES32=r0, @ANYBLOB="254e1938057907becc68eccd0836584747b2aeaccdc60b7739041c7295d32d8a44bb79b25c6b3e2f2c3a9a2945b1e6ef188631dbe8a2f26f6456007ee347fc70e6804f6a5471390c020d13421d5e8321f2412a62a1d06551a4fd4f5b83b1d919ff54018b343deba1af11b30ad3bfe6c379b27138379decda63d6c95d05bc84ab2b2fd99e7251898c23b20e20e11acc702a864528dc20aea1c19091e57dee38faf5239f115f0372055d9e0f12e9fee626eb96db877317b3faacea0a56159ad6045a7213cdd7010d6365fa66956d493b430264186e9475f38445889481d9000000000000"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = openat$incfs(r0, &(0x7f0000000340)='.log\x00', 0x420000, 0x82) ioctl$TCSETS2(r1, 0x402c542b, &(0x7f0000000380)={0x6, 0x3ff, 0x7fff, 0x1000, 0x3, "39bb278346b9bf1ec98456e16fec396d6f6130", 0xff, 0x92e}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000040)) eventfd(0x4727) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="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", 0x200) fork() r3 = fork() ptrace(0x10, r3) ptrace(0x8, r3) wait4(r3, 0x0, 0x2, &(0x7f00000004c0)) ptrace(0x4200, 0x0) 13:47:54 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0xffeb, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:47:54 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x400000000000000) 13:47:54 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0xbb00, 0x0) 13:47:54 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x200, &(0x7f0000000180)) 13:47:54 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x2, 0x0, 0x3, 0x1, 0x400000}}) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40345410, &(0x7f0000000040)={{0x1}, 0x0, 0x100000000}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000240)={0x2, 0x8001, 0x7, 0x0, 0xf}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000140)={0x6, 0x9c8, 0x101}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f00000001c0)={0x4, 0x0, 0x6d3, 0x0, 0x2}) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f00000000c0)={{0x2, 0x1, 0xfffffffa, 0x1, 0x9}, 0x200, 0x8000}) 13:48:04 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x500000000000000) 13:48:04 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000005c0)=ANY=[@ANYBLOB="73c4a20000", @ANYRES32=r0, @ANYBLOB="254e1938057907becc68eccd083658474791aeaccdc60b7739041c7295d32d8a44bb79b25c6b3e2f2c3a9a2945b1e6ef188631dbe8a2f26f6456007ee347fc70e6804f6a5471390c020d13421d5e8321f2412a62a1d06551a4fd4f5b83b1d919ff54018b343deba1af11b30ad3bfe6c379b27138379decda63d6c95d05bc84ab2b2fd99e7251898c23b20e20e11acc702a864528dc20aea1c19091e57dee38faf5239f115f0372055d9e0f12e9fee626eb96db877317b3faacea0a56159ad6045a7213cdd7010d6365fa66956d493b430264186e9475f38445889481d9000000000000"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000040)) eventfd(0x4727) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="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", 0x200) fork() r2 = fork() ptrace(0x10, r2) ptrace(0x8, r2) wait4(r2, 0x0, 0x20000000, &(0x7f0000000400)) 13:48:04 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10}, &(0x7f00000001c0), 0x5) 13:48:04 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1a000, 0x0) 13:48:04 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0xfdffffff, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:48:04 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x200, &(0x7f0000000180)) 13:48:04 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0xffff8e88, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:48:04 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) r1 = getpgid(0xffffffffffffffff) r2 = syz_open_procfs(r1, &(0x7f0000000140)='net/ip6_mr_cache\x00') ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000180)={0x1, 0x4, 0x2, 0x0, 0x2}) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f00000000c0)={{0x0, 0x0, 0x80000000, 0x1, 0x9}, 0x9, 0x7}) 13:48:04 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0xffffa888, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) [ 2483.631249] kauditd_printk_skb: 30 callbacks suppressed 13:48:04 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0xc0030000, 0x0) [ 2483.631273] audit: type=1326 audit(1764510484.547:8010): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=39930 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2483.656777] audit: type=1326 audit(1764510484.552:8011): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=39930 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=89 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2483.680273] audit: type=1326 audit(1764510484.555:8012): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=39930 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2483.696173] audit: type=1326 audit(1764510484.556:8013): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=39930 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=317 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 13:48:04 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x600000000000000) [ 2483.718001] audit: type=1326 audit(1764510484.560:8014): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=39930 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2483.734485] audit: type=1326 audit(1764510484.575:8015): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=39926 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2483.748145] audit: type=1326 audit(1764510484.580:8016): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=39926 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=303 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 13:48:04 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0xffffca88, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:48:04 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)}) statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x200, &(0x7f0000000180)) 13:48:04 executing program 5: openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x40000) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) [ 2483.758050] audit: type=1326 audit(1764510484.581:8017): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=39926 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2483.774679] audit: type=1326 audit(1764510484.590:8018): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=39926 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=83 compat=0 ip=0x7f2d0b88fc27 code=0x7ffc0000 [ 2483.784947] audit: type=1326 audit(1764510484.590:8019): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=39926 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=165 compat=0 ip=0x7f2d0b89204a code=0x7ffc0000 13:48:13 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0xfeffffff, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:48:13 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10}, &(0x7f00000001c0), 0x6) 13:48:13 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1, 0x0, 0x100009}}) 13:48:13 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0xffffdd86, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:48:13 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x700000000000000) 13:48:13 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)}) statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x200, &(0x7f0000000180)) 13:48:13 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000005c0)=ANY=[]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000040)) eventfd(0x4727) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) creat(&(0x7f0000000800)='./file0\x00', 0x148) write(0xffffffffffffffff, &(0x7f0000000100)="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", 0x200) fork() write$P9_RUNLINKAT(0xffffffffffffffff, 0x0, 0x0) io_submit(0x0, 0x2, &(0x7f00000007c0)=[&(0x7f0000000340)={0x0, 0x0, 0x0, 0x3, 0x3ff, r1, &(0x7f00000004c0)="2786853a7300ca3c13d8a12303de7475e1243e016ad49bfd009e804b9cda2984e2d12cea1bc6355973e69d57874e2c36f90f60234ef4348f81deee838d5945a06690b099fd1cd4f9b3cf8f2346daf23e9727f6d524a2391159f899b676d98bcb427ce68314614210955e0dc07335a97b7d97ec777e1e15b8bd03dd39141e4a531595b0ca3af56813f57d6fa74a3a8177d95ea12ab38edbbbe03102c407d8f9beacfa62c77c8d258e2c7904b6de181858860d7042921fd5ddc8d8902372a6228032039841499dc2f4b64c1e7093", 0xcd, 0x4, 0x0, 0x2, r2}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x3, r0, &(0x7f00000006c0)="673e61a777c9ffd27f78c0cdca5a68b440cc001a8f4058fc1cc5c33d90e97cb78a3ab4ebb71e67a3ec7119df3489331269767010bc2f01895991147c7ffd74d06af2b37218a0283fb4dd8b5a26ae7a1e53fe44e6ed3cff84768dc7b7f4cd21ae327d08ea986da21518251f694fca37dcf6c6782506fa326360a8a5d59fd640a48e25eeca0497efcc00444ec6b0719ebf2b660bcac92e124449d1fdb2a8a8ef0e2dd05f3b61f09f9fd5abb7a867e44d586fbb98aa6044031a438bef76a5ad5618eb6389bd3ed33ca1edf9425a2410e9d8f48417c743c45e003c17c63884de5cc92acbdeff07b510", 0xe7, 0x6}]) r3 = fork() ptrace(0x10, r3) ptrace(0x8, r3) wait4(r3, 0x0, 0x20000000, &(0x7f0000000400)) 13:48:13 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x2) 13:48:13 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) pread64(r0, &(0x7f00000000c0)=""/4096, 0x1000, 0x8) 13:48:13 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0xfffff788, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) [ 2492.444343] kauditd_printk_skb: 12 callbacks suppressed [ 2492.444359] audit: type=1326 audit(1764510493.362:8032): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=40072 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2492.453131] audit: type=1326 audit(1764510493.363:8033): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=40069 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2492.466873] audit: type=1326 audit(1764510493.367:8034): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=40072 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=89 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2492.483722] audit: type=1326 audit(1764510493.367:8035): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=40072 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2492.495104] audit: type=1326 audit(1764510493.369:8036): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=40069 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=303 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2492.504433] audit: type=1326 audit(1764510493.369:8037): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=40069 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2492.516042] audit: type=1326 audit(1764510493.371:8038): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=40069 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=83 compat=0 ip=0x7f2d0b88fc27 code=0x7ffc0000 [ 2492.526395] audit: type=1326 audit(1764510493.371:8039): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=40069 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=165 compat=0 ip=0x7f2d0b89204a code=0x7ffc0000 [ 2492.538257] audit: type=1326 audit(1764510493.371:8040): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=40072 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 13:48:13 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x3) [ 2492.546172] audit: type=1326 audit(1764510493.371:8041): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=40072 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=317 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 13:48:22 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x800000000000000) 13:48:22 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x4) 13:48:22 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0xfffffb88, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:48:22 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0xff000000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:48:22 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)}) statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x200, &(0x7f0000000180)) 13:48:22 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1, 0x2, 0x0, 0x0, 0x2}, 0x400000000}) 13:48:22 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10}, &(0x7f00000001c0), 0x7) 13:48:22 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000005c0)=ANY=[@ANYBLOB="73c4a2c69f66e2e9170000", @ANYRES32=r0, @ANYBLOB="254e1938057907becc68eccd083658474791aeaccdc60b7739041c7295d32d8a44bb79b25c6b3e2f2c3a9a2945b1e6ef188631dbe8a2f26f6456007ee347fc70e6804f6a5471390c020d13421d5e8321f2412a62a1d06551a4fd4f5b83b1d919ff54018b343deba1af11b30ad3bfe6c379b27138379decda63d6c95d05bc84ab2b2fd99e7251898c23b20e20e11acc702a864528dc20aea1c19091e57dee38faf5239f115f0372055d9e0f12e9fee626eb96db877317b3faacea0a56159ad6045a7213cdd7010d6365fa66956d493b430264186e9475f38445889481d9000000000000"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000040)) eventfd(0x4727) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, &(0x7f00000004c0)=""/149, 0x95, 0x11) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="5ed0b2ff68d76fb346352b602a2a1295cbe01cb3f64fbed9e7f9bc9be0f300cb97f6a204cc585145dfb949002f6117fc969dd435dd0c37c5077e5b10cfeafd75205e215b167323a3b971b0ec8583851f2567d30bf5baf28aabb598e6c3d4d825cae01271cb35cdd091e4872367f354e0dc81a7e4ac79775bc1dcaafe2f5079da7dd1989f1ddce6722fc438a7217526cfe75d53471624d6f091e19a7fb699ea27efa9e0fd1914e7c35f297afd9b9bad399bcc85ff0ce7a982f4fa0c172ea5f06479eec302f30e5df66273717e028f4ca7d4c5b6bc8a3c3c67f688195f22488a15d9e1f7e5fed3a6c2aba7bc308b0e2c5657f4538f4a3bf9b975bb887a901ab3c85261be3e331b741313e78b5ad63b7b1b378e9479dc4a95b2b4d15cd1d1b808844378f882a72af1e5b0eefd356e0247246e60643204c3b46183dbe4e066c55cb1dcdaa7b70ef43ab2fa4d2b8c4c1a89cb0e325fd9716874d3856cf368efcdf92d21214e55e4de647c37c71887d11f74f9afe1616e3054ceae601e4b3555e243c1882ad42c7730caeb309e7714ad87c55e9fba308cfc4161e562abde3ac4f3d7e0a3584d49f90692e4c7a4591928100197f102309b05c0b4b4898b0591bc1433af443478979f28e6136ffb21aaeac2be5490475a08e96bb94fd9d9d3aa2f8a1e147a80ba9bfd04dac3f476ff128476c693ea71f7be47a508c98eddc479eb703d6f", 0x200) open(&(0x7f0000000340)='./file0\x00', 0x10401, 0x8) fork() r2 = fork() ptrace(0x10, r2) ptrace(0x8, r2) wait4(r2, 0x0, 0x20000000, &(0x7f0000000400)) 13:48:22 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote={0xac, 0x3}, @remote}}}], 0x20}}], 0x1, 0x0) [ 2501.615364] kauditd_printk_skb: 10 callbacks suppressed [ 2501.615387] audit: type=1326 audit(1764510502.534:8052): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=40196 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2501.635763] audit: type=1326 audit(1764510502.534:8053): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=40196 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2501.654773] audit: type=1326 audit(1764510502.548:8054): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=40196 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=303 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 13:48:22 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x2}}) creat(&(0x7f00000000c0)='./file0\x00', 0xc0) [ 2501.674762] audit: type=1326 audit(1764510502.548:8055): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=40196 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 13:48:22 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x5) 13:48:22 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0xa00000000000000) [ 2501.700446] audit: type=1326 audit(1764510502.548:8056): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=40196 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2501.713318] audit: type=1326 audit(1764510502.548:8057): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=40196 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=83 compat=0 ip=0x7f2d0b88fc27 code=0x7ffc0000 [ 2501.725439] audit: type=1326 audit(1764510502.551:8059): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=40209 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 13:48:22 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x7ffcfffc}]}) statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x200, &(0x7f0000000180)) [ 2501.747073] audit: type=1326 audit(1764510502.551:8058): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=40196 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=165 compat=0 ip=0x7f2d0b89204a code=0x7ffc0000 [ 2501.760965] audit: type=1326 audit(1764510502.553:8060): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=40196 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f2d0b843a04 code=0x7ffc0000 13:48:22 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10}, &(0x7f00000001c0), 0x8) 13:48:22 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0xffff0000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) [ 2501.777734] audit: type=1326 audit(1764510502.555:8061): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=40209 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 13:48:22 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote={0xac, 0xa}, @remote}}}], 0x20}}], 0x1, 0x0) 13:48:31 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000007c0)=ANY=[@ANYBLOB="0200000086aeed4e78251f0000", @ANYRES32=r0, @ANYBLOB="254e1930057907becc68eccd083658394791aeaccdc60b7739041c7295d32d8a44bb79b25c6b3e2f2c3a9a2945b1e6ef188631dbe8a2f26f6456007e02000000000000005471390c020d13421d5e8321f241b662a1d06551a4fd4f5b83b1d919ff3d018b343deba1af11b30ad3bfe6c379b27138379decda63d6c95d05bc84ab2b2fd99e7251898c23b21c20e11acc702a864528dc20aea1c19091e57dee38faf5239f115f0372055d9e0f12e9fee626eb96db877317b3faacea0a56159ad6045a7213cdd7010d6365fa66956d493b430264186e9475f38445889481d9000000000000"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000040)) eventfd(0x4727) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="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", 0x200) fork() r3 = fork() ptrace(0x10, r3) ptrace(0x8, r3) wait4(r3, 0x0, 0x20000000, &(0x7f0000000400)) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f00000004c0), r2) sendmsg$ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000500)={&(0x7f00000006c0)={0xd0, r4, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [@ETHTOOL_A_DEBUG_HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x74, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x6d, 0x5, "424c6e0b220487dac18caa04065ee21b321faa61adb0d1d32f09a62ca4ba5da5205804a133f272d063133479df7841713f6ad2c7310225830e55d8d27081fc29a4f72f5780bd6f164321f8e753b3d31f17f3fd53cc217d8b80e3bd2b6324a861392d28977b0f53ff49"}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x4000c0c0}, 0x1) 13:48:31 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x8) 13:48:31 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f00000000c0)={0x0, 0x9, 0x3, 0x0, 0xd}) 13:48:31 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote={0xac, 0x17}, @remote}}}], 0x20}}], 0x1, 0x0) 13:48:31 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10}, &(0x7f00000001c0), 0xa) 13:48:31 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x1000000000000000) 13:48:31 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x7ffcfffc}]}) statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x200, &(0x7f0000000180)) 13:48:31 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0xfffffdef, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) [ 2510.758970] kauditd_printk_skb: 29 callbacks suppressed [ 2510.758996] audit: type=1326 audit(1764510511.676:8091): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=40350 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2510.785853] audit: type=1326 audit(1764510511.679:8092): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=40350 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2510.806356] audit: type=1326 audit(1764510511.681:8093): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=40350 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=89 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 13:48:31 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x2000000000000000) [ 2510.820598] audit: type=1326 audit(1764510511.681:8094): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=40350 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 13:48:31 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10}, &(0x7f00000001c0), 0x10) [ 2510.835765] audit: type=1326 audit(1764510511.681:8095): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=40350 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=317 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2510.849392] audit: type=1326 audit(1764510511.685:8096): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=40351 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 13:48:31 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0xfffffffd, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:48:31 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote={0xac, 0x37}, @remote}}}], 0x20}}], 0x1, 0x0) [ 2510.866761] audit: type=1326 audit(1764510511.685:8097): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=40351 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=303 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2510.884339] audit: type=1326 audit(1764510511.686:8099): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=40350 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 13:48:31 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x101000) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) 13:48:31 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0xa) 13:48:31 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x7ffcfffc}]}) statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x200, &(0x7f0000000180)) [ 2510.902916] audit: type=1326 audit(1764510511.685:8098): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=40351 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2510.941263] audit: type=1326 audit(1764510511.689:8100): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=40351 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=83 compat=0 ip=0x7f2d0b88fc27 code=0x7ffc0000 13:48:31 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x4000000000000000) 13:48:40 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0xb) 13:48:40 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10}, &(0x7f00000001c0), 0xf2) 13:48:40 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote={0xac, 0x14, 0x3}, @remote}}}], 0x20}}], 0x1, 0x0) 13:48:40 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f0000000800)=ANY=[@ANYBLOB="73c4a2c69f66e2e90000008e7e173d5c92823e0760b4c477c89be16ec29fe5b907b8ae4fe0d844a716b56824b98a1c38498c5c96ea6c5f7e8ee9128fe369d380988e72860a324f596741769984e1ead7f0d60d506cafc686", @ANYRES32=r0, @ANYBLOB="254e1938057907becc68eccd083658474791aeaccdc60b7739041c7295d32d8a44bb79b25c6b3e2f2c3a9a2945b1e6ef188631dbe8a2f26f6456007ee347fc70e6804f6a5471390c020d13421d5e8321f2412a62a1d06551a4fd4f5b83b1d919ff54018b343deba1af11b30ad3bfe6c379b27138379decda63d6c95d05bc84ab2b2fd99e7251898c23b20e20e11acc702a864528dc20aea1c19091e57dee38faf5239f115f0372055d9e0f12e9fee626eb96db877317b3faacea0a56159ad6045a7213cdd7010d6365fa66956d493b430264186e9475f38445889481d9000000000000"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) pwritev2(r0, &(0x7f00000007c0)=[{&(0x7f00000004c0)="caec50e4b18fc74bf5abde9f3ff276c2877fca296cdca017f89fffd9e01a27f01accd5fa8cdcc388e21c06000f19cff6c0daec9809b9e376f437e760795832a7bb78a3cb50a343c823b0317e4505e212399052a94b53c6510a895270d70a59cacff49f841929ad04117f062ca8d3503426dd2f222d3e6457e5d9089f72d4c1e468e8cbd2acd26379072b0b3a897857423538c6ae6d68106886cbfdc047471c3c217531e2a9e3fa515b4751bc1d021b26b8479956ca548277dcaf8462bc7a54c67dd4", 0xc2}, {&(0x7f0000000340)="23594f52be62633bc5d2bfbf8cd159d007910e817fe54b38533a0b8234ca7a2bfb2e55f7f701e9d39521bf6b9c33bffd618c152b414eaac68cc591799d96d472db162c95d8a08316c7308b748e74cb9cbbb0", 0x52}, {&(0x7f00000006c0)="405829b5384948f736a591b575eef47449b1b20b3ce18077ad00ff4b488c9b84826ae154543935736ae0cfbb175bdb1dc46fbb209ee730b4dce2bfbe3d5d25b01974cab3110416c16b1336f558cdafeca58490816b067aa0c8ce8dbf5651bf6f242785ac74842699ad933661b844d0264a480a449cf3e68d6bda2785a5d4fa0455b031b8cfd800a44f09cf664f631c5aea14b4449ae95e9e01b1c6660e5d7503a88bea469a97360c46e3d62e83bd3bcfed2a5ba79ae760f924d5ab8e085023e90f3435485f5cc05719348c97b678624dd3d8bf947b6077e7cf0c6d988992d9168d58ddabd5f7b3e3dd5a7a71ea78af08d34bec96", 0xf4}], 0x3, 0x44d, 0x4, 0x2) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000040)) eventfd(0x4727) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="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", 0x200) fork() r2 = fork() ptrace(0x10, r2) ptrace(0x8, r2) wait4(r2, 0x0, 0x20000000, &(0x7f0000000400)) 13:48:40 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]}) statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x200, &(0x7f0000000180)) 13:48:40 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0xfffffffe, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:48:40 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0xfeffffff00000000) 13:48:40 executing program 5: openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000100)={0x0, 0x4, 0x5}) [ 2519.961114] kauditd_printk_skb: 32 callbacks suppressed [ 2519.961140] audit: type=1326 audit(1764510520.880:8133): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=40498 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2519.988194] audit: type=1326 audit(1764510520.881:8134): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=40498 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=303 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2520.001889] audit: type=1326 audit(1764510520.881:8135): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=40498 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 13:48:40 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000280)=0x10) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000140)={0x6, 0x9c8, 0x101}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f00000000c0)={0x4, 0xfffff801, 0x2, 0x0, 0x1}) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r2, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000140)={0x6, 0x9c8, 0x101}) ioctl$EXT4_IOC_GETSTATE(r2, 0x40046629, &(0x7f0000000240)) ioctl$SNDRV_TIMER_IOCTL_STATUS32(r0, 0x80585414, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) [ 2520.022886] audit: type=1326 audit(1764510520.883:8136): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=40498 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=83 compat=0 ip=0x7f2d0b88fc27 code=0x7ffc0000 13:48:40 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote={0xac, 0x14, 0xa}, @remote}}}], 0x20}}], 0x1, 0x0) [ 2520.036772] audit: type=1326 audit(1764510520.884:8137): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=40498 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=165 compat=0 ip=0x7f2d0b89204a code=0x7ffc0000 13:48:40 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10}, &(0x7f00000001c0), 0x300) 13:48:40 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x3000000000000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) [ 2520.050914] audit: type=1326 audit(1764510520.886:8138): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=40498 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f2d0b843a04 code=0x7ffc0000 13:48:40 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0xffffffff00000000) 13:48:40 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0xc) [ 2520.068705] audit: type=1326 audit(1764510520.887:8139): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=40498 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2520.082720] audit: type=1326 audit(1764510520.889:8140): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=40498 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=259 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2520.098730] audit: type=1326 audit(1764510520.890:8141): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=40498 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2520.112102] audit: type=1326 audit(1764510520.891:8142): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=40498 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 13:48:51 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10}, &(0x7f00000001c0), 0x500) 13:48:51 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote={0xac, 0x14, 0x17}, @remote}}}], 0x20}}], 0x1, 0x0) 13:48:51 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x7, 0x4, 0x40, 0x2}]}) readlink(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x6, &(0x7f0000000080)=[{0xfbff, 0x5, 0x5, 0x9}, {0x8, 0x40, 0x5, 0x8}, {0x8, 0x0, 0xff, 0xffffacbd}, {0x6, 0x0, 0x42}, {0x1, 0x20, 0x6, 0x4}, {0x4, 0xff, 0x9, 0x6}]}) 13:48:51 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]}) statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x200, &(0x7f0000000180)) 13:48:51 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000005c0)=ANY=[@ANYBLOB="73c4a2c69f66e2e9170000", @ANYRES32=r0, @ANYBLOB="254e1938057907becc68eccd083658474791aeaccdc60b7739041c7295d32d8a44bb79b25c6b3e2f2c3a9a2945b1e6ef188631dbe8a2f26f6456007ee347fc70e6804f6a5471390c020d13421d5e8321f2412a62a1d06551a4fd4f5b83b1d919ff54018b343deba1af11b30ad3bfe6c379b27138379decda63d6c95d05bc84ab2b2fd99e7251898c23b20e20e11acc702a864528dc20aea1c19091e57dee38faf5239f115f0372055d9e0f12e9fee626eb96db877317b3faacea0a56159ad6045a7213cdd7010d6365fa66956d493b430264186e9475f38445889481d9000000000000"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000040)) eventfd(0x4727) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="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", 0x200) fork() r3 = fork() ptrace(0x10, r3) sendmsg$nl_xfrm(r2, &(0x7f00000006c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000380)={&(0x7f00000004c0)=@newsa={0xf8, 0x10, 0x800, 0x70bd2a, 0x25dfdbfc, {{@in=@loopback, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e24, 0x0, 0x4e23, 0x100, 0xa, 0x80, 0x20, 0xff, 0x0, 0xffffffffffffffff}, {@in=@dev={0xac, 0x14, 0x14, 0x40}, 0x4d4, 0x6c}, @in=@empty, {0x0, 0x63, 0x7, 0xdd, 0x1f, 0x8, 0x2, 0x100000001}, {0x4, 0x240000, 0x4, 0x6}, {0x4, 0x5, 0x3}, 0x70bd2c, 0x3504, 0x2, 0x4, 0x1f, 0x20}, [@proto={0x5}]}, 0xf8}, 0x1, 0x0, 0x0, 0x800}, 0x20008000) ptrace(0x8, r3) wait4(r3, 0x0, 0x20000000, &(0x7f0000000400)) 13:48:51 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x4000000000000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:48:51 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) flistxattr(r1, &(0x7f0000000100)=""/140, 0x8c) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) r2 = accept4(0xffffffffffffffff, &(0x7f0000000300)=@l2tp={0x2, 0x0, @dev}, &(0x7f0000000380)=0x80, 0xc0000) sendmsg$NL80211_CMD_DEL_PMKSA(r2, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x50, 0x0, 0x100, 0x70bd2c, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x4, 0x38}}}}, [@NL80211_ATTR_FILS_CACHE_ID={0x6, 0xfd, 0x400}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_PMKID={0x14, 0x55, "ff8bfe2386692f4d943d9cadc7759921"}, @NL80211_ATTR_PMK_REAUTH_THRESHOLD={0x5, 0x120, 0x49}]}, 0x50}, 0x1, 0x0, 0x0, 0x5}, 0x4040800) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f00000001c0)={{0xffffffffffffffff, 0x0, 0x477, 0x3, 0x4}, 0x4, 0x6}) 13:48:51 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0xd) [ 2530.426631] kauditd_printk_skb: 29 callbacks suppressed [ 2530.426654] audit: type=1326 audit(1764510531.345:8172): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=40641 comm="syz-executor.1" exe="/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x0 13:48:51 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0xe) [ 2530.508706] audit: type=1326 audit(1764510531.425:8173): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=40651 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2530.524236] audit: type=1326 audit(1764510531.429:8174): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=40651 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=303 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2530.539695] audit: type=1326 audit(1764510531.429:8175): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=40651 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2530.549542] audit: type=1326 audit(1764510531.432:8176): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=40651 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=83 compat=0 ip=0x7f2d0b88fc27 code=0x7ffc0000 [ 2530.571521] audit: type=1326 audit(1764510531.432:8177): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=40651 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=165 compat=0 ip=0x7f2d0b89204a code=0x7ffc0000 [ 2530.586792] audit: type=1326 audit(1764510531.442:8178): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=40651 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f2d0b843a04 code=0x7ffc0000 [ 2530.601511] audit: type=1326 audit(1764510531.442:8179): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=40651 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2530.616469] audit: type=1326 audit(1764510531.453:8180): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=40651 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=259 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 13:48:51 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote={0xac, 0x14, 0x37}, @remote}}}], 0x20}}], 0x1, 0x0) [ 2530.631023] audit: type=1326 audit(1764510531.460:8181): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=40651 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 13:48:51 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000000)={0x0, &(0x7f0000000100)}) readlink(0x0, 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 13:48:51 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10}, &(0x7f00000001c0), 0x600) 13:48:51 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x8000000000000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:48:51 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x10) 13:48:51 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000140)={0x6, 0x9c8, 0x101}) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000001340)={{0x3, 0x0, 0x3, 0x2, 0x100}, 0x1f, 0x1}) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7fffffff, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0) r3 = dup(r2) ioctl$SG_IO(r3, 0x2285, &(0x7f00000010c0)={0x53, 0xfffffffc, 0x6, 0x0, @buffer={0x9, 0x1000, &(0x7f0000000000)=""/4096}, &(0x7f0000001000)="93a0cb4eef85", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1, 0x0, 0x0, 0x3}, 0x0, 0x4}) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='setgroups\x00') readv(r4, &(0x7f0000000680)=[{&(0x7f0000000180)=""/201, 0xc9}], 0x1) write$P9_RUNLINKAT(r4, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r4, 0x40485404, &(0x7f00000013c0)={{0x2, 0x2, 0x20000000, 0x66f00c21d9dcd0c3, 0x24}, 0x9}) ioctl$SG_IO(r4, 0x2285, &(0x7f00000012c0)={0x0, 0xfffffffffffffffb, 0xbf, 0x66, @buffer={0x0, 0xaf, &(0x7f0000001140)=""/175}, &(0x7f0000001200)="a14dc75b9a58077d956a59d02d84497371d81ae5828072cc6740220238bba8311fcbe4e67d0330aaf4cbb35b96013beaf2e5406b445b630c2c49aae0c0ce769ef321af67aa818fb8c6fdaade9950bb0ce203042b6a30ea68f54ee78fc9cfe791a905fd771d443a62d968705fea8a442c7db2913c3c9698a4aeb7a3f2ee857ed14e76341eb308fe3fcb7ec567f3dda50719efa03724ae6a44af088b3a8702879136eef6cf6b873ba186a1a56ae8270dfbb92284180d42c340aec1fc2a395596", &(0x7f0000001040)=""/43, 0x3, 0x10040, 0x2, &(0x7f0000001080)}) 13:48:51 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote={0xac, 0x3}}}}], 0x20}}], 0x1, 0x0) 13:48:51 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x4, 0x1, 0x1d, 0x5}]}) readlink(0x0, 0x0, 0x0) 13:48:51 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x11) 13:48:51 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000005c0)=ANY=[@ANYBLOB="73c4a2c69f66e2e9170000", @ANYRES32=r0, @ANYBLOB="254e1938057907becc68eccd083658474791aeaccdc60b7739041c7295d32d8a44bb79b25c6b3e2f2c3a9a2945b1e6ef188631dbe8a2f26f6456007ee347fc70e6804f6a5471390c020d13421d5e8321f2412a62a1d06551a4fd4f5b83b1d919ff54018b343deba1af11b30ad3bfe6c379b27138379decda63d6c95d05bc84ab2b2fd99e7251898c23b20e20e11acc702a864528dc20aea1c19091e57dee38faf5239f115f0372055d9e0f12e9fee626eb96db877317b3faacea0a56159ad6045a7213cdd7010d6365fa66956d493b430264186e9475f38445889481d9000000000000"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1f, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000040)) eventfd(0x4727) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="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", 0x200) fork() r2 = fork() ptrace(0x10, r2) r3 = socket$unix(0x1, 0x5, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r3, 0xc020662a, &(0x7f00000006c0)={0x137, 0x6, 0x5, 0x86b2, 0x9, [{0x10000, 0x81, 0x8000, '\x00', 0x946}, {0x3, 0x76, 0xfffffffffffffff8, '\x00', 0x1}, {0x4, 0x1, 0x10000, '\x00', 0xc80}, {0x10001, 0xf4, 0x6, '\x00', 0x184}, {0x20, 0xc6a, 0x9, '\x00', 0x200}, {0x7, 0x8, 0x3, '\x00', 0x2200}, {0x3, 0x5, 0xfff, '\x00', 0x2201}, {0x8000, 0x2, 0x2, '\x00', 0x400}, {0x9, 0x6, 0x7, '\x00', 0x400}]}) ptrace(0x8, r2) wait4(r2, 0x0, 0x20000000, &(0x7f0000000400)) 13:49:00 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000140)={0x6, 0x9c8, 0x101}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f00000000c0)={0x7, 0x7f, 0x10002, 0x0, 0x8}) 13:49:00 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]}) statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x200, &(0x7f0000000180)) 13:49:00 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknodat$null(0xffffffffffffffff, &(0x7f0000000380)='./file1\x00', 0x40, 0x103) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000040)) eventfd(0x4727) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r1, 0x8983, &(0x7f0000000340)={0x1, 'wg0\x00', {}, 0x4}) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="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", 0x200) r2 = fork() rt_tgsigqueueinfo(r2, r2, 0x3d, &(0x7f00000004c0)={0x35, 0x4}) r3 = fork() ptrace(0x10, r3) ptrace(0x8, r3) wait4(r3, 0x0, 0x20000000, &(0x7f0000000400)) 13:49:00 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) r0 = syz_open_dev$vcsn(&(0x7f0000001200), 0x0, 0x501080) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000001240)) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000140)={0x4, &(0x7f00000000c0)=[{0xffe0, 0x31, 0xfc, 0x1}, {0x4, 0x8, 0x6, 0x5}, {0x4, 0xff, 0x80, 0x60}, {0x2, 0x7, 0x5, 0x101}]}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000080)={0x7, &(0x7f0000000040)=[{0x7b, 0x0, 0xff, 0x100}, {0x81, 0x2, 0xc9, 0x3}, {0xff, 0x2, 0x3, 0x3}, {0xa37c, 0x3, 0x80, 0x9}, {0xb222, 0x8a, 0x9, 0x1}, {0x0, 0xd5, 0x9, 0xffffffe1}, {0x0, 0x2, 0xb7, 0x5}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000011c0)={0x7, &(0x7f0000001180)=[{0x8, 0x0, 0x0, 0x2}, {0x1, 0x3, 0x3, 0x80000001}, {0x7, 0x20, 0x9, 0x3}, {0xfc00, 0x2, 0x4, 0x1}, {0xcb8e, 0x80, 0x3, 0x4}, {0x2, 0x80, 0xfe, 0x3f}, {0x0, 0x81, 0xb9, 0x90}]}) readlink(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE(r1, 0x5000940e, &(0x7f0000000180)={{r2}, "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"}) 13:49:00 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10}, &(0x7f00000001c0), 0x700) 13:49:00 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x12) 13:49:00 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote={0xac, 0xa}}}}], 0x20}}], 0x1, 0x0) 13:49:00 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x10010000000000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) [ 2539.562787] kauditd_printk_skb: 11 callbacks suppressed [ 2539.562812] audit: type=1326 audit(1764510540.480:8193): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=40907 comm="syz-executor.1" exe="/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x0 [ 2539.593265] audit: type=1326 audit(1764510540.512:8194): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=40909 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 13:49:00 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote={0xac, 0x17}}}}], 0x20}}], 0x1, 0x0) [ 2539.609025] audit: type=1326 audit(1764510540.512:8195): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=40909 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2539.620934] audit: type=1326 audit(1764510540.523:8196): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=40909 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f68ebb80a04 code=0x7ffc0000 [ 2539.630947] audit: type=1326 audit(1764510540.523:8197): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=40909 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2539.649056] audit: type=1326 audit(1764510540.524:8198): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=40909 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2539.663711] audit: type=1326 audit(1764510540.530:8200): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=40909 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2539.677517] audit: type=1326 audit(1764510540.530:8201): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=40909 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 13:49:00 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1, 0x0, 0x0, 0x2}}) 13:49:00 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x14) [ 2539.705756] audit: type=1326 audit(1764510540.530:8202): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=40909 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2539.718102] audit: type=1326 audit(1764510540.528:8199): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=40904 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 13:49:09 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote={0xac, 0x37}}}}], 0x20}}], 0x1, 0x0) 13:49:09 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f0000000740)=ANY=[@ANYBLOB="73c4a2c69f66e2e9170000250101cff1e2b932df44c54fda2882b795250a543a4f8de6b5ddb1e8c72b75475d1faebdc35adc16d634fdd87dee1f9f41e8d8220137061419d34206a71a83f0564b3038bc1fa0cc847685a96caba80e6a2b409b6bde0527242251c07b987bb0e7a98c4bacf5605139375a886adcacfec66903713f27159107cfe4ba5b81ff4ea1440c10a4ce0a8d7e80be341ee3", @ANYRES32=r0, @ANYBLOB="254e1938057907becc68eccd083658474791aeaccdc60b7739041c7295d32d8a44bb79b25c6b3e2f2c3a9a2945b1e6ef188631dbe8a2f26f6456007ee347fc70e6804f6a5471390c020d13421d5e8321f2412a62a1d06551a4fd4f5b83b1d919ff54018b343deba1af11b30ad3bfe6c379b27138379decda63d6c95d05bc84ab2b2fd99e7251898c23b20e20e11acc702a864528dc20aea1c19091e57dee38faf5239f115f0372055d9e0f12e9fee626eb96db877317b3faacea0a56159ad6045a7213cdd7010d6365fa66956d493b430264186e9475f38445889481d9000000000000"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000040)) getdents(r0, &(0x7f0000000340)=""/124, 0x7c) eventfd(0x4727) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="5ed0b2ff68d76fb346352b602a2a1295cbe01cb3f64fbed9e7f9bc9be0f300cb97f6a204cc585145dfb949002f6117fc969dd435dd0c37c5077e5b10cfeafd75205e215b167323a3b971b0ec8583851f2567d30bf5baf28aabb598e6c3d4d825cae01271cb35cdd091e4872367f354e0dc81a7e4ac79775bc1dcaafe2f5079da7dd1989f1ddce6722fc438a7217526cfe75d53471624d6f091e19a7fb699ea27efa9e0fd1914e7c35f297afd9b9bad399bcc85ff0ce7a982f4fa0c172ea5f06479eec302f30e5df66273717e028f4ca7d4c5b6bc8a3c3c67f688195f22488a15d9e1f7e5fed3a6c2aba7bc308b0e2c5657f4538f4a3bf9b975bb887a901ab3c85261be3e331b741313e78b5ad63b7b1b378e9479dc4a95b2b4d15cd1d1b808844378f882a72af1e5b0eefd356e0247246e60643204c3b46183dbe4e066c55cb1dcdaa7b70ef43ab2fa4d2b8c4c1a89cb0e325fd9716874d3856cf368efcdf92d21214e55e4de647c37c71887d11f74f9afe1616e3054ceae601e4b3555e243c1882ad42c7730caeb309e7714ad87c55e9fba308cfc4161e562abde3ac4f3d7e0a3584d49f90692e4c7a4591928100197f102309b05c0b4b4898b0591bc1433af443478979f28e6136ffb21aaeac2be5490475a08e96bb94fd9d9d3aa2f8a1e147a80ba9bfd04dac3f476ff128476c693ea71f7be47a508c98eddc479eb703d6f", 0x200) fork() r2 = fork() ptrace(0x10, r2) ptrace(0x8, r2) wait4(r2, 0x0, 0x20000000, &(0x7f0000000400)) 13:49:09 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x16) 13:49:09 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f00000000c0)={{0x0, 0x1, 0xfad, 0x1, 0x3f}, 0x9, 0x1}) 13:49:09 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)}) readlink(0x0, 0x0, 0x0) 13:49:09 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10}, &(0x7f00000001c0), 0xa00) 13:49:09 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x40030000000000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:49:09 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) statx(0xffffffffffffff9c, 0x0, 0x0, 0x200, &(0x7f0000000180)) [ 2548.257837] kauditd_printk_skb: 37 callbacks suppressed [ 2548.257862] audit: type=1326 audit(1764510549.175:8240): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=41045 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2548.289087] audit: type=1326 audit(1764510549.178:8241): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=41045 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=303 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 13:49:09 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) [ 2548.306960] audit: type=1326 audit(1764510549.178:8242): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=41045 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2548.320235] audit: type=1326 audit(1764510549.180:8243): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=41045 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=83 compat=0 ip=0x7f2d0b88fc27 code=0x7ffc0000 13:49:09 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10}, &(0x7f00000001c0), 0x2000) [ 2548.332384] audit: type=1326 audit(1764510549.181:8244): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=41045 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=165 compat=0 ip=0x7f2d0b89204a code=0x7ffc0000 [ 2548.343247] audit: type=1326 audit(1764510549.182:8245): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=41045 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f2d0b843a04 code=0x7ffc0000 [ 2548.366877] audit: type=1326 audit(1764510549.184:8246): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=41045 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2548.392399] audit: type=1326 audit(1764510549.188:8247): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=41045 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=259 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 13:49:09 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x100000000000000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:49:09 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1, 0x0, 0x0, 0x2, 0x5}, 0xff}) [ 2548.412699] audit: type=1326 audit(1764510549.188:8248): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=41045 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2548.433453] audit: type=1326 audit(1764510549.188:8249): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=41045 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 13:49:09 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote={0xac, 0x14, 0x3}}}}], 0x20}}], 0x1, 0x0) 13:49:09 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x18) 13:49:09 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) statx(0xffffffffffffff9c, 0x0, 0x0, 0x200, &(0x7f0000000180)) 13:49:09 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1, 0x0, 0xfffffffe, 0x3, 0x7f1}, 0xfffffffffffffffc, 0xffff7ffffffffffc}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='setgroups\x00') readv(r2, &(0x7f0000000680)=[{&(0x7f0000000180)=""/201, 0xc9}], 0x1) write$P9_RUNLINKAT(r2, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000001c0), r2) sendmsg$NL80211_CMD_GET_SURVEY(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=ANY=[@ANYBLOB="000002"], 0x1c}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x9, 0x0, 0x2, 0x1, 0x3, 0x3, 0x80000000, 0x272, 0x40, 0x34c, 0x8000, 0xc70, 0x38, 0x2, 0x8000, 0x8001, 0x7}, [{0x5, 0x4, 0xb9f, 0x72, 0x7, 0x81, 0x800, 0x3f}], "96343af112f56938c40f3ac0fc2ce361989480541d0cc82ff05eef02b1c8b074cd00257bd3d52d331f19a89579e121494345bdfd9a9ddea8317832b6d453adc6ace7b75760435aaed2a0697434a6482b4a0d95436f2f101cbbaca9184edb60b58f14c4c9bb96ec5f74456ce58272ae1afda70528d1", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x8ed) recvmmsg(r1, &(0x7f0000000040), 0x1, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), r1) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000140)={0x6, 0x9c8, 0x101}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r4 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r4, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r4, 0x40505412, &(0x7f0000000140)={0x6, 0x9c8, 0x101}) splice(r3, &(0x7f00000000c0)=0x8, r4, &(0x7f0000000180)=0x7, 0x59c8, 0xf6bf78f187141216) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x81, 0x0, 0x9}]}) [ 2549.393651] Bluetooth: hci0: Opcode 0x0c1a failed: -4 [ 2549.395231] Bluetooth: hci0: Opcode 0x0406 failed: -4 [ 2549.402774] Bluetooth: hci1: Opcode 0x0c1a failed: -4 [ 2549.412959] Bluetooth: hci1: Opcode 0x0406 failed: -4 [ 2549.419401] Bluetooth: hci4: Opcode 0x0c1a failed: -4 [ 2549.420854] Bluetooth: hci4: Opcode 0x0406 failed: -4 [ 2549.426535] Bluetooth: hci5: Opcode 0x0c1a failed: -4 [ 2549.428097] Bluetooth: hci5: Opcode 0x0406 failed: -4 [ 2549.433089] Bluetooth: hci7: Opcode 0x0c1a failed: -4 [ 2549.436368] Bluetooth: hci6: Opcode 0x0c1a failed: -4 [ 2549.437375] Bluetooth: hci6: Opcode 0x0406 failed: -4 [ 2549.441793] Bluetooth: hci2: Opcode 0x0c1a failed: -4 [ 2549.442812] Bluetooth: hci2: Opcode 0x0406 failed: -4 [ 2550.598681] Bluetooth: hci0: command 0x0406 tx timeout [ 2551.430664] Bluetooth: hci5: command 0x0406 tx timeout [ 2551.431943] Bluetooth: hci4: command 0x0406 tx timeout [ 2551.432804] Bluetooth: hci1: command 0x0406 tx timeout [ 2551.494687] Bluetooth: hci2: command 0x0406 tx timeout [ 2551.494740] Bluetooth: hci6: command 0x0406 tx timeout [ 2551.495860] Bluetooth: hci7: command 0x0406 tx timeout [ 2552.646677] Bluetooth: hci0: command 0x0406 tx timeout [ 2553.478768] Bluetooth: hci1: command 0x0406 tx timeout [ 2553.479927] Bluetooth: hci4: command 0x0406 tx timeout [ 2553.480992] Bluetooth: hci5: command 0x0406 tx timeout [ 2553.542686] Bluetooth: hci6: command 0x0406 tx timeout [ 2553.543769] Bluetooth: hci2: command 0x0406 tx timeout 13:49:19 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote={0xac, 0x14, 0xa}}}}], 0x20}}], 0x1, 0x0) 13:49:19 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x1a) 13:49:19 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10}, &(0x7f00000001c0), 0x4000) 13:49:19 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x200000000000000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:49:19 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) readlink(0x0, 0x0, 0x0) 13:49:19 executing program 3: keyctl$get_keyring_id(0x0, 0x0, 0x1) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000006c0)=ANY=[@ANYBLOB="73c1a2c69f66e214b60fe9170000", @ANYRES32=r0, @ANYBLOB="254e1938057907becc68eccd083658474791aeaccdc60b7739041c7295d32d8a44bb79b25c6b3e2f2c3a9a2945b1e6ef188631dbe8a2f26f6456007ee347fc70e6804f6a5471390c020d13421d5e8321f2412a62a1d06551a4fd4f5b83b1d919ff54018b343deba1af11b30ad3bfe6c379b27138379decda63d6c95d05bc84ab2b2fd99e7251898c23b20e20e11acc702a864528dc20aea1c19091e57dee38faf5239f115f0372055d9e0f12e9fee626eb96db877317b3faacea0a56159ad6045a7213cdd7010d6365fa66956d493b430264186e9475f38445889481d9000000000000"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000040)) eventfd(0x4727) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="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", 0x200) fork() r2 = fork() ptrace(0x10, r2) ptrace(0x8, r2) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000340)='/sys/module/hid_cherry', 0x80, 0x140) wait4(r2, 0x0, 0x8, &(0x7f00000004c0)) 13:49:19 executing program 5: ioctl$SNDRV_TIMER_IOCTL_STATUS32(0xffffffffffffffff, 0x80585414, &(0x7f0000000240)) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) r1 = openat2(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x412000, 0x0, 0x12}, 0x18) ioctl$SNDRV_TIMER_IOCTL_STATUS32(r1, 0x80585414, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e85411, &(0x7f00000000c0)=""/128) ioctl$F2FS_IOC_FLUSH_DEVICE(r0, 0x4008f50a, &(0x7f00000002c0)={0x9, 0x1ff}) 13:49:19 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) statx(0xffffffffffffff9c, 0x0, 0x0, 0x200, &(0x7f0000000180)) [ 2558.514099] kauditd_printk_skb: 66 callbacks suppressed [ 2558.514114] audit: type=1326 audit(1764510559.432:8316): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=41201 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2558.527607] audit: type=1326 audit(1764510559.437:8317): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=41201 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=303 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2558.539239] audit: type=1326 audit(1764510559.437:8318): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=41201 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2558.553002] audit: type=1326 audit(1764510559.441:8319): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=41201 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=83 compat=0 ip=0x7f2d0b88fc27 code=0x7ffc0000 [ 2558.565833] audit: type=1326 audit(1764510559.442:8320): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=41201 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=165 compat=0 ip=0x7f2d0b89204a code=0x7ffc0000 [ 2558.574646] audit: type=1326 audit(1764510559.442:8321): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=41201 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f2d0b843a04 code=0x7ffc0000 [ 2558.590639] audit: type=1326 audit(1764510559.445:8322): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=41201 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2558.601640] audit: type=1326 audit(1764510559.449:8323): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=41201 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 13:49:19 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote={0xac, 0x14, 0x17}}}}], 0x20}}], 0x1, 0x0) [ 2558.611640] audit: type=1326 audit(1764510559.479:8324): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=41216 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2558.626675] audit: type=1326 audit(1764510559.481:8325): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=41216 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 13:49:19 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10}, &(0x7f00000001c0), 0xf2ff) 13:49:19 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x300000000000000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:49:19 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f0000000200)={{0x2, 0x1, 0x2, 0x3, 0x9}, 0x7b, 0xfffffffffffff240}) read(r0, &(0x7f0000000300)=""/67, 0x43) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/module/pcmcia', 0x505200, 0x18) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000180)={0x2, 0x401, 0x2, 0x0, 0x6}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f00000000c0)={0x7, 0x20, 0x6, 0x0, 0x1}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000280)={0x5, 0xfffbfc1b, 0x9, 0x0, 0x11}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000380)={{0xffffffffffffffff, 0x7, 0x7, 0x2, 0x10000}}) 13:49:19 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x1c) 13:49:19 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180)) 13:49:19 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote={0xac, 0x14, 0x37}}}}], 0x20}}], 0x1, 0x0) 13:49:19 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x500000000000000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:49:19 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000340)='/sys/power/mem_sleep', 0x900, 0x0) getdents64(r0, &(0x7f00000023c0)=""/4111, 0x100f) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000005c0)=ANY=[@ANYBLOB="73c4a2c69f66e2e9170000", @ANYRES32=r0, @ANYBLOB="254e1938057907becc68eccd083658474791aeaccdc60b7739041c7295d32d8a44bb79b25c6b3e2f2c3a9a2945b1e6ef188631dbe8a2f26f6456007ee347fc70e6804f6a5471390c020d13421d5e8321f2412a62a1d06551a4fd4f5b83b1d919ff54018b343deba1af11b30ad3bfe6c379b27138379decda63d6c95d05bc84ab2b2fd99e7251898c23b20e20e11acc702a864528dc20aea1c19091e57dee38faf5239f115f0372055d9e0f12e9fee626eb96db877317b3faacea0a56159ad6045a7213cdd7010d6365fa66956d493b430264186e9475f38445889481d9000000000000"]) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f00000006c0)={0x0, 0x0, 0xff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000040)) eventfd(0x4727) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="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", 0x200) fork() r2 = fork() ptrace(0x10, r2) ptrace(0x8, r2) wait4(r2, 0x0, 0x20000000, &(0x7f0000000400)) 13:49:19 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000200)=0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) fchownat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', r0, r1, 0x800) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x2, &(0x7f0000000440)={0x8, &(0x7f0000000400)=[{0x7, 0x3f, 0x14, 0x26}, {0x6, 0x9, 0x5, 0xcf45}, {0x4, 0x5, 0x40, 0x10001}, {0x1, 0x7, 0x2c, 0x7ff}, {0x8, 0xdb, 0xc, 0x5}, {0x8, 0x8, 0x5, 0x200}, {0x7, 0xae, 0x7f, 0x5}, {0x39, 0xd9, 0x80, 0x20}]}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0x5) setuid(r3) accept4$unix(0xffffffffffffffff, &(0x7f0000000600)=@abs, &(0x7f0000000300)=0x6e, 0x80000) r4 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_inet_SIOCSIFBRDADDR(r4, 0x891a, &(0x7f0000000680)={'ip6gretap0\x00', {0x2, 0x0, @initdev}}) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0xd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="b65b03c9617ad66f3f37a2eee9ce5c9731593672516e0ec2d12febfe0e52019649f3a0aa7712742eaa4625b40568434cfbb00cda0dedde2b259d60f36d78833a3078616237dd74faa10e2f4cfc6a9ef7ce1b009da805077dd22ed73b89924b64fe17749f1061e7201ffb7d5b843bb1eda99dceae4afaf53f549405fd50a9d3db8fffe1cb454d7644cd6426a139d0c80c0bba62ad6480f04708da2c", 0x9b}], 0x2, &(0x7f00000004c0)=ANY=[@ANYBLOB="687567653d6e657665722c6d6f64653d30303030303030303030303030303030303030303030372c6e725f696e6f6465733d672d317034003437322c61707072616973652c66736e616d653d2c646566636f6e746578743d756e636f6e66696e65645f752c7375626a5f757365723d245ec32a2b402c666f776e65723d", @ANYRESDEC=r0, @ANYBLOB=',euid>', @ANYRESDEC=r3, @ANYBLOB="2c7063723c30aa18fc60ee9bd0444630ff30303030303031322c66736e61d6d7da6261dec8552e936d653d242c262c7569ef4e", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r5, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @remote}}}], 0x20}}], 0x1, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000002c0)={&(0x7f0000000240), 0xc, &(0x7f0000000280)={&(0x7f0000000980)=ANY=[@ANYBLOB="ec0200001400000827bd7000fedbdf25e0000002000000000000000000000000ffffffff0000000000000000000000004e2400004e2100060200a08016000000", @ANYRES32=0x0, @ANYRES32=r3, @ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="0500000064a72244d06fd1037f5e4fef263665ec0812ff874fcda1ca1ec5fd5b742e28a6d53c1fd15e05afe40b4dfb537acb39b88f0a2f0abb43c2829bc1bddcca3659d14e31f5f14242cc5ffcf0682c55f79a27376877875c632ff5c9fd1ee790212c9cb7f2978d86a3daa16dd57423af0708a31f07b1a7b80cdf6b43a7d34f777cf432d52be3d08439412b8b74a50cd53cd04208cf081c9dc583809c3fa27da3e2952d7c9d24d214a8e5e16ddefa"], 0x2ec}, 0x1, 0x0, 0x0, 0x24000000}, 0x40000) 13:49:19 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x800000000000000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:49:19 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10}, &(0x7f00000001c0), 0xfff2) 13:49:19 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x1e) 13:49:31 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f00000000c0)={0x4, 0x1f, 0x8, 0x0, 0x3}) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000140)={{0x1, 0x0, 0x1, 0x1}}) 13:49:31 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) 13:49:31 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10}, &(0x7f00000001c0), 0x80000) 13:49:31 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000005c0)=ANY=[@ANYBLOB="73c4a2c69f66e2e9170000", @ANYRES32=r0, @ANYBLOB="254e1938057907becc68eccd083658474791aeaccdc60b7739041c0995d32d8a44bb79b25c6b3e2f2c3a9a2945b1e6ef188631dbe8a2f26f6c56007ee347fc70e6804f6a5471390c020d13421d5e8321f2412a62a1d06551a4fd4f5b83b1d919ff54018b343deba1af11b30ad3bfe6c379b27138379decda63d6c95d05bc84ab2b2fd99e7251898c23b20e20e11acc702a864528dc20aea1c19091e57dee38faf5239f115d0372055d9e0f12e9fee626eb96db877317b3faacdb2f5ff791cdcc387149b2ea0a56159ad6045a7213cdd7010d6365fa66956d493b430264186e9475f384"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000040)) eventfd(0x4727) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="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", 0x200) fork() r2 = fork() ptrace(0x10, r2) ptrace(0x8, r2) wait4(r2, 0x0, 0x0, &(0x7f00000004c0)) 13:49:31 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x8}}], 0x1, 0x0) 13:49:31 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) r0 = syz_open_dev$loop(&(0x7f0000000040), 0x75d0, 0x40) socketpair(0x29, 0x80000, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f00000000c0)={r1, 0x9, 0x401, 0x15}) readlink(0x0, 0x0, 0x0) 13:49:31 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0xa00000000000000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:49:31 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x2a) [ 2571.038377] kauditd_printk_skb: 97 callbacks suppressed [ 2571.038392] audit: type=1326 audit(1764510571.953:8423): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=41474 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2571.050368] audit: type=1326 audit(1764510571.954:8424): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=41474 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f68ebb80a04 code=0x7ffc0000 [ 2571.066424] audit: type=1326 audit(1764510571.955:8425): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=41474 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2571.076929] audit: type=1326 audit(1764510571.963:8426): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=41474 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=53 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2571.099762] audit: type=1326 audit(1764510571.967:8427): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=41475 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2571.125439] audit: type=1326 audit(1764510571.967:8428): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=41475 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2571.143342] audit: type=1326 audit(1764510571.968:8429): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=41475 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=303 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2571.162227] audit: type=1326 audit(1764510571.968:8430): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=41475 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 13:49:32 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0xb00000000000000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) [ 2571.178687] audit: type=1326 audit(1764510571.978:8431): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=41475 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=83 compat=0 ip=0x7f2d0b88fc27 code=0x7ffc0000 13:49:32 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10}, &(0x7f00000001c0), 0x1000000) [ 2571.200688] audit: type=1326 audit(1764510571.978:8432): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=41475 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=165 compat=0 ip=0x7f2d0b89204a code=0x7ffc0000 13:49:32 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x9}}], 0x1, 0x0) 13:49:32 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x2c) 13:49:32 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) 13:49:32 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x7, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="1cd1336ed26dc005138ba20546792bc4a5414ed07dabee9acdc6574986c5adf3f3cb7eba35d2968971e980ae7ffeeea5113426ac445bb5a07fd6536b8a3e01eeed1b40a54928b13f1ea226e6c50570f904fdabc00708c0bdf9e705a5374013a693decd0073d0cec935ad5d7e036e49ec55fb06b599ee0d1e52f8906734967258302e2fabe5b7db93026e49d20ae17edcec790bc1", 0x94, 0x7}, {&(0x7f0000000200)="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", 0x1000, 0x800}], 0x1220000, &(0x7f0000001200)={[{@uid={'uid', 0x3d, 0xee01}}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x1f, 0x25, 0x32]}}, {@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x70, 0x36, 0x6b]}}, {@huge_always}, {@huge_advise}, {@size={'size', 0x3d, [0x34, 0x70, 0x25, 0x36, 0x6b, 0x30, 0x2d, 0x35]}}, {@huge_never}], [{@dont_appraise}, {@smackfstransmute={'smackfstransmute', 0x3d, ']'}}, {@subj_type={'subj_type', 0x3d, ':}($'}}, {@pcr={'pcr', 0x3d, 0xf}}, {@subj_type}, {@euid_gt={'euid>', 0xffffffffffffffff}}]}) 13:49:32 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f00000000c0)=0x1) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000140)={0x6, 0x9c8, 0x101}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000100)={0x1, 0x9, 0xffffffff, 0x0, 0x11}) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) 13:49:32 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0xf}}], 0x1, 0x0) 13:49:32 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x2e) [ 2571.607274] loop0: detected capacity change from 0 to 12 [ 2571.659044] loop0: detected capacity change from 0 to 12 13:49:41 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x100, 0x2, 0x0, 0x7ffcfffc}]}) 13:49:41 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x1c}}], 0x1, 0x0) 13:49:41 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000040)) eventfd(0x4727) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="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", 0x200) fork() r2 = fork() ptrace(0x10, r2) ptrace(0x8, r2) wait4(r2, 0x0, 0x20000000, &(0x7f0000000400)) 13:49:41 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10}, &(0x7f00000001c0), 0x2000000) 13:49:41 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) 13:49:41 executing program 5: fstatfs(0xffffffffffffffff, &(0x7f00000000c0)=""/49) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) 13:49:41 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x30) 13:49:41 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0xc00000000000000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) [ 2580.154742] kauditd_printk_skb: 57 callbacks suppressed [ 2580.154756] audit: type=1326 audit(1764510581.073:8490): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=41633 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2580.162514] audit: type=1326 audit(1764510581.077:8491): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=41633 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=332 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2580.168688] audit: type=1326 audit(1764510581.077:8492): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=41633 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 13:49:41 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) write(r0, &(0x7f00000000c0)="ef", 0x1) (fail_nth: 1) [ 2580.233839] audit: type=1326 audit(1764510581.152:8493): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=41635 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 13:49:41 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 1) [ 2580.243194] audit: type=1326 audit(1764510581.153:8494): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=41635 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=303 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2580.256625] audit: type=1326 audit(1764510581.153:8495): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=41635 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2580.265471] audit: type=1326 audit(1764510581.162:8496): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=41635 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=83 compat=0 ip=0x7f2d0b88fc27 code=0x7ffc0000 [ 2580.275694] audit: type=1326 audit(1764510581.164:8497): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=41635 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=165 compat=0 ip=0x7f2d0b89204a code=0x7ffc0000 13:49:41 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x60) [ 2580.285944] audit: type=1326 audit(1764510581.172:8498): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=41635 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f2d0b843a04 code=0x7ffc0000 [ 2580.295364] FAULT_INJECTION: forcing a failure. [ 2580.295364] name failslab, interval 1, probability 0, space 0, times 0 [ 2580.296491] CPU: 1 UID: 0 PID: 41665 Comm: syz-executor.5 Not tainted 6.18.0-rc7-next-20251128 #1 PREEMPT(voluntary) [ 2580.296507] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2580.296515] Call Trace: [ 2580.296519] [ 2580.296524] dump_stack_lvl+0xfa/0x120 [ 2580.296555] should_fail_ex+0x4d7/0x5e0 [ 2580.296574] should_failslab+0xc2/0x120 [ 2580.296592] __kvmalloc_node_noprof+0x11f/0x900 [ 2580.296607] ? __pfx__mutex_trylock_nest_lock+0x10/0x10 [ 2580.296627] ? file_tty_write.constprop.0+0x6d8/0x990 [ 2580.296653] ? file_tty_write.constprop.0+0x6d8/0x990 [ 2580.296671] file_tty_write.constprop.0+0x6d8/0x990 [ 2580.296691] ? security_file_permission+0x22/0x90 [ 2580.296712] vfs_write+0xbe9/0x1150 [ 2580.296729] ? __pfx_tty_write+0x10/0x10 [ 2580.296746] ? __fget_files+0x34/0x3b0 [ 2580.296762] ? __pfx_vfs_write+0x10/0x10 [ 2580.296790] ksys_write+0x121/0x240 [ 2580.296804] ? __pfx_ksys_write+0x10/0x10 [ 2580.296825] do_syscall_64+0xbf/0x420 [ 2580.296839] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2580.296852] RIP: 0033:0x7fd170fb4b19 [ 2580.296861] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2580.296873] RSP: 002b:00007fd16e52a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2580.296885] RAX: ffffffffffffffda RBX: 00007fd1710c7f60 RCX: 00007fd170fb4b19 [ 2580.296893] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000003 [ 2580.296900] RBP: 00007fd16e52a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2580.296907] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2580.296914] R13: 00007ffe09a2bc9f R14: 00007fd16e52a300 R15: 0000000000022000 [ 2580.296932] [ 2580.314941] audit: type=1326 audit(1764510581.173:8499): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=41635 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2580.317359] FAULT_INJECTION: forcing a failure. [ 2580.317359] name failslab, interval 1, probability 0, space 0, times 0 [ 2580.318448] CPU: 1 UID: 0 PID: 41669 Comm: syz-executor.1 Not tainted 6.18.0-rc7-next-20251128 #1 PREEMPT(voluntary) [ 2580.318486] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2580.318503] Call Trace: [ 2580.318511] [ 2580.318521] dump_stack_lvl+0xfa/0x120 [ 2580.318575] should_fail_ex+0x4d7/0x5e0 [ 2580.318613] ? audit_log_start.part.0+0x257/0x910 [ 2580.318647] should_failslab+0xc2/0x120 [ 2580.318663] kmem_cache_alloc_noprof+0x80/0x710 [ 2580.318675] ? lock_release+0xc8/0x270 [ 2580.318691] ? lock_is_held_type+0x9e/0x120 [ 2580.318713] ? audit_log_start.part.0+0x257/0x910 [ 2580.318728] audit_log_start.part.0+0x257/0x910 [ 2580.318745] ? __pfx_audit_log_start.part.0+0x10/0x10 [ 2580.318760] ? __bpf_prog_run32+0x9c/0xe0 [ 2580.318775] ? __pfx___bpf_prog_run32+0x10/0x10 [ 2580.318788] ? find_held_lock+0x2b/0x80 [ 2580.318800] ? __pfx_audit_filter+0x10/0x10 [ 2580.318812] ? lock_is_held_type+0x9e/0x120 [ 2580.318833] audit_log_start+0x63/0x90 [ 2580.318849] audit_seccomp+0x60/0x200 [ 2580.318865] __seccomp_filter+0x9f2/0x1260 [ 2580.318881] ? __pfx___seccomp_filter+0x10/0x10 [ 2580.318897] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 2580.318915] ? ksys_write+0x1a3/0x240 [ 2580.318932] __secure_computing+0x1ac/0x290 [ 2580.318944] syscall_trace_enter+0x8d/0x230 [ 2580.318960] do_syscall_64+0x326/0x420 [ 2580.318974] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2580.318985] RIP: 0033:0x7f5a06d52b19 [ 2580.318994] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2580.319013] RSP: 002b:00007f5a042c8188 EFLAGS: 00000246 ORIG_RAX: 000000000000014c [ 2580.319024] RAX: ffffffffffffffda RBX: 00007f5a06e65f60 RCX: 00007f5a06d52b19 [ 2580.319032] RDX: 0000000000000000 RSI: 0000000020000040 RDI: ffffffffffffff9c [ 2580.319039] RBP: 00007f5a042c81d0 R08: 0000000020000180 R09: 0000000000000000 [ 2580.319046] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2580.319053] R13: 00007fff87e2b2df R14: 00007f5a042c8300 R15: 0000000000022000 [ 2580.319070] 13:49:41 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x0) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/19, 0x13) 13:49:41 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x24}}], 0x1, 0x0) 13:49:41 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x300) 13:49:41 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) write(r0, &(0x7f00000000c0)="ef", 0x1) (fail_nth: 2) 13:49:41 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10}, &(0x7f00000001c0), 0x3000000) 13:49:50 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) write(r0, &(0x7f00000000c0)="ef", 0x1) 13:49:50 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0xd00000000000000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:49:50 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x30}}], 0x1, 0x0) 13:49:50 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 2) 13:49:50 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000005c0)=ANY=[@ANYBLOB="73c4a2c69f66e2e9170000", @ANYRES32=r0, @ANYBLOB="254e1938057907becc68eccd083658474791aeaccdc60b7739041c7295d32d8a44bb79b25c6b3e2f2c3a9a2945b1e6ef188631dbe8a2f26f6456007ee347fc70e6804f6a5471390c020d13421d5e8321f2412a62a1d06551a4fd415b83b1d919ff54018b343deba1af11b30ad3bfe6c379b27138379decda63d6c95d05bc84ab2b2fd99e7251898c23b20e20e11acc702a864528dc20aea1c19091e57dee38faf5239f115f0372055d9e0f12e9fee626eb96db877317b3faacea0a56159ad6045a7213cdd7010d6365fa66956d493b430264186e9475f38445889481d9000000000000"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000040)) eventfd(0x4727) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="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", 0x200) fork() r2 = fork() ptrace(0x10, r2) ptrace(0x8, r2) wait4(r2, 0x0, 0x20000000, &(0x7f0000000400)) 13:49:50 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0xff, 0x0, 0x3f, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000000c0)={0x4, &(0x7f0000000080)=[{0xfeff, 0x3, 0x3, 0xc1e}, {0xffff, 0x1f, 0xfa, 0x6}, {0x5, 0x3f, 0x6b, 0x2}, {0x7ff, 0x5, 0x5}]}) 13:49:50 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x500) 13:49:50 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10}, &(0x7f00000001c0), 0x4000000) [ 2589.641479] kauditd_printk_skb: 40 callbacks suppressed [ 2589.641493] audit: type=1326 audit(1764510590.559:8538): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=41784 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2589.652346] audit: type=1326 audit(1764510590.560:8539): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=41784 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f5a06d05a04 code=0x7ffc0000 [ 2589.660481] audit: type=1326 audit(1764510590.565:8540): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=41784 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f5a06d055ff code=0x7ffc0000 [ 2589.670145] audit: type=1326 audit(1764510590.565:8541): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=41784 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=332 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2589.678623] audit: type=1326 audit(1764510590.565:8542): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=41784 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=0 compat=0 ip=0x7f5a06d0569c code=0x7ffc0000 13:49:50 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0xa00) [ 2589.688097] audit: type=1326 audit(1764510590.567:8543): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=41784 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f5a06d055ff code=0x7ffc0000 [ 2589.699539] audit: type=1326 audit(1764510590.571:8544): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=41784 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7f5a06d0572b code=0x7ffc0000 13:49:50 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 3) [ 2589.710671] audit: type=1326 audit(1764510590.574:8545): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=41784 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2589.730642] audit: type=1326 audit(1764510590.625:8546): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=41794 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2589.740115] audit: type=1326 audit(1764510590.628:8547): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=41794 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=303 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 13:49:50 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000080)={0x5, &(0x7f0000000040)=[{0x0, 0x81, 0x1, 0xbd}, {0x20, 0x3, 0x70, 0x7}, {0x6, 0x0, 0x0, 0xfc}, {0x7f, 0x40, 0x3, 0x7}, {0x7d52, 0x3f, 0xfc, 0x7ff}]}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x5, 0x5, 0x9, 0x1}]}) [ 2589.788433] FAULT_INJECTION: forcing a failure. [ 2589.788433] name failslab, interval 1, probability 0, space 0, times 0 [ 2589.789440] CPU: 1 UID: 0 PID: 41807 Comm: syz-executor.1 Not tainted 6.18.0-rc7-next-20251128 #1 PREEMPT(voluntary) [ 2589.789457] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2589.789465] Call Trace: [ 2589.789469] [ 2589.789474] dump_stack_lvl+0xfa/0x120 [ 2589.789501] should_fail_ex+0x4d7/0x5e0 [ 2589.789519] should_failslab+0xc2/0x120 [ 2589.789537] kmem_cache_alloc_node_noprof+0x87/0x730 [ 2589.789557] ? __alloc_skb+0x159/0x430 [ 2589.789574] ? __alloc_skb+0x159/0x430 [ 2589.789585] __alloc_skb+0x159/0x430 [ 2589.789597] ? __alloc_skb+0x369/0x430 [ 2589.789608] ? __pfx___alloc_skb+0x10/0x10 [ 2589.789622] ? kmem_cache_alloc_noprof+0x49a/0x710 [ 2589.789633] ? lock_is_held_type+0x9e/0x120 [ 2589.789652] ? lockdep_init_map_type+0x4b/0x220 [ 2589.789674] audit_log_start.part.0+0x312/0x910 [ 2589.789693] ? __pfx_audit_log_start.part.0+0x10/0x10 [ 2589.789708] ? __bpf_prog_run32+0x9c/0xe0 [ 2589.789723] ? __pfx___bpf_prog_run32+0x10/0x10 [ 2589.789736] ? find_held_lock+0x2b/0x80 [ 2589.789747] ? __pfx_audit_filter+0x10/0x10 [ 2589.789758] ? lock_is_held_type+0x9e/0x120 [ 2589.789780] audit_log_start+0x63/0x90 [ 2589.789796] audit_seccomp+0x60/0x200 [ 2589.789812] __seccomp_filter+0x9f2/0x1260 [ 2589.789828] ? __pfx___seccomp_filter+0x10/0x10 [ 2589.789843] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 2589.789862] ? ksys_write+0x1a3/0x240 [ 2589.789881] __secure_computing+0x1ac/0x290 [ 2589.789893] syscall_trace_enter+0x8d/0x230 [ 2589.789909] do_syscall_64+0x326/0x420 [ 2589.789922] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2589.789935] RIP: 0033:0x7f5a06d52b19 [ 2589.789945] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2589.789957] RSP: 002b:00007f5a042c8188 EFLAGS: 00000246 ORIG_RAX: 000000000000014c [ 2589.789969] RAX: ffffffffffffffda RBX: 00007f5a06e65f60 RCX: 00007f5a06d52b19 [ 2589.789977] RDX: 0000000000000000 RSI: 0000000020000040 RDI: ffffffffffffff9c [ 2589.789984] RBP: 00007f5a042c81d0 R08: 0000000020000180 R09: 0000000000000000 [ 2589.789992] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2589.789999] R13: 00007fff87e2b2df R14: 00007f5a042c8300 R15: 0000000000022000 [ 2589.790015] 13:49:50 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:50:02 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) write(r0, &(0x7f00000000c0)="ef", 0x2) 13:50:02 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f0000000ac0)=ANY=[@ANYBLOB="73385f47a836e8bea7000003c8f7cdc839d76264359eae543c9df4ca086aa87cb449345dc91c02fa256126e245d364ca31a54ba8ea8a4c74a76eada1ab6fb0617bcc99f0cea1491d5d846c531ffab2f53b895cb6c46a0723ae107f0d57a62e885dea89bece8ace6529672a672ddd3090e2d5782951b83ee3ab21a3d829ce5b2475b6903ea8552cc9d248fe647ca39550af6535be51a4fd37ef47ef7108ede7aa6e6672c490beff522b998abcb025e6af0ba2c68b44cbb66fc0f0c8ad556ef68eb1adc5486be95b4655b6ee70f47c6ad1ccb99e8ca87c3bb113c265e28b351064488257b1463b373c6b6e116189cf26a518db26caaa1817d5115a34ecf44962f4be6f1d4fe8f4d9dbacad6176a78eb63ce17eb20cf1df89b31e23bab11ad2af2ce7051e96501b8d8658487f062cc1c5b8b69fe3e1b419fe782d07c12bb8821d3664a64f2248cadf562c06e7b8415acfcb3942ba33cbf45b54a66062f075084b4662163bcbb302eda5ce", @ANYRES32=r0, @ANYBLOB="254e1938057907becc68eccd083658474791aeaccdc60b7739041c7295d32d8a44bb79b25c6b3e2f2c3a9a2945b1e6ef188631dbe8a2f26f6456007ee347fc70e6804f6a5471390c020d13e5059a6dc3c80a74eed24194421d5e8321f2412a62a1d06551a4fd4f5b83b1d919ff54018b343deba1af11b30ad3bee6c379b27138379decda63d6c95d05bc84ab2b2fd99e7251898c23b20e20e11acc702a964528dc20aea1c19091e57dee38faf5239f115f0372055d9e0f12e9fee626eb96db877317b3faacea0a56159ad6045a7213cdd7010d6365fa66956d493b430264186e9475f38445889481d9000000000000"]) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000040)) eventfd(0x4727) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="5ed0b2ff68d76fb346352b602a2a1295cbe01cb3f64fbed9e7f9bc9be0f300cb97f6a204cc585145dfb949002f6117fc969dd435dd0c37c5077e5b10cfeafd75205e215b167323a3b971b0ec8583851f2567d30bf5baf28aabb598e6c3d4d825cae01271cb35cdd091e4872367f354e0dc81a7e4ac79775bc1dcaafe2f5079da7dd1989f1ddce6722fc438a7217526cfe75d53471624d6f091e19a7fb699ea27efa9e0fd1914e7c35f297afd9b9bad399bcc85ff0ce7a982f4fa0c172ea5f06479eec302f30e5df66273717e028f4ca7d4c5b6bc8a3c3c67f688195f22488a15d9e1f7e5fed3a6c2aba7bc308b0e2c5657f4538f4a3bf9b975bb887a901ab3c85261be3e331b741313e78b5ad63b7b1b378e9479dc4a95b2b4d15cd1d1b808844378f882a72af1e5b0eefd356e0247246e60643204c3b46183dbe4e066c55cb1dcdaa7b70ef43ab2fa4d2b8c4c1a89cb0e325fd9716874d3856cf368efcdf92d21214e55e4de647c37c71887d11f74f9afe1616e3054ceae601e4b3555e243c1882ad42c7730caeb309e7714ad87c55e9fba308cfc4161e562abde3ac4f3d7e0a3584d49f90692e4c7a4591928100197f102309b05c0b4b4898b0591bc1433af443478979f28e6136ffb21aaeac2be5490475a08e96bb94fd9d9d3aa2f8a1e147a80ba9bfd04dac3f476ff128476c693ea71f7be47a508c98eddc479eb703d6f", 0x200) r2 = fork() r3 = fork() readv(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000000180)=""/201, 0xc9}], 0x1) write$P9_RUNLINKAT(0xffffffffffffffff, 0x0, 0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000080)={r2}) ptrace(0x10, r3) ptrace(0x8, r3) wait4(r3, 0x0, 0x20000000, &(0x7f0000000400)) 13:50:02 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10}, &(0x7f00000001c0), 0x5000000) 13:50:02 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x0, &(0x7f0000000100)}) readlink(0x0, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0xa, &(0x7f0000009dc0), 0x4) recvmsg(r0, &(0x7f0000001500)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @empty}, 0x80, &(0x7f0000001400)=[{&(0x7f0000000100)=""/248, 0xf8}, {&(0x7f0000000200)=""/103, 0x67}, {&(0x7f0000000280)=""/110, 0x6e}, {&(0x7f0000000000)=""/50, 0x32}, {&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000001300)=""/27, 0x1b}, {&(0x7f0000001340)=""/184, 0xb8}], 0x7, &(0x7f0000001480)=""/70, 0x46}, 0x0) 13:50:02 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0xe00000000000000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:50:02 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0xb00) 13:50:02 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 4) 13:50:02 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20, 0x2}}], 0x1, 0x0) 13:50:02 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20, 0x3}}], 0x1, 0x0) [ 2601.362068] kauditd_printk_skb: 34 callbacks suppressed [ 2601.362084] audit: type=1326 audit(1764510602.281:8580): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=41929 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2601.369242] audit: type=1326 audit(1764510602.281:8581): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=41929 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2601.379486] audit: type=1326 audit(1764510602.282:8582): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=41929 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=303 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2601.387582] audit: type=1326 audit(1764510602.284:8583): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=41929 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2601.399903] audit: type=1326 audit(1764510602.285:8584): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=41929 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2601.408999] audit: type=1326 audit(1764510602.285:8585): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=41929 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=83 compat=0 ip=0x7f2d0b88fc27 code=0x7ffc0000 [ 2601.422130] audit: type=1326 audit(1764510602.286:8586): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=41929 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=165 compat=0 ip=0x7f2d0b89204a code=0x7ffc0000 13:50:02 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0xc00) 13:50:02 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 5) [ 2601.455997] audit: type=1326 audit(1764510602.288:8587): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=41929 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f2d0b843a04 code=0x7ffc0000 13:50:02 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10}, &(0x7f00000001c0), 0x6000000) [ 2601.466305] audit: type=1326 audit(1764510602.288:8588): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=41929 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2601.473808] audit: type=1326 audit(1764510602.292:8589): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=41929 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=259 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 13:50:02 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000005c0)=ANY=[@ANYBLOB="73c4a2c69f66e2e9170000", @ANYRES32=r0, @ANYBLOB="254e1938057907becc68eccd083658474791aeaccdc60b7739041c7295d32d8a44bb79b25c6b3e2f2c3a9a2945b1e6ef188631dbe8a2f26f6456007ee347fc70e6804f6a5471390c020d13421d5e8321f2412a62a1d06551a4fd4f5b83b1d919ff54018b343deba1af11b30ad3bfe6c379b27138379decda63d6c95d05bc84ab2b2fd99e7251898c23b20e20e11acc702a864528dc20aea1c19091e57dee38faf5239f115f0372055d9e0f12e9fee626eb96db877317b3faacea0a56159ad6045a7213cdd7010d6365fa66956d493b430264186e9475f38445889481d9000000000000"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000040)) r2 = eventfd(0x4727) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r0, 0x8982, &(0x7f0000000340)) ioctl$FIONCLEX(r2, 0x5450) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="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", 0x200) fork() r3 = fork() ptrace(0x10, r3) ptrace(0x8, r3) wait4(r3, 0x0, 0x20000000, &(0x7f0000000400)) 13:50:02 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0xd00) 13:50:02 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x1000000000000000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:50:02 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20, 0x4}}], 0x1, 0x0) 13:50:13 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10}, &(0x7f00000001c0), 0x7000000) 13:50:13 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) readlink(0x0, 0x0, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="fc87ca4e7332ec7101d883430a587f3d0b"]) unlinkat(r0, &(0x7f0000000200)='./file0\x00', 0x0) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 13:50:13 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) write(r0, &(0x7f00000000c0)="ef", 0x3) 13:50:13 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 6) 13:50:13 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0xe00) 13:50:13 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x1100000000000000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:50:13 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000005c0)=ANY=[@ANYBLOB="73c4a2c69f66e2e9170000", @ANYRES32=r0, @ANYBLOB="254e1938057907becc68eccd083658474791aeaccdc60b7739041c7295d32d8a44bb79b25c6b3e2f2c3a9a2945b1e6ef188631dbe8a2f26f6456007ee347fc70e6804f6a5471390c020d13421d5e8321f2412a62a1d06551a4fd4f5b83b1d919ff54018b343deba1af11b30ad3bfe6c379b27138379decda63d6c95d05bc84ab2b2fd99e7251898c23b20e20e11acc702a864528dc20aea1c19091e57dee38faf5239f115f0372055d9e0f12e9fee626eb96db877317b3faacea0a56159ad6045a7213cdd7010d6365fa66956d493b430264186e9475f38445889481d9000000000000"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000040)) eventfd(0x4727) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0xa0000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="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", 0x200) fork() r2 = fork() ptrace(0x10, r2) ptrace(0x8, r2) wait4(r2, 0x0, 0x20000000, &(0x7f0000000400)) 13:50:13 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20, 0x5}}], 0x1, 0x0) [ 2612.463437] tmpfs: Unknown parameter 'ü‡ÊNs2ìq؃C [ 2612.463437] X' [ 2612.472769] kauditd_printk_skb: 36 callbacks suppressed [ 2612.472788] audit: type=1326 audit(1764510613.385:8624): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=42177 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2612.493753] tmpfs: Unknown parameter 'ü‡ÊNs2ìq؃C [ 2612.493753] X' [ 2612.495370] audit: type=1326 audit(1764510613.389:8625): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=42177 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f5a06d05a04 code=0x7ffc0000 [ 2612.513991] audit: type=1326 audit(1764510613.391:8626): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=42176 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2612.533895] audit: type=1326 audit(1764510613.392:8627): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=42177 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f5a06d055ff code=0x7ffc0000 13:50:13 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 7) [ 2612.552856] audit: type=1326 audit(1764510613.392:8628): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=42177 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=332 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 13:50:13 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x1100) 13:50:13 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20, 0x8}}], 0x1, 0x0) [ 2612.572141] audit: type=1326 audit(1764510613.393:8629): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=42176 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=303 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2612.592755] audit: type=1326 audit(1764510613.393:8630): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=42176 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 13:50:13 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10}, &(0x7f00000001c0), 0x8000000) [ 2612.613399] audit: type=1326 audit(1764510613.393:8631): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=42177 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=0 compat=0 ip=0x7f5a06d0569c code=0x7ffc0000 [ 2612.635707] audit: type=1326 audit(1764510613.393:8632): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=42177 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f5a06d055ff code=0x7ffc0000 [ 2612.651030] audit: type=1326 audit(1764510613.393:8633): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=42177 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7f5a06d0572b code=0x7ffc0000 13:50:13 executing program 0: r0 = timerfd_create(0x8, 0x80800) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='setgroups\x00') readv(r1, &(0x7f0000000680)=[{&(0x7f0000000180)=""/201, 0xc9}], 0x1) write$P9_RUNLINKAT(r1, 0x0, 0x0) timerfd_settime(r1, 0x0, &(0x7f00000000c0), &(0x7f0000000100)) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000040)=0x2) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) readlink(0x0, 0x0, 0x0) 13:50:13 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x1200000000000000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) [ 2612.703602] FAULT_INJECTION: forcing a failure. [ 2612.703602] name failslab, interval 1, probability 0, space 0, times 0 [ 2612.705322] CPU: 0 UID: 0 PID: 42238 Comm: syz-executor.1 Not tainted 6.18.0-rc7-next-20251128 #1 PREEMPT(voluntary) [ 2612.705352] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2612.705365] Call Trace: [ 2612.705373] [ 2612.705381] dump_stack_lvl+0xfa/0x120 [ 2612.705427] should_fail_ex+0x4d7/0x5e0 [ 2612.705460] should_failslab+0xc2/0x120 [ 2612.705492] __kmalloc_node_track_caller_noprof+0xd7/0x820 [ 2612.705520] ? lock_acquire+0x15e/0x2d0 [ 2612.705555] ? sidtab_sid2str_get+0x85/0x6f0 [ 2612.705581] ? sidtab_sid2str_get+0x17e/0x6f0 [ 2612.705614] ? kmemdup_noprof+0x2b/0x60 [ 2612.705646] kmemdup_noprof+0x2b/0x60 [ 2612.705679] sidtab_sid2str_get+0x17e/0x6f0 [ 2612.705711] sidtab_entry_to_string+0x33/0x110 [ 2612.705739] security_sid_to_context_core+0x350/0x620 [ 2612.705769] selinux_lsmprop_to_secctx+0xdf/0x1c0 [ 2612.705797] ? __pfx_selinux_lsmprop_to_secctx+0x10/0x10 [ 2612.705827] ? skb_put+0x138/0x1b0 [ 2612.705865] security_lsmprop_to_secctx+0x140/0x190 [ 2612.705892] audit_log_subj_ctx.part.0+0x230/0x3a0 [ 2612.705928] ? __pfx_audit_log_subj_ctx.part.0+0x10/0x10 [ 2612.705968] audit_log_task_context+0xb8/0x100 [ 2612.705997] ? __pfx_audit_log_task_context+0x10/0x10 [ 2612.706025] ? from_kuid+0x8d/0xd0 [ 2612.706060] ? __pfx_audit_log_start.part.0+0x10/0x10 [ 2612.706095] audit_log_task+0x1c9/0x3c0 [ 2612.706117] ? __pfx_audit_log_task+0x10/0x10 [ 2612.706149] audit_seccomp+0x79/0x200 [ 2612.706178] __seccomp_filter+0x9f2/0x1260 [ 2612.706206] ? __pfx___seccomp_filter+0x10/0x10 [ 2612.706235] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 2612.706268] ? ksys_write+0x1a3/0x240 [ 2612.706301] __secure_computing+0x1ac/0x290 [ 2612.706325] syscall_trace_enter+0x8d/0x230 [ 2612.706354] do_syscall_64+0x326/0x420 [ 2612.706378] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2612.706401] RIP: 0033:0x7f5a06d52b19 [ 2612.706418] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2612.706439] RSP: 002b:00007f5a042c8188 EFLAGS: 00000246 ORIG_RAX: 000000000000014c [ 2612.706460] RAX: ffffffffffffffda RBX: 00007f5a06e65f60 RCX: 00007f5a06d52b19 [ 2612.706475] RDX: 0000000000000000 RSI: 0000000020000040 RDI: ffffffffffffff9c [ 2612.706488] RBP: 00007f5a042c81d0 R08: 0000000020000180 R09: 0000000000000000 [ 2612.706501] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2612.706514] R13: 00007fff87e2b2df R14: 00007f5a042c8300 R15: 0000000000022000 [ 2612.706546] 13:50:13 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20, 0xa}}], 0x1, 0x0) 13:50:13 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x1200) 13:50:23 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000380)='/sys/module/xhci_pci', 0x28c000, 0x2) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f0000000700)=ANY=[@ANYBLOB="73c4a2c69f66e2e9170000", @ANYRES32=r0, @ANYBLOB="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"]) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000040)) eventfd(0x4727) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="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", 0x200) fork() r3 = fork() ptrace(0x10, r3) ptrace(0x8, r3) pread64(r1, &(0x7f00000004c0)=""/165, 0xa5, 0x3) wait4(r3, 0x0, 0x20000000, &(0x7f0000000400)) 13:50:23 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10}, &(0x7f00000001c0), 0xa000000) 13:50:23 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) r1 = memfd_secret(0x0) ioctl$TIOCL_PASTESEL(r1, 0x541c, &(0x7f0000000000)) write(r0, &(0x7f00000000c0)="ef", 0x1) 13:50:23 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x1400000000000000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:50:23 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 8) 13:50:23 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20, 0xb}}], 0x1, 0x0) 13:50:23 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x1400) 13:50:23 executing program 0: prctl$PR_GET_THP_DISABLE(0x2a) getpeername(0xffffffffffffffff, &(0x7f0000000000)=@ethernet, &(0x7f0000000080)=0x80) readlink(0x0, 0x0, 0x0) 13:50:23 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x1600) [ 2622.818123] kauditd_printk_skb: 34 callbacks suppressed [ 2622.818137] audit: type=1326 audit(1764510623.737:8667): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=42335 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2622.833753] audit: type=1326 audit(1764510623.737:8668): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=42335 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f5a06d05a04 code=0x7ffc0000 [ 2622.846180] audit: type=1326 audit(1764510623.738:8669): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=42335 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f5a06d055ff code=0x7ffc0000 13:50:23 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x1600000000000000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) [ 2622.857219] audit: type=1326 audit(1764510623.740:8670): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=42335 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=332 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2622.869844] audit: type=1326 audit(1764510623.749:8671): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=42335 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=0 compat=0 ip=0x7f5a06d0569c code=0x7ffc0000 13:50:23 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x402000, 0x105) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0xa, &(0x7f0000009dc0), 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x4, 0xfc, 0x1, 0x216f9960}]}, 0x10) [ 2622.881772] audit: type=1326 audit(1764510623.750:8672): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=42335 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f5a06d055ff code=0x7ffc0000 13:50:23 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20, 0xc}}], 0x1, 0x0) [ 2622.893055] audit: type=1326 audit(1764510623.750:8673): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=42335 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7f5a06d0572b code=0x7ffc0000 [ 2622.901805] audit: type=1326 audit(1764510623.750:8674): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=42335 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 13:50:23 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 9) [ 2622.908609] audit: type=1326 audit(1764510623.757:8676): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=42332 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2622.915056] audit: type=1326 audit(1764510623.751:8675): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=42335 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 13:50:23 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x1800) 13:50:23 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10}, &(0x7f00000001c0), 0x10000000) 13:50:23 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000000)={0x3, &(0x7f0000000040)=[{0x6, 0x1, 0x0, 0x7ffcfffa}, {0x7, 0x98, 0x1, 0xa54}, {0x0, 0xee, 0x20, 0x4}]}) 13:50:23 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000005c0)=ANY=[@ANYBLOB="73c4a2c69f66e2e9170000", @ANYRES32=r0, @ANYBLOB="254e1938057907becc68eccd0836588f4ef93cde474791aeaccdc60b7739041c7295d32d8a44bb79b25c6b3e2f2c3a9a2945b1e6ef188631dbe8a2f26f6456007ee347fc70e6804f6a5471390c020d13421d5e8321f2412a62a1d06551a4fd4f5b83b1d919ff54018b343deba1af11b30ad3bfe6c379b27138379decda63d6c95d05bc84ab2b2fd99e7251898c23b20e20e11acc702a864528dc20aea1c19091e57dee38faf5239f115f0372055d9e0f12e9fee626eb96db877317b3faacea0a56159ad6045a7213cdd7010d636500000000493b43026418859475f38445889481d900"]) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000040)) eventfd(0x4727) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="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", 0x200) fork() pwritev2(r1, &(0x7f0000000540)=[{&(0x7f0000000340)="123d92d8ee55c1c53c1cf5b6e3ff5b631a634c2b60e46af9bfeb40bcb06592ff609c7205555fe8dced21c70e3153d01be12d70c00300de5fad580623dfcd16362dc053e3ec106b4d3fbc9fac80d8f84a07a20fd345a83b32a39a90566cc7d5eba11f35b6b07a0ad389605621d7474f70bffc6a32b8cc", 0x76}, {&(0x7f00000004c0)="8c71e5a7e329f4b31c914b7e0d529b2f90b4386f03b42c3fca39f9258fec185372c072b120f526753fec5e429f4188e636721398861bdd40a005fc7de3a2aafddc6255281e6948abaa0aba50", 0x4c}, {&(0x7f00000006c0)="c30ead28836fff792ba8f09a343509fd0195c7d59a8764ba6c7e6be7d781348c5267769851581420af889bd776fab095a0791c6709e2546d02afe021f82990ce6febd8ad7e7ba5b665e57f268c2d22fd29b4bfa8df665d084a1c3311ed71a8e701dec6cd39a0916dd570b203c2f70087754ede0604fd7bf12c51ddc2da8f81a0fbd3baf20020", 0x86}], 0x3, 0x2, 0x4, 0xd) r3 = fork() ptrace(0x10, r3) ptrace(0x8, r3) wait4(r3, 0x0, 0x20000000, &(0x7f0000000400)) ptrace$getregs(0xe, 0x0, 0x100000000, &(0x7f0000000b00)=""/178) [ 2623.047536] FAULT_INJECTION: forcing a failure. [ 2623.047536] name failslab, interval 1, probability 0, space 0, times 0 [ 2623.048522] CPU: 1 UID: 0 PID: 42457 Comm: syz-executor.1 Not tainted 6.18.0-rc7-next-20251128 #1 PREEMPT(voluntary) [ 2623.048538] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2623.048548] Call Trace: [ 2623.048553] [ 2623.048558] dump_stack_lvl+0xfa/0x120 [ 2623.048585] should_fail_ex+0x4d7/0x5e0 [ 2623.048603] ? audit_log_d_path+0xdd/0x1d0 [ 2623.048621] should_failslab+0xc2/0x120 [ 2623.048639] __kmalloc_cache_noprof+0x80/0x730 [ 2623.048660] ? get_mm_exe_file+0x27/0x1a0 [ 2623.048676] ? find_held_lock+0x2b/0x80 [ 2623.048692] ? audit_log_d_path+0xdd/0x1d0 [ 2623.048707] audit_log_d_path+0xdd/0x1d0 [ 2623.048726] audit_log_d_path_exe+0x47/0x80 [ 2623.048743] audit_log_task+0x2fe/0x3c0 [ 2623.048755] ? __pfx_audit_log_task+0x10/0x10 [ 2623.048772] audit_seccomp+0x79/0x200 [ 2623.048788] __seccomp_filter+0x9f2/0x1260 [ 2623.048806] ? __pfx___seccomp_filter+0x10/0x10 [ 2623.048821] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 2623.048840] ? ksys_write+0x1a3/0x240 [ 2623.048859] __secure_computing+0x1ac/0x290 [ 2623.048872] syscall_trace_enter+0x8d/0x230 [ 2623.048889] do_syscall_64+0x326/0x420 [ 2623.048903] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2623.048916] RIP: 0033:0x7f5a06d52b19 [ 2623.048926] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2623.048938] RSP: 002b:00007f5a042c8188 EFLAGS: 00000246 ORIG_RAX: 000000000000014c [ 2623.048950] RAX: ffffffffffffffda RBX: 00007f5a06e65f60 RCX: 00007f5a06d52b19 [ 2623.048958] RDX: 0000000000000000 RSI: 0000000020000040 RDI: ffffffffffffff9c [ 2623.048966] RBP: 00007f5a042c81d0 R08: 0000000020000180 R09: 0000000000000000 [ 2623.048974] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2623.048982] R13: 00007fff87e2b2df R14: 00007f5a042c8300 R15: 0000000000022000 [ 2623.049005] 13:50:34 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x1800000000000000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:50:34 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20, 0xd}}], 0x1, 0x0) 13:50:34 executing program 5: setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000100)={{{@in6=@local, @in6=@empty, 0x4e22, 0x4, 0x4e24, 0x7f, 0xa, 0x0, 0x120, 0x62, 0x0, 0xee01}, {0x4, 0x1000, 0x400, 0x7fffffff, 0x20000, 0x800, 0x10000, 0x8}, {0x0, 0x40, 0x2, 0x7}, 0x401, 0x6e6bb7, 0x0, 0x1, 0x1, 0x2}, {{@in=@loopback, 0x4d2, 0xd4}, 0xa, @in6=@loopback, 0x3508, 0x4, 0x1, 0x0, 0x2, 0x81, 0x4}}, 0xe8) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) write(r0, &(0x7f00000000c0)="ef", 0x1) 13:50:34 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000005c0)=ANY=[@ANYBLOB="73c4c1e80c66e2e9170000", @ANYRES32=r0, @ANYBLOB="254e1938057907becc68eccd083658474791aeaccdc60b7739041c7295d32d8a44bb79b25c6b3e2f2c3a9a2945b1e6ef188631dbe8a2f26f6456007ee347fc70e6804f6a5471390c020d13421d5e8321f2412a62a1d06551a4fd4f5b83b1d919ff54018b343deba1af11b30ad3bfe6c379b27138379decda63d6c95d05bc84ab2b2fd99e7251898c23b20e20e11acc702a864528dc20aea1c19091e57dee38faf5239f115f0372055d9e0f12e9fee626eb96db877317b3faacea0a56159ad6045a7213cdd7010d6365fa66956d493b430264186e9475f38445889481d9000000000000"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000040)) eventfd(0x4727) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xa, &(0x7f0000009dc0), 0x4) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000340)=0x5, 0x4) write(0xffffffffffffffff, &(0x7f0000000100)="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", 0x200) fork() r2 = fork() ptrace(0x10, r2) ptrace(0x8, r2) wait4(r2, 0x0, 0x20000000, &(0x7f0000000400)) 13:50:34 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x1a00) 13:50:34 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 10) 13:50:34 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10}, &(0x7f00000001c0), 0x20000000) 13:50:34 executing program 0: r0 = fsmount(0xffffffffffffffff, 0x0, 0x7) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000040)={'\x00', 0x3, 0x1, 0x81}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) readlink(0x0, 0x0, 0x0) [ 2633.392142] kauditd_printk_skb: 47 callbacks suppressed [ 2633.392164] audit: type=1326 audit(1764510634.310:8724): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=42582 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 13:50:34 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x1c00) [ 2633.399332] audit: type=1326 audit(1764510634.316:8725): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=42582 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f5a06d05a04 code=0x7ffc0000 [ 2633.401980] audit: type=1326 audit(1764510634.320:8726): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=42582 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f5a06d055ff code=0x7ffc0000 [ 2633.403168] audit: type=1326 audit(1764510634.321:8727): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=42584 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 13:50:34 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20, 0xe}}], 0x1, 0x0) 13:50:34 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0xfb, 0x0, 0x7ffcfffc}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x20, 0x1f, 0xdf, 0x7}]}) readlink(0x0, 0x0, 0x0) 13:50:34 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x1a00000000000000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) [ 2633.408296] audit: type=1326 audit(1764510634.324:8728): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=42584 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=303 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2633.408494] audit: type=1326 audit(1764510634.324:8729): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=42584 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 13:50:34 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 11) [ 2633.410147] audit: type=1326 audit(1764510634.328:8730): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=42584 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=83 compat=0 ip=0x7f2d0b88fc27 code=0x7ffc0000 13:50:34 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10}, &(0x7f00000001c0), 0x40000000) [ 2633.410313] audit: type=1326 audit(1764510634.328:8731): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=42584 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=165 compat=0 ip=0x7f2d0b89204a code=0x7ffc0000 [ 2633.413365] audit: type=1326 audit(1764510634.331:8732): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=42582 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=332 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2633.417491] audit: type=1326 audit(1764510634.331:8733): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=42582 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=0 compat=0 ip=0x7f5a06d0569c code=0x7ffc0000 13:50:34 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20, 0x10}}], 0x1, 0x0) [ 2633.713108] FAULT_INJECTION: forcing a failure. [ 2633.713108] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2633.714985] CPU: 0 UID: 0 PID: 42717 Comm: syz-executor.1 Not tainted 6.18.0-rc7-next-20251128 #1 PREEMPT(voluntary) [ 2633.715014] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2633.715026] Call Trace: [ 2633.715033] [ 2633.715041] dump_stack_lvl+0xfa/0x120 [ 2633.715082] should_fail_ex+0x4d7/0x5e0 [ 2633.715112] strncpy_from_user+0x3b/0x2f0 [ 2633.715148] getname_flags.part.0+0x8d/0x540 [ 2633.715173] getname_flags+0x95/0xe0 [ 2633.715199] __x64_sys_statx+0x18d/0x1d0 [ 2633.715224] do_syscall_64+0xbf/0x420 [ 2633.715248] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2633.715270] RIP: 0033:0x7f5a06d52b19 [ 2633.715287] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2633.715307] RSP: 002b:00007f5a042c8188 EFLAGS: 00000246 ORIG_RAX: 000000000000014c [ 2633.715328] RAX: ffffffffffffffda RBX: 00007f5a06e65f60 RCX: 00007f5a06d52b19 [ 2633.715342] RDX: 0000000000000000 RSI: 0000000020000040 RDI: ffffffffffffff9c [ 2633.715354] RBP: 00007f5a042c81d0 R08: 0000000020000180 R09: 0000000000000000 [ 2633.715367] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2633.715379] R13: 00007fff87e2b2df R14: 00007f5a042c8300 R15: 0000000000022000 [ 2633.715410] 13:50:34 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x1c00000000000000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:50:34 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000005c0)=ANY=[@ANYBLOB="73c4a2c69f66e2e9170000", @ANYRES32=r0, @ANYBLOB="254e1938057907becc68eccd083658474791aeaccdc60b7739041c7295d32d8a44bb79b25c6b3e2f2c3a9a2945b1e6ef188631dbe8a2f26f6456007ee347fc70e6804f6a5471390c020d13421d5e8321f2412a62a1d06551a4fd4f5b83b1d919ff54018b343deba1af11b30ad3bfe6c379b27138379decda63d6c95d05bc84ab2b2fd99e7251898c23b20e20e11acc702a864528dc20aea1c19091e57dee38faf5239f115f0372055d9e0f12e9fee626eb96db877317b3faacea0a56159ad6045a7213cdd7010d6365fa66956d493b430264186e9475f38445889481d9000000000000"]) read(r0, &(0x7f00000004c0)=""/211, 0xd3) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000040)) eventfd(0x4727) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="5ed0b2ff68d76fb346352b602a2a1295cbe01cb3f64fbed9e7f9bc9be0f300cb97f6a204cc585145dfb949002f6117fc969dd435dd0c37c5077e5b10cfeafd75205e215b167323a3b971b0ec8583851f2567d30bf5baf28aabb598e6c3d4d825cae01271cb35cdd091e4872367f354e0dc81a7e4ac79775bc1dcaafe2f5079da7dd1989f1ddce6722fc438a7217526cfe75d53471624d6f091e19a7fb699ea27efa9e0fd1914e7c35f297afd9b9bad399bcc85ff0ce7a982f4fa0c172ea5f06479eec302f30e5df66273717e028f4ca7d4c5b6bc8a3c3c67f688195f22488a15d9e1f7e5fed3a6c2aba7bc308b0e2c5657f4538f4a3bf9b975bb887a901ab3c85261be3e331b741313e78b5ad63b7b1b378e9479dc4a95b2b4d15cd1d1b808844378f882a72af1e5b0eefd356e0247246e60643204c3b46183dbe4e066c55cb1dcdaa7b70ef43ab2fa4d2b8c4c1a89cb0e325fd9716874d3856cf368efcdf92d21214e55e4de647c37c71887d11f74f9afe1616e3054ceae601e4b3555e243c1882ad42c7730caeb309e7714ad87c55e9fba308cfc4161e562abde3ac4f3d7e0a3584d49f90692e4c7a4591928100197f102309b05c0b4b4898b0591bc1433af443478979f28e6136ffb21aaeac2be5490475a08e96bb94fd9d9d3aa2f8a1e147a80ba9bfd04dac3f476ff128476c693ea71f7be47a508c98eddc479eb703d6f", 0x200) fork() r2 = fork() ptrace(0x10, r2) ptrace(0x8, r2) wait4(r2, 0x0, 0x20000000, &(0x7f0000000400)) 13:50:45 executing program 0: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="080000ffffff7f002e2f66696c010000"]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000200)={0x0, @aes128}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x1}]}) readlink(0x0, 0x0, 0x0) recvfrom(0xffffffffffffffff, &(0x7f0000000040)=""/67, 0x43, 0x2, &(0x7f0000000140)=@nl=@unspec, 0x80) 13:50:45 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20, 0x11}}], 0x1, 0x0) 13:50:45 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x1e00) 13:50:45 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 12) 13:50:45 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10}, &(0x7f00000001c0), 0x8cffffff) 13:50:45 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x1e00000000000000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:50:45 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) syz_open_dev$sg(&(0x7f0000000000), 0x1c, 0x150a00) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000080)={0xadf4, 0xff, 0x1, 0x1, 0xb, "995bd54ce3d0c3405b0becfbf568161ef4f424"}) write(r0, &(0x7f00000000c0)="ef", 0x1) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCXONC(r0, 0x540a, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='setgroups\x00') readv(r1, &(0x7f0000000680)=[{&(0x7f0000000180)=""/201, 0xc9}], 0x1) write$P9_RUNLINKAT(r1, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)={[{0x2b, 'rdma'}, {0x0, 'io'}]}, 0xa) 13:50:45 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000005c0)=ANY=[@ANYBLOB="73c4a2c69f66e2e9170000", @ANYRES32=r0, @ANYBLOB="254e1938057907becc68eccd083658474791aeaccdc60b7739041c7295d32d8a44bb79b25c6b3e2f2c3a9a2945b1e6ef188631dbe8a2f26f6456007ee347fc70e6804f6a5471390c020d13421d5e8321f2412a62a1d06551a4fd4f5b83b1d919ff54018b343deba1af11b30ad3bfe6c379b27138379decda63d6c95d05bc84ab2b2fd99e7251898c23b20e20e11acc702a864528dc20aea1c19091e57dee38faf5239f115f0372055d9e0f12e9fee626eb96db877317b3faacea0a56159ad6045a7213cdd7010d6365fa66956d493b430264186e9475f38445889481d9000000000000"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000040)) eventfd(0x4727) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @remote}}}], 0x20}}], 0x1, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000000c80)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000c40)={&(0x7f00000008c0)={0x354, 0x0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x81}}}]}}, {{0x8}, {0x224, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x7c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x4c, 0x4, [{0x3, 0xab, 0xff, 0x2}, {0xa018, 0x3, 0x1, 0xa6}, {0x1, 0x6}, {0x7, 0x5, 0x1, 0x80000001}, {0x7, 0x9, 0x40, 0xfff}, {0x9, 0xd0, 0x4, 0x2}, {0xf9, 0x38, 0x5, 0xfffff16f}, {0x7d, 0x1f, 0x40, 0xff}, {0x4, 0x8, 0x4, 0x6}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x80000001}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x1f}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}]}}, {{0x8}, {0xc8, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x80000001}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}]}, 0x354}, 0x1, 0x0, 0x0, 0x1}, 0x4000800) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="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", 0x200) fork() r2 = fork() ptrace(0x10, r2) ptrace(0x8, r2) wait4(r2, 0x0, 0x20000000, &(0x7f0000000400)) 13:50:45 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x2a00) [ 2644.608493] kauditd_printk_skb: 42 callbacks suppressed [ 2644.608513] audit: type=1326 audit(1764510645.526:8776): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=42836 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2644.628460] audit: type=1326 audit(1764510645.534:8777): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=42838 comm="syz-executor.0" exe="/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x0 [ 2644.649446] audit: type=1326 audit(1764510645.535:8778): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=42836 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2644.667335] audit: type=1326 audit(1764510645.536:8779): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=42836 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f5a06d05a04 code=0x7ffc0000 [ 2644.684772] audit: type=1326 audit(1764510645.536:8780): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=42836 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f5a06d055ff code=0x7ffc0000 13:50:45 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 13) [ 2644.699948] audit: type=1326 audit(1764510645.541:8781): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=42839 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2644.719729] audit: type=1326 audit(1764510645.542:8782): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=42836 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=332 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 13:50:45 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20, 0x12}}], 0x1, 0x0) 13:50:45 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10}, &(0x7f00000001c0), 0xf2ffffff) [ 2644.730013] audit: type=1326 audit(1764510645.543:8783): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=42836 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=0 compat=0 ip=0x7f5a06d0569c code=0x7ffc0000 [ 2644.745723] audit: type=1326 audit(1764510645.543:8784): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=42836 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f5a06d055ff code=0x7ffc0000 [ 2644.756084] audit: type=1326 audit(1764510645.543:8785): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=42836 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7f5a06d0572b code=0x7ffc0000 13:50:45 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x2a00000000000000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:50:45 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x2c00) [ 2644.820013] FAULT_INJECTION: forcing a failure. [ 2644.820013] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2644.821327] CPU: 1 UID: 0 PID: 42880 Comm: syz-executor.1 Not tainted 6.18.0-rc7-next-20251128 #1 PREEMPT(voluntary) [ 2644.821348] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2644.821359] Call Trace: [ 2644.821364] [ 2644.821370] dump_stack_lvl+0xfa/0x120 [ 2644.821405] should_fail_ex+0x4d7/0x5e0 [ 2644.821429] strncpy_from_user+0x3b/0x2f0 [ 2644.821457] getname_flags.part.0+0x8d/0x540 [ 2644.821476] getname_flags+0x95/0xe0 [ 2644.821497] __x64_sys_statx+0x18d/0x1d0 [ 2644.821516] do_syscall_64+0xbf/0x420 [ 2644.821535] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2644.821558] RIP: 0033:0x7f5a06d52b19 [ 2644.821571] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2644.821587] RSP: 002b:00007f5a042c8188 EFLAGS: 00000246 ORIG_RAX: 000000000000014c [ 2644.821603] RAX: ffffffffffffffda RBX: 00007f5a06e65f60 RCX: 00007f5a06d52b19 [ 2644.821614] RDX: 0000000000000000 RSI: 0000000020000040 RDI: ffffffffffffff9c [ 2644.821624] RBP: 00007f5a042c81d0 R08: 0000000020000180 R09: 0000000000000000 [ 2644.821634] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2644.821643] R13: 00007fff87e2b2df R14: 00007f5a042c8300 R15: 0000000000022000 [ 2644.821666] 13:50:45 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10}, &(0x7f00000001c0), 0xf6ffffff) 13:50:45 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20, 0x14}}], 0x1, 0x0) 13:50:55 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='freezer.self_freezing\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000080)={0x0, 0x5, r0, 0x3, 0x80000}) readlink(0x0, 0x0, 0x0) 13:50:55 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20, 0x16}}], 0x1, 0x0) 13:50:55 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x2c00000000000000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) [ 2654.414682] kauditd_printk_skb: 45 callbacks suppressed [ 2654.414696] audit: type=1326 audit(1764510655.331:8831): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=42992 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 13:50:55 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x20e02, 0x0) ioctl$TIOCMIWAIT(r1, 0x545c, 0x0) write(r0, &(0x7f00000000c0)="ef", 0x1) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDGKBDIACR(r2, 0x4b4a, &(0x7f0000000240)=""/4096) write(r2, &(0x7f00000000c0)="ef97ba6b8430655c45c5c8879310afa50de7f0ba94a169b38a1dccf94e55c1190deb2682d5959837e414251571c3fc9ba767b7a93776a6088bc77d2f4bae4ab6c6c35cc554f2df4f4f9bc72e5c9e872c2b9c1bdb8c3f48cdaa988874", 0x5c) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x9}}, './file0\x00'}) r4 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r4, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r4, 0x40505412, &(0x7f0000000140)={0x6, 0x9c8, 0x101}) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r4) ioctl$VT_SETMODE(r2, 0x5602, &(0x7f0000000000)={0x3c, 0x1, 0x1ff, 0x4, 0x81}) ioctl$TIOCL_SCROLLCONSOLE(r2, 0x541c, &(0x7f0000000040)={0xd, 0xfffff636}) r5 = openat$cgroup_ro(r1, &(0x7f0000000140)='memory.current\x00', 0x0, 0x0) ioctl$TIOCL_PASTESEL(r5, 0x541c, &(0x7f0000000180)) 13:50:55 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x2e00) 13:50:55 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10}, &(0x7f00000001c0), 0xfeffffff) 13:50:55 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f0000000740)=ANY=[@ANYBLOB="73c4a2c69f66e2e9170000", @ANYRES32=r0, @ANYBLOB="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"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000040)) eventfd(0x4727) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) flistxattr(0xffffffffffffffff, &(0x7f0000000340)=""/28, 0x1c) write(0xffffffffffffffff, &(0x7f0000000100)="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", 0x200) fork() r2 = fork() ptrace(0x10, r2) ptrace(0x8, r2) wait4(r2, 0x0, 0x20000000, &(0x7f0000000400)) 13:50:55 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 14) [ 2654.425196] audit: type=1326 audit(1764510655.337:8832): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=42992 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=303 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2654.434058] audit: type=1326 audit(1764510655.337:8833): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=42992 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2654.442783] audit: type=1326 audit(1764510655.337:8834): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=42992 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=83 compat=0 ip=0x7f2d0b88fc27 code=0x7ffc0000 [ 2654.450265] audit: type=1326 audit(1764510655.337:8835): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=42992 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=165 compat=0 ip=0x7f2d0b89204a code=0x7ffc0000 [ 2654.461064] audit: type=1326 audit(1764510655.338:8836): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=42992 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f2d0b843a04 code=0x7ffc0000 [ 2654.463639] FAULT_INJECTION: forcing a failure. [ 2654.463639] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2654.464574] CPU: 1 UID: 0 PID: 42999 Comm: syz-executor.1 Not tainted 6.18.0-rc7-next-20251128 #1 PREEMPT(voluntary) [ 2654.464590] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2654.464597] Call Trace: [ 2654.464602] [ 2654.464606] dump_stack_lvl+0xfa/0x120 [ 2654.464633] should_fail_ex+0x4d7/0x5e0 [ 2654.464651] strncpy_from_user+0x3b/0x2f0 [ 2654.464675] getname_flags.part.0+0x8d/0x540 [ 2654.464690] getname_flags+0x95/0xe0 [ 2654.464704] __x64_sys_statx+0x18d/0x1d0 [ 2654.464719] do_syscall_64+0xbf/0x420 [ 2654.464733] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2654.464746] RIP: 0033:0x7f5a06d52b19 [ 2654.464756] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2654.464767] RSP: 002b:00007f5a042c8188 EFLAGS: 00000246 ORIG_RAX: 000000000000014c [ 2654.464779] RAX: ffffffffffffffda RBX: 00007f5a06e65f60 RCX: 00007f5a06d52b19 [ 2654.464786] RDX: 0000000000000000 RSI: 0000000020000040 RDI: ffffffffffffff9c [ 2654.464794] RBP: 00007f5a042c81d0 R08: 0000000020000180 R09: 0000000000000000 [ 2654.464801] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2654.464808] R13: 00007fff87e2b2df R14: 00007f5a042c8300 R15: 0000000000022000 [ 2654.464825] [ 2654.480802] audit: type=1326 audit(1764510655.338:8837): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=42992 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2654.489421] audit: type=1326 audit(1764510655.343:8838): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=42992 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=259 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2654.499799] audit: type=1326 audit(1764510655.343:8839): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=42992 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 13:50:55 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x2e00000000000000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) [ 2654.510626] audit: type=1326 audit(1764510655.344:8840): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=42992 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 13:50:55 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10}, &(0x7f00000001c0), 0xffffff8c) 13:50:55 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 15) 13:50:55 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x3000) [ 2654.612674] FAULT_INJECTION: forcing a failure. [ 2654.612674] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2654.613743] CPU: 1 UID: 0 PID: 43019 Comm: syz-executor.1 Not tainted 6.18.0-rc7-next-20251128 #1 PREEMPT(voluntary) [ 2654.613760] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2654.613767] Call Trace: [ 2654.613771] [ 2654.613775] dump_stack_lvl+0xfa/0x120 [ 2654.613800] should_fail_ex+0x4d7/0x5e0 [ 2654.613817] strncpy_from_user+0x3b/0x2f0 [ 2654.613836] getname_flags.part.0+0x8d/0x540 [ 2654.613851] getname_flags+0x95/0xe0 [ 2654.613865] __x64_sys_statx+0x18d/0x1d0 [ 2654.613879] do_syscall_64+0xbf/0x420 [ 2654.613895] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2654.613910] RIP: 0033:0x7f5a06d52b19 [ 2654.613920] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2654.613931] RSP: 002b:00007f5a042c8188 EFLAGS: 00000246 ORIG_RAX: 000000000000014c [ 2654.613943] RAX: ffffffffffffffda RBX: 00007f5a06e65f60 RCX: 00007f5a06d52b19 13:50:55 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20, 0x18}}], 0x1, 0x0) 13:50:55 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x3000000000000000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) [ 2654.613951] RDX: 0000000000000000 RSI: 0000000020000040 RDI: ffffffffffffff9c [ 2654.613958] RBP: 00007f5a042c81d0 R08: 0000000020000180 R09: 0000000000000000 [ 2654.613965] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2654.613972] R13: 00007fff87e2b2df R14: 00007f5a042c8300 R15: 0000000000022000 [ 2654.613989] 13:50:55 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x0) lstat(&(0x7f0000001240)='./file0\x00', &(0x7f0000001280)={0x0, 0x0, 0x0, 0x0, 0x0}) getxattr(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)=@random={'trusted.', 'tmpfs\x00'}, &(0x7f0000001400)=""/213, 0xd5) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x9, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="405d6bb946ae2b6cd45523a9f8eee99b9b7beb231e85d55e281e71dff6dc43098f829b14a4e4d62fd48e7c7be0408e7c9b7c98a5f0b8ff256e911d8bbdc37c44940ba6889ed5d288ebc05202bc08391d77ca42b067ff4d137390cd4db635d7eb9667a14d686cd5c61abba2c77da1184a4c4c5be07d72a37c774e53edbb66b379925e3579a1e5b6db236eef5fb48f005918c68ddb0424446530857f360fb1c2959b0fcba2b7f921767a8005356ae7fafe6127f24bae77e4a3fc96dfc07e1a571225bd18c6192f", 0xc6, 0x10001}, {&(0x7f0000000240)="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", 0x1000, 0x82c4}], 0x30054, &(0x7f0000001300)={[{@uid={'uid', 0x3d, r0}}], [{@dont_appraise}, {@hash}, {@uid_eq}]}) 13:50:55 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 16) 13:50:55 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20, 0x1a}}], 0x1, 0x0) [ 2654.739497] FAULT_INJECTION: forcing a failure. [ 2654.739497] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2654.740484] CPU: 1 UID: 0 PID: 43104 Comm: syz-executor.1 Not tainted 6.18.0-rc7-next-20251128 #1 PREEMPT(voluntary) [ 2654.740500] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2654.740508] Call Trace: [ 2654.740512] [ 2654.740517] dump_stack_lvl+0xfa/0x120 [ 2654.740548] should_fail_ex+0x4d7/0x5e0 [ 2654.740567] _copy_to_user+0x32/0xd0 [ 2654.740584] cp_statx+0x714/0x8e0 [ 2654.740605] ? __pfx_cp_statx+0x10/0x10 [ 2654.740621] ? lock_acquire+0x15e/0x2d0 [ 2654.740653] ? __pfx_vfs_statx+0x10/0x10 [ 2654.740672] ? lock_acquire+0x15e/0x2d0 [ 2654.740689] do_statx+0x100/0x160 [ 2654.740701] ? __pfx_do_statx+0x10/0x10 [ 2654.740725] ? getname_flags.part.0+0x1c6/0x540 [ 2654.740741] __x64_sys_statx+0x128/0x1d0 [ 2654.740755] do_syscall_64+0xbf/0x420 [ 2654.740769] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2654.740782] RIP: 0033:0x7f5a06d52b19 [ 2654.740791] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2654.740802] RSP: 002b:00007f5a042c8188 EFLAGS: 00000246 ORIG_RAX: 000000000000014c [ 2654.740814] RAX: ffffffffffffffda RBX: 00007f5a06e65f60 RCX: 00007f5a06d52b19 [ 2654.740823] RDX: 0000000000000000 RSI: 0000000020000040 RDI: ffffffffffffff9c [ 2654.740830] RBP: 00007f5a042c81d0 R08: 0000000020000180 R09: 0000000000000000 [ 2654.740838] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2654.740844] R13: 00007fff87e2b2df R14: 00007f5a042c8300 R15: 0000000000022000 [ 2654.740861] [ 2654.751411] loop0: detected capacity change from 0 to 256 13:50:55 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x3b63000000000000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:50:55 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x6000) [ 2654.813198] loop0: detected capacity change from 0 to 256 13:50:55 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20, 0x1c}}], 0x1, 0x0) 13:51:05 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) syz_open_dev$evdev(&(0x7f0000000000), 0xffffffff, 0x40000) r1 = fsmount(0xffffffffffffffff, 0x0, 0x4) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000140)={0xf8, 0x3, 0x7, 0x7fffffff, "fe05015629717b2c341f9baaf429cc92e3557827923c41e409860dd8a679fb1e"}) r2 = accept(0xffffffffffffffff, &(0x7f0000000080)=@tipc=@name, &(0x7f0000000100)=0x80) write(r2, &(0x7f0000000040)="53b232593d11acbec938e9f6775d2fb506f4d10e8f247179c30ae2e47cc0d3077352677d9b028546de5718a5f3e7de4dfde8c3efb998", 0x29) 13:51:05 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0xc0df) 13:51:05 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x4, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffcfffc}, {0x800, 0x6, 0x40, 0x4}, {0xc4fd, 0x6, 0x2, 0x213d}, {0x30, 0x0, 0x20, 0x8}]}) fcntl$notify(r0, 0x402, 0x22) readlink(0x0, 0x0, 0x0) 13:51:05 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 17) 13:51:05 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000005c0)=ANY=[@ANYBLOB="73c4a2c69f66dce9170000", @ANYRES32=r0, @ANYBLOB="254e1938057907becc68eccd083658474791aeaccdc60b7739041c7295d32d8a44bb79b25c6b3e2f2c3a9a2945b1e6ef188631dbe8a2f26f6456007ee347fc70e6804f6a5471390c020d13421d5e8321f2412a62a1d06551a4fd4f5b83b1d919ff54018b343deba1af11b30ad3bfe6c379b27138379decda63d6c95d05bc84ab2b2fd99e7251898c23b20e20e11acc702a864528dc20aea1c19091e57dee38faf5239f115f0372055d9e0f12e9fee626eb96db877317b3faacea0a56159ad6045a7213cdd7010d6365fa66956d493b430264186e9475f38445889481d9000000000000"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x7d, 0x20, 0xfe, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffffffffffff}, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000040)) eventfd(0x4727) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="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", 0x200) fork() r3 = fork() ptrace(0x10, r3) ptrace(0x8, r3) wait4(0x0, 0x0, 0x2, &(0x7f0000000400)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f00000004c0)=ANY=[@ANYBLOB="010000000100000018000000639139ddb2e7a6419b5c1eff3dff275e74ba166735751ed4cbbf6232a63a88b2001b97e34cad9e32eaa6b8c71cb32e3fe3c35da66ca7d2a2dead463d7c7408ce92e5a50e140a3ff54e14e4af8f16f4289e6160b7d3ee6a41dcf011a6191fe65347ac054ed6a52ab6af4f1e", @ANYRES32=r2, @ANYBLOB="09090000000000000000000000000000cc9af458aec836a40fea665e34376e29f8e258c2f5"]) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000380)={0x0, 0x0, 0x7, 0x7fff}) 13:51:05 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x6000000000000000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:51:05 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20, 0x1e}}], 0x1, 0x0) 13:51:05 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10}, &(0x7f00000001c0), 0xfffffff2) [ 2664.254447] kauditd_printk_skb: 78 callbacks suppressed [ 2664.254460] audit: type=1326 audit(1764510665.171:8919): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=43163 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2664.265148] FAULT_INJECTION: forcing a failure. [ 2664.265148] name failslab, interval 1, probability 0, space 0, times 0 [ 2664.266115] CPU: 1 UID: 0 PID: 43170 Comm: syz-executor.1 Not tainted 6.18.0-rc7-next-20251128 #1 PREEMPT(voluntary) [ 2664.266131] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2664.266139] Call Trace: [ 2664.266143] [ 2664.266148] dump_stack_lvl+0xfa/0x120 [ 2664.266173] should_fail_ex+0x4d7/0x5e0 [ 2664.266195] should_failslab+0xc2/0x120 [ 2664.266213] kmem_cache_alloc_node_noprof+0x87/0x730 [ 2664.266229] ? __alloc_skb+0x159/0x430 [ 2664.266247] ? __alloc_skb+0x159/0x430 [ 2664.266258] __alloc_skb+0x159/0x430 [ 2664.266269] ? __alloc_skb+0x369/0x430 [ 2664.266281] ? __pfx___alloc_skb+0x10/0x10 [ 2664.266294] ? kmem_cache_alloc_noprof+0x49a/0x710 [ 2664.266306] ? lock_is_held_type+0x9e/0x120 [ 2664.266326] ? lockdep_init_map_type+0x4b/0x220 [ 2664.266347] audit_log_start.part.0+0x312/0x910 [ 2664.266366] ? __pfx_audit_log_start.part.0+0x10/0x10 [ 2664.266381] ? __bpf_prog_run32+0x9c/0xe0 [ 2664.266396] ? __pfx___bpf_prog_run32+0x10/0x10 [ 2664.266411] ? __pfx_audit_filter+0x10/0x10 [ 2664.266423] ? lock_acquire+0x15e/0x2d0 [ 2664.266441] audit_log_start+0x63/0x90 [ 2664.266458] audit_seccomp+0x60/0x200 [ 2664.266474] __seccomp_filter+0x9f2/0x1260 [ 2664.266490] ? __pfx___seccomp_filter+0x10/0x10 [ 2664.266506] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 2664.266528] __secure_computing+0x1ac/0x290 [ 2664.266541] syscall_trace_enter+0x8d/0x230 [ 2664.266557] do_syscall_64+0x326/0x420 [ 2664.266571] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2664.266584] RIP: 0033:0x7f5a06d0569c [ 2664.266594] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2664.266605] RSP: 002b:00007f5a042c8170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2664.266619] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f5a06d0569c [ 2664.266630] RDX: 000000000000000f RSI: 00007f5a042c81e0 RDI: 0000000000000003 [ 2664.266640] RBP: 00007f5a042c81d0 R08: 0000000000000000 R09: 0000000000000000 [ 2664.266651] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2664.266658] R13: 00007fff87e2b2df R14: 00007f5a042c8300 R15: 0000000000022000 [ 2664.266676] [ 2664.283939] audit: audit_lost=31 audit_rate_limit=0 audit_backlog_limit=64 [ 2664.284628] audit: out of memory in audit_log_start [ 2664.286789] audit: type=1326 audit(1764510665.177:8920): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=43163 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2664.306205] audit: type=1326 audit(1764510665.178:8921): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=43163 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f5a06d05a04 code=0x7ffc0000 [ 2664.331067] audit: type=1326 audit(1764510665.182:8922): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=43163 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f5a06d055ff code=0x7ffc0000 [ 2664.335682] audit: type=1326 audit(1764510665.182:8923): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=43163 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=332 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2664.342930] audit: type=1326 audit(1764510665.211:8924): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=43167 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2664.348667] audit: type=1326 audit(1764510665.211:8925): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=43167 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2664.353791] audit: type=1326 audit(1764510665.211:8926): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=43167 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=303 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 13:51:15 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000004c0)=ANY=[@ANYBLOB="73c4a2c69f66e2e9170000", @ANYRES32=r0, @ANYBLOB="254e1938057907becc68eccd083658474791aeaccdc60b7739041c7295d32d8a44bb79b25c6b3e2f2c3a9a2945b1e6ef188631dbe8a2f26f6456007ee347fc70e6804f6a5471390c020d13421d5e8321f2412a62a1d06551a4fd4f5b83b1d919ff54018b343deba1af11b30ad3bfe6c379b27138379decda63d6c95d05bc84ab2b2fd99e7251898c23b20e20e11acc702a864528dc20aea1c19091e57dee38faf5239f115f0372055d9e0f12e9fee626eb96db877317b3faacea0a56159ad6045a7213cdd7010d6365fa66956d493b430264186e9475f384458894818ccea33954448b41bbd9000000000000"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x7, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000040)) eventfd(0x4727) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x10) write(0xffffffffffffffff, &(0x7f0000000100)="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", 0x200) fork() r2 = fork() ptrace(0x10, r2) ptrace(0x8, r2) wait4(r2, 0x0, 0x20000000, &(0x7f0000000400)) 13:51:15 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) r0 = syz_io_uring_setup(0x2262, &(0x7f0000003a00)={0x0, 0xa360, 0x0, 0x0, 0x358}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000003ac0)) io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f0000000080)={0x5, 0x0, &(0x7f0000000040)}, 0x0) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r2, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f00000002c0)={0x2, 0x5, 0x80000001, 0x0, 0x6}) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x300000e, 0x12, r0, 0x10000000) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r3, &(0x7f00000000c0)=@IORING_OP_SEND={0x1a, 0x1, 0x0, r4, 0x0, &(0x7f00000001c0)="4dd468321038cfed0d1c74ffb6106f55e5d2f7829d329ae81aa40289dc33a6fd766e848c2077ceedaf17d206917063c89de325fe0839ca25c30c6479e5393f9cc3479dc9ffd0d9ee878a29a92f3243731fabc2322e8a0fdf0f9f30824bed70b5ef98d8167df79f7ebd82dd00eed8c7613c95082723b483beebade2fa8554b910350bd1b1db10bff51f6dee1ee637b1569b789c7ed6962b4862585a5b35a70610c60b6039002357d0a8155074fca2909b5a95ff83b8e9f2013ad53ce7888aea63a6f65e3e172739a54651b976c3dc89606689a6fb9a", 0xd5, 0x4000000, 0x0, {0x0, r5}}, 0x7ff) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000140)={0x6, 0x9c8, 0x101}) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r2, 0x80605414, &(0x7f0000000340)) close_range(r0, r2, 0x0) readlink(0x0, 0x0, 0x0) 13:51:15 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 18) 13:51:15 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10}, &(0x7f00000001c0), 0xfffffff6) 13:51:15 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0xdfc0) 13:51:15 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20, 0x2a}}], 0x1, 0x0) 13:51:15 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) write(0xffffffffffffffff, &(0x7f00000000c0)="ef", 0x1) 13:51:15 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0xeffdffff00000000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) [ 2674.556661] kauditd_printk_skb: 15 callbacks suppressed [ 2674.556687] audit: type=1326 audit(1764510675.475:8942): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=43290 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2674.580812] audit: type=1326 audit(1764510675.476:8943): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=43290 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2674.596993] audit: type=1326 audit(1764510675.480:8944): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=43290 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=425 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2674.623352] audit: type=1326 audit(1764510675.487:8945): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=43290 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7f68ebbcdb62 code=0x7ffc0000 [ 2674.629869] FAULT_INJECTION: forcing a failure. [ 2674.629869] name failslab, interval 1, probability 0, space 0, times 0 [ 2674.631969] CPU: 1 UID: 0 PID: 43305 Comm: syz-executor.1 Not tainted 6.18.0-rc7-next-20251128 #1 PREEMPT(voluntary) [ 2674.632013] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2674.632032] Call Trace: [ 2674.632043] [ 2674.632055] dump_stack_lvl+0xfa/0x120 [ 2674.632123] should_fail_ex+0x4d7/0x5e0 [ 2674.632173] should_failslab+0xc2/0x120 [ 2674.632225] kmem_cache_alloc_node_noprof+0x87/0x730 [ 2674.632267] ? __alloc_skb+0x159/0x430 [ 2674.632317] ? __alloc_skb+0x159/0x430 [ 2674.632349] __alloc_skb+0x159/0x430 [ 2674.632383] ? __alloc_skb+0x369/0x430 [ 2674.632418] ? __pfx___alloc_skb+0x10/0x10 [ 2674.632470] ? kmem_cache_alloc_noprof+0x49a/0x710 [ 2674.632504] ? lock_is_held_type+0x9e/0x120 [ 2674.632652] ? lockdep_init_map_type+0x4b/0x220 [ 2674.632697] audit_log_start.part.0+0x312/0x910 [ 2674.632737] ? __pfx_audit_log_start.part.0+0x10/0x10 [ 2674.632769] ? __bpf_prog_run32+0x9c/0xe0 [ 2674.632799] ? __pfx___bpf_prog_run32+0x10/0x10 [ 2674.632830] ? __pfx_audit_filter+0x10/0x10 [ 2674.632855] ? lock_acquire+0x15e/0x2d0 [ 2674.632895] audit_log_start+0x63/0x90 [ 2674.632929] audit_seccomp+0x60/0x200 [ 2674.632963] __seccomp_filter+0x9f2/0x1260 [ 2674.632995] ? __pfx___seccomp_filter+0x10/0x10 [ 2674.633028] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 2674.633075] __secure_computing+0x1ac/0x290 [ 2674.633103] syscall_trace_enter+0x8d/0x230 [ 2674.633135] do_syscall_64+0x326/0x420 [ 2674.633163] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2674.633188] RIP: 0033:0x7f5a06d0569c [ 2674.633209] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2674.633233] RSP: 002b:00007f5a042c8170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2674.633258] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f5a06d0569c [ 2674.633275] RDX: 000000000000000f RSI: 00007f5a042c81e0 RDI: 0000000000000003 [ 2674.633290] RBP: 00007f5a042c81d0 R08: 0000000000000000 R09: 0000000000000000 [ 2674.633305] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2674.633320] R13: 00007fff87e2b2df R14: 00007f5a042c8300 R15: 0000000000022000 [ 2674.633364] [ 2674.665514] audit: audit_lost=32 audit_rate_limit=0 audit_backlog_limit=64 [ 2674.667920] audit: out of memory in audit_log_start [ 2674.680750] audit: type=1326 audit(1764510675.487:8946): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=43290 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7f68ebbcdb62 code=0x7ffc0000 [ 2674.688258] audit: type=1326 audit(1764510675.489:8947): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=43290 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2674.698868] audit: type=1326 audit(1764510675.492:8948): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=43290 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=427 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 13:51:15 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0xff00) [ 2674.708713] audit: type=1326 audit(1764510675.492:8949): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=43290 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 13:51:15 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10}, &(0x7f00000001c0), 0xfffffffe) 13:51:15 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0xc0100, 0x0) ioctl$KDSKBSENT(r1, 0x4b49, &(0x7f0000000100)={0x1, "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"}) ioctl$TCXONC(r0, 0x540a, 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000006c0), 0x1, 0x0) r3 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r3, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r3, 0x40505412, &(0x7f0000000140)={0x6, 0x9c8, 0x101}) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='setgroups\x00') readv(r4, &(0x7f0000000680)=[{&(0x7f0000000180)=""/201, 0xc9}], 0x1) write$P9_RUNLINKAT(r4, 0x0, 0x0) io_submit(0x0, 0x5, &(0x7f0000000800)=[&(0x7f0000000440)={0x0, 0x0, 0x0, 0xd, 0x6, 0xffffffffffffffff, &(0x7f00000005c0)="1bff236cdf1fbe3b06918296825db86a520ad3ae2b15c730949e8ac64b3eb5f0dca4430672fdd57bf0c10f99fd399d98a0b5af67bca3ee2aeea482f300e154979e0143015fdd44014eb73fd5796d03eaa205d288bea7b94b3b79cac3", 0x5c, 0x5, 0x0, 0x2}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x8, 0x6, 0xffffffffffffffff, &(0x7f0000000480)="fdf01d7135d382f04ba0c371fd5929ad36c739a42e8a9fe5f47012bd13201c5e67d3e2", 0x23, 0x2928, 0x0, 0x3}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, &(0x7f0000000500)="38824d97d0c499fdda831a3980154faee865be75a8461a6f3987360fe0d38898a796151b2c174990810b3424b3efa33af5d9421c6efaf2d956284a6c12e394b46cb1718a56afb37021be4541292cdce39834104eb368b48d74aa71ab0bae9807427ae51a6e1fbaa28990e41c2fc3", 0x6e, 0xa, 0x0, 0x2, r1}, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x8, 0x7ff, 0xffffffffffffffff, &(0x7f0000000840)="b931741b93dac5b6010f352d01919d4b8df7d587c6bb39e3fda1f39c68debf9ce58443b5ad1b6069881c536db7ccc30758a8a17819d19162ecf1408314607eb0c4475fe6aa5482eeb6dcbfa7403f18dbdc179e55503688b909111fe73e44ef3936c3aa7dfcd487641a9ff81f197481501fa7a28b5f8e0db41bd7f7af6bc35c26de0ea129672aa7b4aaa8afa5ca636ef2b140f29c2eb55d481ac482c6a0aeda9fed8b93bcd0e6a1dae0dbef1db05fe3ccf5c58e48e7c3ff5e8e6b5d895831e4a44300689b67ff4b4ddc5af8aef573b1d386588345877cb6dab35419855d", 0xdd, 0x81, 0x0, 0x1, r2}, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x7, 0x7ff, r3, &(0x7f0000000740)="260bd0a13ea2e4649dbfdab5ba97e8bde815e4c739bfd18398263428ce702380d96208f92251657eacd51443f0e825423752e3a6fc33e43491889571d673d0411598e45237c6a537ec87454ac6b8b7cdd0105082eed25f", 0x57, 0x10000000000002, 0x0, 0x2, r4}]) r5 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r5, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r5, 0x40505412, &(0x7f0000000140)={0x6, 0x9c8, 0x101}) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r5, 0xf501, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000000)={0x2, {0x2, 0x255, 0x400, 0x3, 0x200, 0x2}}) write(r0, &(0x7f00000000c0)="ef", 0x1) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000340), &(0x7f0000000380), 0x2, 0x2) finit_module(r1, &(0x7f0000000080)='/dev/sr0\x00', 0x1) 13:51:15 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0xfdffffff00000000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:51:15 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20, 0x2c}}], 0x1, 0x0) 13:51:15 executing program 0: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8b0ed4c103b6dadf, &(0x7f00000000c0)={0x2, &(0x7f0000000000)=[{0x1ff, 0x7f, 0x6, 0xffff9ee9}, {0xff00, 0x9, 0xfb, 0x387b}]}) readlink(0x0, 0x0, 0x0) faccessat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r1 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000100)='devices.deny\x00', 0x2, 0x0) close_range(r1, r0, 0x0) 13:51:15 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 19) 13:51:15 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x11000) 13:51:26 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20, 0x2e}}], 0x1, 0x0) 13:51:26 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) write(r0, &(0x7f00000000c0)="ef", 0x1) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2000004, 0x810, r0, 0x40ba1000) 13:51:26 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0xfeffffff00000000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:51:26 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x30000) 13:51:26 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10}, &(0x7f00000001c0), 0x8000000000000) 13:51:26 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) readlink(0x0, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x6, &(0x7f0000000540)=[{&(0x7f00000001c0)="9fde8f8dd3f1817b82767bbc1c4514981a776192b3f56a93e7bbb93cd431f516569b4ad54a2c15bb6bb9592101c2b0acd72a15130337708c3ed0a117edf5c1fb52cc17828ad2e5381a8f151eaafeeeaf6bae713f0bf8491892713c8bb9591c2eee845ae7e33ab69cfb7ec50026069ff40172cb367c6a8124fb6e8d89771044aefc23d981903b977baecfece8e473103210713904505fd3ef71400aed8910fee7422487cf7eda03912148a7cc1eef", 0xae, 0x1}, {&(0x7f00000000c0)="44ab40c3e3ca3950b8385e2ef63ecef5092e7993e0dd7e20d0d62d406cffbb2b3dd691815ea4c6460b350aff40f77b", 0x2f, 0x7f}, {&(0x7f0000000280)="8beffd4033c48b1acfa73f0609b852b441843cce826abef19523686815d8aefe8d4ca92a6b0d6c67dc9d553045840a274ae2d06c2fd2a4d3879c6571b3a6a8326fa88297322b5113916a09d1239de9ce1f63f394ee739cbedc8b34cc3478babe84c399f96e3b4166222f5dab9de1356f36b4ec2bc421cae756423bd2fe6c7ff945860f49918b13ddf3e23dc79271a8a133ae48bd27044db670d03b481cbc04", 0x9f, 0xffffffff}, {&(0x7f0000000340)="344dff6d18f62cebe6fcc41dfbc221185d209351ed3a6eeb4a11645af2566aeaa23903808c426609ba96", 0x2a, 0x9e1}, {&(0x7f0000000380)="29030ad5e964e73b0cf6df0bdcb87aae92d34e557da460dfb9d2fbe72451d78547af0f7edb94e3cdf136711972f923f0cd1b21713a26664b691e73c349687135f0a41691277a505ee18c6fe92ceb5373c1209e73895820c76bd20a898c47d4d9565a000dfb44f8153bd965bd6231ac9260b85f853727940fce1f2aaf36aa9f80850e1b6195e006bf59376322e02464862ca2efc01533627789fb0f33e79eb1d3275afd7b84cecf648c57d4c051ea2af78c3b41b0ef5bdcab9367d640f3af4ef721b4726b51df8672d33a0784", 0xcc}, {&(0x7f0000000480)="f94fedd7dcef28711d0f6d688f8337a02ad99667728f3bcd196175b2058d78f4c7077900e8b5da39a4a03e3481458c696ca9ae9880201c32f5906ddc4e5ab27b1a1a98600b158d871aa35866499b7ab8c165b0b5d118be235aba14c318903538207dc3d70854c0b44c1c031b6b989a391168fa7ea57dbc4eb86e8a2b55ff2af5cfca85a9479daf827918a67f345140406e4ab7988cc727fe48601ec9327d1da10c430543380cb644e4", 0xa9, 0x1000}], 0x8000, &(0x7f0000000600)={[{@nr_blocks={'nr_blocks', 0x3d, [0x6b, 0x74, 0x5e, 0x5, 0x5c]}}, {@nr_blocks={'nr_blocks', 0x3d, [0x37, 0x36, 0x39, 0x1, 0x33]}}], [{@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@audit}, {@obj_role={'obj_role', 0x3d, '\xf8'}}, {@uid_lt={'uid<', 0xee00}}, {@seclabel}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000140)) 13:51:26 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 20) 13:51:26 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000005c0)=ANY=[@ANYBLOB="73c4a2be3566e2e9170000", @ANYRES32=r0, @ANYBLOB="254e1938057907becc68eccd083658474791aeaccdc60b7739041c7295d32d8a44bb79b25c6b3e2f2c3a9a2945b1e6ef188631dbe8a2f26f6456007ee347fc70e6804f6a5471390c020d13421d5e8321f2412a62a1d06551a4fd4f5b83b1d919ff54018b343deba1af11b30ad3bfe6c379b27138379decda63d6c95d05bc84ab2b2fd99e7251898c23b20e20e11acc702a864528dc20aea1c19091e57dee38faf5239f115f0372055d9e0f12e9fee626eb96db877317b3faacea0a56159ad6045a7213cdd7010d6365fa66956d493b430264186e9475f38445889481d9000000000000"]) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000140)={0x6, 0x9c8, 0x101}) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000340)=0x81) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000040)) eventfd(0x4727) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="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", 0x200) fork() r2 = fork() ptrace(0x10, r2) ptrace(0x8, r2) wait4(r2, 0x0, 0x4, &(0x7f0000000400)) 13:51:26 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x34000) 13:51:26 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20, 0x30}}], 0x1, 0x0) [ 2685.654241] kauditd_printk_skb: 80 callbacks suppressed [ 2685.654260] audit: type=1326 audit(1764510686.571:9030): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=43458 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2685.683693] audit: type=1326 audit(1764510686.574:9031): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=43458 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=303 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2685.700162] audit: type=1326 audit(1764510686.574:9032): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=43458 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2685.713989] loop0: detected capacity change from 0 to 264192 [ 2685.715477] audit: type=1326 audit(1764510686.574:9033): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=43458 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=83 compat=0 ip=0x7f2d0b88fc27 code=0x7ffc0000 [ 2685.732501] audit: type=1326 audit(1764510686.578:9034): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=43458 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=165 compat=0 ip=0x7f2d0b89204a code=0x7ffc0000 [ 2685.734903] SELinux: security_context_str_to_sid (user_u) failed with errno=-22 [ 2685.743263] audit: type=1326 audit(1764510686.582:9035): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=43455 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2685.755886] audit: type=1326 audit(1764510686.583:9037): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=43458 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f2d0b843a04 code=0x7ffc0000 [ 2685.774765] audit: type=1326 audit(1764510686.586:9038): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=43458 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2685.787931] audit: type=1326 audit(1764510686.582:9036): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=43455 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x7ffc0000 [ 2685.798263] loop0: detected capacity change from 0 to 264192 13:51:26 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10}, &(0x7f00000001c0), 0x100000000000000) 13:51:26 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0xff00000000000000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:51:26 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 21) [ 2685.807840] audit: type=1326 audit(1764510686.588:9039): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=43458 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=259 compat=0 ip=0x7f2d0b890b19 code=0x7ffc0000 [ 2685.823928] SELinux: security_context_str_to_sid (user_u) failed with errno=-22 13:51:26 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x40000) 13:51:26 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20, 0x60}}], 0x1, 0x0) 13:51:26 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x4, 0x0, 0x41, 0x3ff}, {0x1, 0x1, 0x9, 0x140000}]}) readlink(0x0, 0x0, 0x0) [ 2685.950051] FAULT_INJECTION: forcing a failure. [ 2685.950051] name failslab, interval 1, probability 0, space 0, times 0 [ 2685.951910] CPU: 0 UID: 0 PID: 43580 Comm: syz-executor.1 Not tainted 6.18.0-rc7-next-20251128 #1 PREEMPT(voluntary) [ 2685.951941] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2685.951954] Call Trace: [ 2685.951962] [ 2685.951971] dump_stack_lvl+0xfa/0x120 [ 2685.952018] should_fail_ex+0x4d7/0x5e0 [ 2685.952051] should_failslab+0xc2/0x120 [ 2685.952085] __kmalloc_node_track_caller_noprof+0xd7/0x820 [ 2685.952117] ? lock_acquire+0x15e/0x2d0 [ 2685.952147] ? sidtab_sid2str_get+0x85/0x6f0 [ 2685.952176] ? sidtab_sid2str_get+0x17e/0x6f0 [ 2685.952211] ? kmemdup_noprof+0x2b/0x60 [ 2685.952246] kmemdup_noprof+0x2b/0x60 [ 2685.952280] sidtab_sid2str_get+0x17e/0x6f0 [ 2685.952314] sidtab_entry_to_string+0x33/0x110 [ 2685.952345] security_sid_to_context_core+0x350/0x620 [ 2685.952377] selinux_lsmprop_to_secctx+0xdf/0x1c0 [ 2685.952407] ? __pfx_selinux_lsmprop_to_secctx+0x10/0x10 [ 2685.952440] ? skb_put+0x138/0x1b0 [ 2685.952480] security_lsmprop_to_secctx+0x140/0x190 [ 2685.952509] audit_log_subj_ctx.part.0+0x230/0x3a0 [ 2685.952554] ? __pfx_audit_log_subj_ctx.part.0+0x10/0x10 [ 2685.952598] audit_log_task_context+0xb8/0x100 [ 2685.952643] ? __pfx_audit_log_task_context+0x10/0x10 [ 2685.952673] ? from_kuid+0x8d/0xd0 [ 2685.952711] ? __pfx_audit_log_start.part.0+0x10/0x10 [ 2685.952748] audit_log_task+0x1c9/0x3c0 [ 2685.952771] ? __pfx_audit_log_task+0x10/0x10 [ 2685.952805] audit_seccomp+0x79/0x200 [ 2685.952837] __seccomp_filter+0x9f2/0x1260 [ 2685.952867] ? __pfx___seccomp_filter+0x10/0x10 [ 2685.952898] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 2685.952940] __secure_computing+0x1ac/0x290 [ 2685.952966] syscall_trace_enter+0x8d/0x230 [ 2685.952997] do_syscall_64+0x326/0x420 [ 2685.953024] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2685.953048] RIP: 0033:0x7f5a06d0569c [ 2685.953065] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2685.953087] RSP: 002b:00007f5a042c8170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2685.953109] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f5a06d0569c [ 2685.953125] RDX: 000000000000000f RSI: 00007f5a042c81e0 RDI: 0000000000000003 [ 2685.953139] RBP: 00007f5a042c81d0 R08: 0000000000000000 R09: 0000000000000000 [ 2685.953152] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2685.953166] R13: 00007fff87e2b2df R14: 00007f5a042c8300 R15: 0000000000022000 [ 2685.953200] 13:51:26 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20, 0x300}}], 0x1, 0x0) 13:51:37 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 22) 13:51:37 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x80000) 13:51:37 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = mq_open(&(0x7f0000000040)='&\x00', 0x1, 0x62, &(0x7f0000000080)={0x40, 0x6, 0x0, 0x7}) ioctl$AUTOFS_IOC_PROTOSUBVER(r1, 0x80049367, &(0x7f0000000100)) syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x540a, 0x0) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000000)=0x8) ioctl$TCXONC(r0, 0x540a, 0x2) syz_open_dev$tty20(0xc, 0x4, 0x0) write(r0, &(0x7f00000000c0)="ef", 0x1) 13:51:37 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20, 0x500}}], 0x1, 0x0) 13:51:37 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10}, &(0x7f00000001c0), 0x200000000000000) 13:51:37 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0xffff000000000000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 13:51:37 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x23, 0x100009}]}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x7}}, './file0\x00'}) readlink(0x0, 0x0, 0x0) 13:51:37 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug', 0x0, 0x0) getdents64(r0, &(0x7f00000013c0)=""/4084, 0xff4) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000005c0)=ANY=[@ANYBLOB="73c4a2c69f66e2e9170000", @ANYRES32=r0, @ANYBLOB="254e1938057907becc68eccd083658474791aeaccdc60b7739041c7295d32d8a44bb79b25c6b3e2f2c3a9a2945b1e6ef188631dbe8a2f26f6456007ee347fc70e6804f6a5471390c020d13421d5e8321f2412a62a1d06551a4fd4f5b83b1d919ff54018b343deba1af11b30ad3bfe6c379b27138379decda63d6c95d05bc84ab2b2fd99e7251898c23b20e20e11acc702a864528dc20aea1c19091e57dee38faf5239f115f0372055d9e0f12e9fee626eb96db877317b3faacea0a56159ad6045a7213cdd7010d6365fa66956d493b430264186e9475f38445889481d9000000000000"]) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000040)) eventfd(0x4727) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="5ed0b2ff68d76fb346352b602a2a1295cbe01cb3f64fbed9e7f9bc9be0f300cb97f6a204cc585145dfb949002f6117fc969dd435dd0c37c5077e5b10cfeafd75205e215b167323a3b971b0ec8583851f2567d30bf5baf28aabb598e6c3d4d825cae01271cb35cdd091e4872367f354e0dc81a7e4ac79775bc1dcaafe2f5079da7dd1989f1ddce6722fc438a7217526cfe75d53471624d6f091e19a7fb699ea27efa9e0fd1914e7c35f297afd9b9bad399bcc85ff0ce7a982f4fa0c172ea5f06479eec302f30e5df66273717e028f4ca7d4c5b6bc8a3c3c67f688195f22488a15d9e1f7e5fed3a6c2aba7bc308b0e2c5657f4538f4a3bf9b975bb887a901ab3c85261be3e331b741313e78b5ad63b7b1b378e9479dc4a95b2b4d15cd1d1b808844378f882a72af1e5b0eefd356e0247246e60643204c3b46183dbe4e066c55cb1dcdaa7b70ef43ab2fa4d2b8c4c1a89cb0e325fd9716874d3856cf368efcdf92d21214e55e4de647c37c71887d11f74f9afe1616e3054ceae601e4b3555e243c1882ad42c7730caeb309e7714ad87c55e9fba308cfc4161e562abde3ac4f3d7e0a3584d49f90692e4c7a4591928100197f102309b05c0b4b4898b0591bc1433af443478979f28e6136ffb21aaeac2be5490475a08e96bb94fd9d9d3aa2f8a1e147a80ba9bfd04dac3f476ff128476c693ea71f7be47a508c98eddc479eb703d6f", 0x200) setsockopt$SO_TIMESTAMP(r3, 0x1, 0x3f, &(0x7f0000000340)=0x2, 0x4) fork() perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x6, 0x0, 0x3, 0x0, 0x0, 0x80000001, 0x14450, 0xa, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x200, 0xffffffffffff2252}, 0x10000, 0x200, 0x7, 0x6, 0xa1, 0xeb26, 0x4, 0x0, 0x8, 0x0, 0x5}, 0x0, 0xb, r1, 0x1) r4 = fork() ptrace(0x10, r4) ptrace(0x8, r4) wait4(r4, 0x0, 0x20000000, &(0x7f0000000400)) [ 2696.753451] [ 2696.753635] ================================================ [ 2696.754080] WARNING: lock held when returning to user space! [ 2696.754534] 6.18.0-rc7-next-20251128 #1 Not tainted [ 2696.754929] ------------------------------------------------ [ 2696.755368] syz-executor.5/43611 is leaving the kernel with locks still held! [ 2696.755925] 1 lock held by syz-executor.5/43611: [ 2696.756300] #0: ffff88800b3d15c8 (&sb->s_type->i_mutex_key#23/1){+.+.}-{4:4}, at: start_creating_noperm+0x84/0xd0 [ 2696.777661] kauditd_printk_skb: 75 callbacks suppressed [ 2696.777673] audit: type=1326 audit(1764510697.691:9114): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=43613 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 [ 2696.777748] audit: type=1326 audit(1764510697.694:9115): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=43613 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 13:51:37 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20, 0xa00}}], 0x1, 0x0) [ 2696.777815] audit: type=1326 audit(1764510697.694:9116): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=43613 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f5a06d05a04 code=0x7ffc0000 13:51:37 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x100100) [ 2696.777880] audit: type=1326 audit(1764510697.694:9117): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=43613 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f5a06d055ff code=0x7ffc0000 13:51:37 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 23) 13:51:37 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0xffffffff00000000, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) [ 2696.777946] audit: type=1326 audit(1764510697.694:9118): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=43613 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=332 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 13:51:37 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x908, 0x7f, 0x5, 0x6}, {0x1fe0, 0x9, 0x8, 0x401}]}) readlink(0x0, 0x0, 0x0) 13:51:37 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_INO32_GEN_PARENT={0x10}, &(0x7f00000001c0), 0x300000000000000) [ 2696.781850] audit: type=1326 audit(1764510697.700:9119): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=43613 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=0 compat=0 ip=0x7f5a06d0569c code=0x7ffc0000 13:51:37 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20, 0xb00}}], 0x1, 0x0) 13:51:37 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffcfffc}]}) statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180)) (fail_nth: 24) [ 2696.781922] audit: type=1326 audit(1764510697.700:9120): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=43613 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f5a06d055ff code=0x7ffc0000 13:51:37 executing program 6: mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x100010, &(0x7f00000007c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@access_client}, {}, {@cache_mmap}, {@cache_fscache}, {@version_L}, {@posixacl}], [{@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}, {@dont_appraise}, {@euid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'sit0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101001, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0xf) syz_open_pts(0xffffffffffffffff, 0xa400) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @remote}}}], 0x20}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r4, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0xf, 0x0, 0x8, {r5, @remote, @remote}}}], 0x20}}], 0x1, 0x0) [ 2696.781988] audit: type=1326 audit(1764510697.701:9121): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=43613 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7f5a06d0572b code=0x7ffc0000 [ 2696.782056] audit: type=1326 audit(1764510697.701:9122): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=43613 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a06d52b19 code=0x7ffc0000 13:51:37 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003080)=[{{&(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xac1414bb}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @remote}}}], 0x20}}], 0x1, 0x400300) [ 2696.788230] audit: type=1326 audit(1764510697.706:9123): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=43617 comm="syz-executor.0" exe="/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f68ebbcdb19 code=0x100000 VM DIAGNOSIS: 13:51:37 Registers: info registers vcpu 0 RAX=ffffffff84f26509 RBX=dffffc0000000000 RCX=0000000000000001 RDX=0000000000000000 RSI=ffffffff85f0aba0 RDI=ffffffff84f26500 RBP=ffffffff84f26500 RSP=ffff88800f5afa00 R8 =0000000000000001 R9 =0000000000000000 R10=ffff88800f5afbc8 R11=0000000000000000 R12=ffffffff85d27a80 R13=ffffffff85f0abb8 R14=ffff88800f5afad0 R15=ffffffff81b6c55b RIP=ffffffff84c5de08 RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 000055556d9c1400 00000000 00000000 GS =0000 ffff8880e5368000 00000000 00000000 LDT=0000 fffffe7400000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f2d0b910547 CR3=0000000018a49000 CR4=00350ef0 DR0=f7ff88806ce0e000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000600 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=000000000000000000000000000000ff XMM01=25252525252525252525252525252525 XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000 XMM04=000000000000000000000000000000ff XMM05=00000000000000000000000000000000 XMM06=00000000000000000000000000000000 XMM07=00000000000000000000000000000000 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=0000000000000000 RBX=ffff88800de1ec10 RCX=ffffffff815d19e4 RDX=0000000000000000 RSI=0000000000000008 RDI=ffff88806cf31ed0 RBP=ffff88806cf38540 RSP=ffff888009757b28 R8 =0000000000000000 R9 =fffffbfff0ccc54a R10=ffffffff86662a57 R11=0000000000000000 R12=0000000000000200 R13=ffff8880e5468000 R14=ffff88806cf38630 R15=ffff88806cf385e8 RIP=ffffffff815d1a23 RFL=00000046 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff8880e5468000 00000000 00000000 LDT=0000 fffffe6d00000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000000000000000 CR3=0000000015866000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=ff00000000ff000000000000000000ff XMM01=25252525252525252525252525252525 XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000 XMM04=000000000000000000000000000000ff XMM05=00000000000000000000000000000000 XMM06=00000000000000000000000000000000 XMM07=00000000000000000000000000000000 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000