Warning: Permanently added '[localhost]:56280' (ECDSA) to the list of known hosts.
2022/09/15 11:30:16 fuzzer started
2022/09/15 11:30:16 dialing manager at localhost:36559
syzkaller login: [   41.370650] cgroup: Unknown subsys name 'net'
[   41.462998] cgroup: Unknown subsys name 'rlimit'
2022/09/15 11:30:31 syscalls: 2215
2022/09/15 11:30:31 code coverage: enabled
2022/09/15 11:30:31 comparison tracing: enabled
2022/09/15 11:30:31 extra coverage: enabled
2022/09/15 11:30:31 setuid sandbox: enabled
2022/09/15 11:30:31 namespace sandbox: enabled
2022/09/15 11:30:31 Android sandbox: enabled
2022/09/15 11:30:31 fault injection: enabled
2022/09/15 11:30:31 leak checking: enabled
2022/09/15 11:30:31 net packet injection: enabled
2022/09/15 11:30:31 net device setup: enabled
2022/09/15 11:30:31 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist
2022/09/15 11:30:31 devlink PCI setup: PCI device 0000:00:10.0 is not available
2022/09/15 11:30:31 USB emulation: enabled
2022/09/15 11:30:31 hci packet injection: enabled
2022/09/15 11:30:31 wifi device emulation: failed to parse kernel version (6.0.0-rc5-next-20220915                                          )
2022/09/15 11:30:31 802.15.4 emulation: enabled
2022/09/15 11:30:31 fetching corpus: 0, signal 0/2000 (executing program)
2022/09/15 11:30:31 fetching corpus: 50, signal 24328/27616 (executing program)
2022/09/15 11:30:31 fetching corpus: 100, signal 39506/43855 (executing program)
2022/09/15 11:30:32 fetching corpus: 150, signal 50488/55711 (executing program)
2022/09/15 11:30:32 fetching corpus: 200, signal 59189/65176 (executing program)
2022/09/15 11:30:32 fetching corpus: 250, signal 63780/70600 (executing program)
2022/09/15 11:30:32 fetching corpus: 300, signal 68418/75961 (executing program)
2022/09/15 11:30:32 fetching corpus: 350, signal 73748/81812 (executing program)
2022/09/15 11:30:32 fetching corpus: 400, signal 80020/88307 (executing program)
2022/09/15 11:30:33 fetching corpus: 450, signal 83130/91933 (executing program)
2022/09/15 11:30:33 fetching corpus: 500, signal 87578/96624 (executing program)
2022/09/15 11:30:33 fetching corpus: 550, signal 91144/100381 (executing program)
2022/09/15 11:30:33 fetching corpus: 600, signal 97322/106213 (executing program)
2022/09/15 11:30:33 fetching corpus: 650, signal 101206/110013 (executing program)
2022/09/15 11:30:33 fetching corpus: 700, signal 103831/112737 (executing program)
2022/09/15 11:30:34 fetching corpus: 750, signal 106946/115816 (executing program)
2022/09/15 11:30:34 fetching corpus: 800, signal 109533/118377 (executing program)
2022/09/15 11:30:34 fetching corpus: 850, signal 110861/119951 (executing program)
2022/09/15 11:30:34 fetching corpus: 900, signal 112562/121684 (executing program)
2022/09/15 11:30:34 fetching corpus: 950, signal 115144/124099 (executing program)
2022/09/15 11:30:34 fetching corpus: 1000, signal 116654/125633 (executing program)
2022/09/15 11:30:34 fetching corpus: 1050, signal 118554/127385 (executing program)
2022/09/15 11:30:35 fetching corpus: 1100, signal 121401/129946 (executing program)
2022/09/15 11:30:35 fetching corpus: 1150, signal 122970/131409 (executing program)
2022/09/15 11:30:35 fetching corpus: 1200, signal 124973/133108 (executing program)
2022/09/15 11:30:35 fetching corpus: 1250, signal 126332/134425 (executing program)
2022/09/15 11:30:35 fetching corpus: 1300, signal 129745/137043 (executing program)
2022/09/15 11:30:35 fetching corpus: 1350, signal 131069/138164 (executing program)
2022/09/15 11:30:35 fetching corpus: 1400, signal 133132/139794 (executing program)
2022/09/15 11:30:36 fetching corpus: 1450, signal 134810/141032 (executing program)
2022/09/15 11:30:36 fetching corpus: 1500, signal 136094/141992 (executing program)
2022/09/15 11:30:36 fetching corpus: 1550, signal 137307/142844 (executing program)
2022/09/15 11:30:36 fetching corpus: 1600, signal 139434/144522 (executing program)
2022/09/15 11:30:36 fetching corpus: 1650, signal 141322/145654 (executing program)
2022/09/15 11:30:36 fetching corpus: 1700, signal 142909/146637 (executing program)
2022/09/15 11:30:37 fetching corpus: 1743, signal 144599/147608 (executing program)
2022/09/15 11:30:37 fetching corpus: 1743, signal 144599/147692 (executing program)
2022/09/15 11:30:37 fetching corpus: 1743, signal 144599/147774 (executing program)
2022/09/15 11:30:37 fetching corpus: 1743, signal 144599/147841 (executing program)
2022/09/15 11:30:37 fetching corpus: 1743, signal 144599/147921 (executing program)
2022/09/15 11:30:37 fetching corpus: 1743, signal 144599/147980 (executing program)
2022/09/15 11:30:37 fetching corpus: 1743, signal 144599/148067 (executing program)
2022/09/15 11:30:37 fetching corpus: 1743, signal 144599/148142 (executing program)
2022/09/15 11:30:37 fetching corpus: 1743, signal 144599/148225 (executing program)
2022/09/15 11:30:37 fetching corpus: 1743, signal 144599/148306 (executing program)
2022/09/15 11:30:37 fetching corpus: 1743, signal 144599/148398 (executing program)
2022/09/15 11:30:37 fetching corpus: 1743, signal 144599/148473 (executing program)
2022/09/15 11:30:37 fetching corpus: 1743, signal 144599/148543 (executing program)
2022/09/15 11:30:37 fetching corpus: 1743, signal 144599/148633 (executing program)
2022/09/15 11:30:37 fetching corpus: 1743, signal 144599/148721 (executing program)
2022/09/15 11:30:37 fetching corpus: 1743, signal 144599/148802 (executing program)
2022/09/15 11:30:37 fetching corpus: 1743, signal 144599/148890 (executing program)
2022/09/15 11:30:37 fetching corpus: 1743, signal 144599/148976 (executing program)
2022/09/15 11:30:37 fetching corpus: 1743, signal 144599/149046 (executing program)
2022/09/15 11:30:37 fetching corpus: 1743, signal 144599/149115 (executing program)
2022/09/15 11:30:37 fetching corpus: 1743, signal 144599/149184 (executing program)
2022/09/15 11:30:37 fetching corpus: 1743, signal 144599/149274 (executing program)
2022/09/15 11:30:37 fetching corpus: 1743, signal 144599/149357 (executing program)
2022/09/15 11:30:37 fetching corpus: 1743, signal 144599/149447 (executing program)
2022/09/15 11:30:37 fetching corpus: 1743, signal 144599/149532 (executing program)
2022/09/15 11:30:37 fetching corpus: 1743, signal 144599/149627 (executing program)
2022/09/15 11:30:37 fetching corpus: 1743, signal 144599/149712 (executing program)
2022/09/15 11:30:37 fetching corpus: 1743, signal 144599/149789 (executing program)
2022/09/15 11:30:37 fetching corpus: 1743, signal 144599/149882 (executing program)
2022/09/15 11:30:37 fetching corpus: 1743, signal 144599/149961 (executing program)
2022/09/15 11:30:37 fetching corpus: 1743, signal 144599/150033 (executing program)
2022/09/15 11:30:37 fetching corpus: 1743, signal 144599/150122 (executing program)
2022/09/15 11:30:37 fetching corpus: 1743, signal 144599/150207 (executing program)
2022/09/15 11:30:37 fetching corpus: 1743, signal 144599/150287 (executing program)
2022/09/15 11:30:37 fetching corpus: 1743, signal 144599/150358 (executing program)
2022/09/15 11:30:37 fetching corpus: 1743, signal 144599/150445 (executing program)
2022/09/15 11:30:37 fetching corpus: 1743, signal 144599/150508 (executing program)
2022/09/15 11:30:37 fetching corpus: 1743, signal 144599/150508 (executing program)
2022/09/15 11:30:40 starting 8 fuzzer processes
11:30:40 executing program 0:
syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x22, &(0x7f0000000500)={[{}]})
11:30:40 executing program 1:
io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[])
chdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
sendfile(r1, r0, 0x0, 0xfffffdef)
11:30:40 executing program 2:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff)
sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000001840)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x2}]}, 0x1c}}, 0x0)
11:30:40 executing program 3:
r0 = syz_open_dev$tty20(0xc, 0x4, 0x1)
ioctl$TCSETSW(r0, 0x4b3c, 0x0)
11:30:40 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0xffffffff})
[   63.887907] audit: type=1400 audit(1663241440.240:6): avc:  denied  { execmem } for  pid=283 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1
11:30:40 executing program 7:
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0003}]})
pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff)
11:30:40 executing program 5:
r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0)
setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, 0x0, 0x0)
11:30:40 executing program 6:
ioprio_get$pid(0x2, 0xffffffffffffffff)
fcntl$getown(0xffffffffffffffff, 0x9)
getpid()
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, r0, 0x0)
ioprio_set$pid(0x3, 0x0, 0x4007)
[   65.230919] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1
[   65.234783] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9
[   65.236825] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9
[   65.240564] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4
[   65.242308] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3
[   65.243818] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2
[   65.249889] Bluetooth: hci0: HCI_REQ-0x0c1a
[   65.284386] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1
[   65.297560] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1
[   65.314137] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9
[   65.315479] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1
[   65.321833] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9
[   65.323029] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1
[   65.324300] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1
[   65.326287] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9
[   65.328608] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9
[   65.331540] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9
[   65.331926] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9
[   65.334603] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9
[   65.336206] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1
[   65.337705] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4
[   65.338812] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9
[   65.340149] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9
[   65.341518] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9
[   65.343142] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1
[   65.344884] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3
[   65.346069] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9
[   65.347258] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9
[   65.348898] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2
[   65.350078] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4
[   65.352042] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9
[   65.355251] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3
[   65.359404] Bluetooth: hci1: HCI_REQ-0x0c1a
[   65.359824] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4
[   65.362513] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2
[   65.363050] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4
[   65.363969] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4
[   65.364974] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3
[   65.367273] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2
[   65.367729] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3
[   65.368845] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3
[   65.370593] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2
[   65.372103] Bluetooth: hci3: HCI_REQ-0x0c1a
[   65.372231] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2
[   65.380862] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9
[   65.384585] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4
[   65.385621] Bluetooth: hci4: HCI_REQ-0x0c1a
[   65.387104] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3
[   65.388284] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2
[   65.389232] Bluetooth: hci7: HCI_REQ-0x0c1a
[   65.389846] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4
[   65.390145] Bluetooth: hci2: HCI_REQ-0x0c1a
[   65.415786] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3
[   65.419540] Bluetooth: hci6: HCI_REQ-0x0c1a
[   65.422016] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2
[   65.433124] Bluetooth: hci5: HCI_REQ-0x0c1a
[   67.316802] Bluetooth: hci0: command 0x0409 tx timeout
[   67.381420] Bluetooth: hci3: command 0x0409 tx timeout
[   67.381885] Bluetooth: hci1: command 0x0409 tx timeout
[   67.444426] Bluetooth: hci5: command 0x0409 tx timeout
[   67.444559] Bluetooth: hci6: command 0x0409 tx timeout
[   67.444903] Bluetooth: hci4: command 0x0409 tx timeout
[   67.445748] Bluetooth: hci2: command 0x0409 tx timeout
[   67.446173] Bluetooth: hci7: command 0x0409 tx timeout
[   69.364444] Bluetooth: hci0: command 0x041b tx timeout
[   69.428632] Bluetooth: hci1: command 0x041b tx timeout
[   69.429527] Bluetooth: hci3: command 0x041b tx timeout
[   69.492467] Bluetooth: hci6: command 0x041b tx timeout
[   69.492492] Bluetooth: hci7: command 0x041b tx timeout
[   69.493419] Bluetooth: hci5: command 0x041b tx timeout
[   69.494323] Bluetooth: hci2: command 0x041b tx timeout
[   69.496498] Bluetooth: hci4: command 0x041b tx timeout
[   71.412400] Bluetooth: hci0: command 0x040f tx timeout
[   71.476460] Bluetooth: hci3: command 0x040f tx timeout
[   71.477191] Bluetooth: hci1: command 0x040f tx timeout
[   71.540394] Bluetooth: hci5: command 0x040f tx timeout
[   71.540478] Bluetooth: hci4: command 0x040f tx timeout
[   71.542420] Bluetooth: hci2: command 0x040f tx timeout
[   71.542928] Bluetooth: hci7: command 0x040f tx timeout
[   71.543647] Bluetooth: hci6: command 0x040f tx timeout
[   73.460426] Bluetooth: hci0: command 0x0419 tx timeout
[   73.524418] Bluetooth: hci1: command 0x0419 tx timeout
[   73.524886] Bluetooth: hci3: command 0x0419 tx timeout
[   73.588449] Bluetooth: hci5: command 0x0419 tx timeout
[   73.589460] Bluetooth: hci6: command 0x0419 tx timeout
[   73.589969] Bluetooth: hci7: command 0x0419 tx timeout
[   73.590423] Bluetooth: hci2: command 0x0419 tx timeout
[   73.590816] Bluetooth: hci4: command 0x0419 tx timeout
[  127.097390] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1
[  127.110811] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9
[  127.112143] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9
[  127.116285] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4
[  127.118885] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3
[  127.119958] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2
[  127.124797] Bluetooth: hci1: HCI_REQ-0x0c1a
[  127.239560] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1
[  127.240606] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1
[  127.241975] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9
[  127.242689] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9
[  127.244025] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9
[  127.244669] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9
[  127.247838] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4
[  127.248559] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4
[  127.250176] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3
[  127.251045] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3
[  127.287290] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1
[  127.288559] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9
[  127.289755] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9
[  127.291794] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4
[  127.293063] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3
[  127.293899] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2
[  127.299376] Bluetooth: hci6: HCI_REQ-0x0c1a
[  127.320570] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2
[  127.324674] Bluetooth: hci3: HCI_REQ-0x0c1a
[  127.330694] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2
[  127.342406] Bluetooth: hci4: HCI_REQ-0x0c1a
[  127.352892] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1
[  127.356276] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9
[  127.366535] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9
[  127.371836] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4
[  127.380164] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3
[  127.385118] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2
[  127.389953] Bluetooth: hci2: HCI_REQ-0x0c1a
[  129.141412] Bluetooth: hci1: command 0x0409 tx timeout
[  129.268428] Bluetooth: hci5: Opcode 0x c03 failed: -110
[  129.332416] Bluetooth: hci3: command 0x0409 tx timeout
[  129.332531] Bluetooth: hci6: command 0x0409 tx timeout
[  129.333843] Bluetooth: hci7: Opcode 0x c03 failed: -110
[  129.396510] Bluetooth: hci4: command 0x0409 tx timeout
[  129.460402] Bluetooth: hci2: command 0x0409 tx timeout
[  131.189403] Bluetooth: hci1: command 0x041b tx timeout
[  131.380478] Bluetooth: hci6: command 0x041b tx timeout
[  131.381323] Bluetooth: hci3: command 0x041b tx timeout
[  131.445525] Bluetooth: hci4: command 0x041b tx timeout
[  131.509879] Bluetooth: hci2: command 0x041b tx timeout
[  131.853166] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1
[  131.855067] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9
[  131.857548] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9
[  131.860928] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4
[  131.863870] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3
[  131.865187] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2
[  131.871774] Bluetooth: hci5: HCI_REQ-0x0c1a
[  131.985241] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1
[  131.987175] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9
[  131.988162] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9
[  131.994137] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4
[  131.995901] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3
[  132.007008] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2
[  132.015223] Bluetooth: hci7: HCI_REQ-0x0c1a
[  133.237376] Bluetooth: hci1: command 0x040f tx timeout
[  133.429445] Bluetooth: hci3: command 0x040f tx timeout
[  133.430162] Bluetooth: hci6: command 0x040f tx timeout
[  133.493381] Bluetooth: hci4: command 0x040f tx timeout
[  133.557426] Bluetooth: hci2: command 0x040f tx timeout
[  133.877419] Bluetooth: hci5: command 0x0409 tx timeout
[  134.068574] Bluetooth: hci7: command 0x0409 tx timeout
[  135.285381] Bluetooth: hci1: command 0x0419 tx timeout
[  135.477386] Bluetooth: hci6: command 0x0419 tx timeout
[  135.477875] Bluetooth: hci3: command 0x0419 tx timeout
[  135.541384] Bluetooth: hci4: command 0x0419 tx timeout
[  135.604382] Bluetooth: hci2: command 0x0419 tx timeout
[  135.925420] Bluetooth: hci5: command 0x041b tx timeout
[  136.117436] Bluetooth: hci7: command 0x041b tx timeout
[  137.973397] Bluetooth: hci5: command 0x040f tx timeout
[  138.165393] Bluetooth: hci7: command 0x040f tx timeout
[  140.020446] Bluetooth: hci5: command 0x0419 tx timeout
[  140.212632] Bluetooth: hci7: command 0x0419 tx timeout
[  175.914316] loop1: detected capacity change from 0 to 40
[  175.959540] audit: type=1400 audit(1663241552.315:7): avc:  denied  { open } for  pid=6801 comm="syz-executor.1" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1
[  175.961039] audit: type=1400 audit(1663241552.316:8): avc:  denied  { kernel } for  pid=6801 comm="syz-executor.1" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1
[  175.976210] ------------[ cut here ]------------
[  175.976233] 
[  175.976235] ======================================================
[  175.976239] WARNING: possible circular locking dependency detected
[  175.976243] 6.0.0-rc5-next-20220915 #1 Not tainted
[  175.976250] ------------------------------------------------------
[  175.976253] syz-executor.1/6802 is trying to acquire lock:
[  175.976259] ffffffff853fa878 ((console_sem).lock){....}-{2:2}, at: down_trylock+0xe/0x70
[  175.976298] 
[  175.976298] but task is already holding lock:
[  175.976300] ffff88803d98d020 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0
[  175.976331] 
[  175.976331] which lock already depends on the new lock.
[  175.976331] 
[  175.976334] 
[  175.976334] the existing dependency chain (in reverse order) is:
[  175.976338] 
[  175.976338] -> #3 (&ctx->lock){....}-{2:2}:
[  175.976352]        _raw_spin_lock+0x2a/0x40
[  175.976370]        __perf_event_task_sched_out+0x53b/0x18d0
[  175.976382]        __schedule+0xedd/0x2470
[  175.976393]        preempt_schedule_common+0x45/0xc0
[  175.976405]        __cond_resched+0x17/0x30
[  175.976415]        __mutex_lock+0xa3/0x14d0
[  175.976427]        __do_sys_perf_event_open+0x1eec/0x32c0
[  175.976440]        do_syscall_64+0x3b/0x90
[  175.976455]        entry_SYSCALL_64_after_hwframe+0x63/0xcd
[  175.976473] 
[  175.976473] -> #2 (&rq->__lock){-.-.}-{2:2}:
[  175.976487]        _raw_spin_lock_nested+0x30/0x40
[  175.976502]        raw_spin_rq_lock_nested+0x1e/0x30
[  175.976516]        task_fork_fair+0x63/0x4d0
[  175.976533]        sched_cgroup_fork+0x3d0/0x540
[  175.976548]        copy_process+0x4183/0x6e20
[  175.976559]        kernel_clone+0xe7/0x890
[  175.976568]        user_mode_thread+0xad/0xf0
[  175.976578]        rest_init+0x24/0x250
[  175.976595]        arch_call_rest_init+0xf/0x14
[  175.976608]        start_kernel+0x4c1/0x4e6
[  175.976618]        secondary_startup_64_no_verify+0xe0/0xeb
[  175.976633] 
[  175.976633] -> #1 (&p->pi_lock){-.-.}-{2:2}:
[  175.976646]        _raw_spin_lock_irqsave+0x39/0x60
[  175.976662]        try_to_wake_up+0xab/0x1920
[  175.976675]        up+0x75/0xb0
[  175.976687]        __up_console_sem+0x6e/0x80
[  175.976704]        console_unlock+0x46a/0x590
[  175.976720]        vprintk_emit+0x1bd/0x560
[  175.976737]        vprintk+0x84/0xa0
[  175.976753]        _printk+0xba/0xf1
[  175.976772]        kauditd_hold_skb.cold+0x3f/0x4e
[  175.976787]        kauditd_send_queue+0x233/0x290
[  175.976802]        kauditd_thread+0x5da/0x9a0
[  175.976816]        kthread+0x2ed/0x3a0
[  175.976831]        ret_from_fork+0x22/0x30
[  175.976844] 
[  175.976844] -> #0 ((console_sem).lock){....}-{2:2}:
[  175.976857]        __lock_acquire+0x2a02/0x5e70
[  175.976874]        lock_acquire+0x1a2/0x530
[  175.976890]        _raw_spin_lock_irqsave+0x39/0x60
[  175.976906]        down_trylock+0xe/0x70
[  175.976918]        __down_trylock_console_sem+0x3b/0xd0
[  175.976935]        vprintk_emit+0x16b/0x560
[  175.976951]        vprintk+0x84/0xa0
[  175.976967]        _printk+0xba/0xf1
[  175.976985]        report_bug.cold+0x72/0xab
[  175.976997]        handle_bug+0x3c/0x70
[  175.977011]        exc_invalid_op+0x14/0x50
[  175.977024]        asm_exc_invalid_op+0x16/0x20
[  175.977041]        group_sched_out.part.0+0x2c7/0x460
[  175.977052]        ctx_sched_out+0x8f1/0xc10
[  175.977061]        __perf_event_task_sched_out+0x6d0/0x18d0
[  175.977074]        __schedule+0xedd/0x2470
[  175.977084]        preempt_schedule_common+0x45/0xc0
[  175.977095]        __cond_resched+0x17/0x30
[  175.977105]        __mutex_lock+0xa3/0x14d0
[  175.977117]        __do_sys_perf_event_open+0x1eec/0x32c0
[  175.977130]        do_syscall_64+0x3b/0x90
[  175.977143]        entry_SYSCALL_64_after_hwframe+0x63/0xcd
[  175.977161] 
[  175.977161] other info that might help us debug this:
[  175.977161] 
[  175.977163] Chain exists of:
[  175.977163]   (console_sem).lock --> &rq->__lock --> &ctx->lock
[  175.977163] 
[  175.977178]  Possible unsafe locking scenario:
[  175.977178] 
[  175.977181]        CPU0                    CPU1
[  175.977183]        ----                    ----
[  175.977185]   lock(&ctx->lock);
[  175.977191]                                lock(&rq->__lock);
[  175.977197]                                lock(&ctx->lock);
[  175.977204]   lock((console_sem).lock);
[  175.977209] 
[  175.977209]  *** DEADLOCK ***
[  175.977209] 
[  175.977211] 2 locks held by syz-executor.1/6802:
[  175.977218]  #0: ffff88806cf37cd8 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x1cf/0x2470
[  175.977244]  #1: ffff88803d98d020 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0
[  175.977271] 
[  175.977271] stack backtrace:
[  175.977274] CPU: 1 PID: 6802 Comm: syz-executor.1 Not tainted 6.0.0-rc5-next-20220915 #1
[  175.977287] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
[  175.977295] Call Trace:
[  175.977298]  
[  175.977302]  dump_stack_lvl+0x8b/0xb3
[  175.977318]  check_noncircular+0x263/0x2e0
[  175.977335]  ? format_decode+0x26c/0xb50
[  175.977351]  ? print_circular_bug+0x450/0x450
[  175.977368]  ? enable_ptr_key_workfn+0x20/0x20
[  175.977382]  ? __lockdep_reset_lock+0x180/0x180
[  175.977400]  ? format_decode+0x26c/0xb50
[  175.977415]  ? alloc_chain_hlocks+0x1ec/0x5a0
[  175.977433]  __lock_acquire+0x2a02/0x5e70
[  175.977455]  ? lockdep_hardirqs_on_prepare+0x410/0x410
[  175.977478]  lock_acquire+0x1a2/0x530
[  175.977495]  ? down_trylock+0xe/0x70
[  175.977510]  ? rcu_read_unlock+0x40/0x40
[  175.977527]  ? lockdep_hardirqs_on_prepare+0x410/0x410
[  175.977549]  ? vprintk+0x84/0xa0
[  175.977568]  _raw_spin_lock_irqsave+0x39/0x60
[  175.977584]  ? down_trylock+0xe/0x70
[  175.977598]  down_trylock+0xe/0x70
[  175.977611]  ? vprintk+0x84/0xa0
[  175.977628]  __down_trylock_console_sem+0x3b/0xd0
[  175.977646]  vprintk_emit+0x16b/0x560
[  175.977663]  ? lock_downgrade+0x6d0/0x6d0
[  175.977682]  vprintk+0x84/0xa0
[  175.977700]  _printk+0xba/0xf1
[  175.977718]  ? record_print_text.cold+0x16/0x16
[  175.977740]  ? hrtimer_try_to_cancel+0x163/0x2c0
[  175.977754]  ? lock_downgrade+0x6d0/0x6d0
[  175.977772]  ? report_bug.cold+0x66/0xab
[  175.977787]  ? group_sched_out.part.0+0x2c7/0x460
[  175.977798]  report_bug.cold+0x72/0xab
[  175.977814]  handle_bug+0x3c/0x70
[  175.977828]  exc_invalid_op+0x14/0x50
[  175.977843]  asm_exc_invalid_op+0x16/0x20
[  175.977861] RIP: 0010:group_sched_out.part.0+0x2c7/0x460
[  175.977875] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00
[  175.977887] RSP: 0018:ffff8880389e7978 EFLAGS: 00010006
[  175.977896] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000
[  175.977904] RDX: ffff888018953580 RSI: ffffffff81566027 RDI: 0000000000000005
[  175.977912] RBP: ffff888017470000 R08: 0000000000000005 R09: 0000000000000001
[  175.977919] R10: 0000000000000000 R11: 0000000000000001 R12: ffff88803d98d000
[  175.977927] R13: ffff88806cf3d100 R14: ffffffff8547bfc0 R15: 0000000000000002
[  175.977938]  ? group_sched_out.part.0+0x2c7/0x460
[  175.977951]  ? group_sched_out.part.0+0x2c7/0x460
[  175.977964]  ctx_sched_out+0x8f1/0xc10
[  175.977976]  __perf_event_task_sched_out+0x6d0/0x18d0
[  175.977992]  ? lock_is_held_type+0xd7/0x130
[  175.978011]  ? __perf_cgroup_move+0x160/0x160
[  175.978023]  ? set_next_entity+0x304/0x550
[  175.978041]  ? update_curr+0x267/0x740
[  175.978060]  ? lock_is_held_type+0xd7/0x130
[  175.978079]  __schedule+0xedd/0x2470
[  175.978093]  ? io_schedule_timeout+0x150/0x150
[  175.978104]  ? find_held_lock+0x2c/0x110
[  175.978121]  ? lock_is_held_type+0xd7/0x130
[  175.978139]  ? __cond_resched+0x17/0x30
[  175.978151]  preempt_schedule_common+0x45/0xc0
[  175.978164]  __cond_resched+0x17/0x30
[  175.978176]  __mutex_lock+0xa3/0x14d0
[  175.978189]  ? lock_is_held_type+0xd7/0x130
[  175.978207]  ? __do_sys_perf_event_open+0x1eec/0x32c0
[  175.978222]  ? mutex_lock_io_nested+0x1310/0x1310
[  175.978235]  ? lock_release+0x3b2/0x750
[  175.978253]  ? __up_read+0x192/0x730
[  175.978268]  ? up_write+0x480/0x480
[  175.978285]  __do_sys_perf_event_open+0x1eec/0x32c0
[  175.978302]  ? perf_compat_ioctl+0x130/0x130
[  175.978315]  ? xfd_validate_state+0x59/0x180
[  175.978339]  ? syscall_enter_from_user_mode+0x1d/0x50
[  175.978358]  ? syscall_enter_from_user_mode+0x1d/0x50
[  175.978379]  do_syscall_64+0x3b/0x90
[  175.978393]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
[  175.978412] RIP: 0033:0x7fc82655eb19
[  175.978420] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[  175.978431] RSP: 002b:00007fc823ad4188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a
[  175.978442] RAX: ffffffffffffffda RBX: 00007fc826671f60 RCX: 00007fc82655eb19
[  175.978450] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 0000000020000280
[  175.978457] RBP: 00007fc8265b8f6d R08: 000000000000000b R09: 0000000000000000
[  175.978464] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000000
[  175.978472] R13: 00007ffdf4f3b97f R14: 00007fc823ad4300 R15: 0000000000022000
[  175.978485]  
[  176.042301] WARNING: CPU: 1 PID: 6802 at kernel/events/core.c:2309 group_sched_out.part.0+0x2c7/0x460
[  176.043014] Modules linked in:
[  176.043261] CPU: 1 PID: 6802 Comm: syz-executor.1 Not tainted 6.0.0-rc5-next-20220915 #1
[  176.043885] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
[  176.044740] RIP: 0010:group_sched_out.part.0+0x2c7/0x460
[  176.045160] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00
[  176.046557] RSP: 0018:ffff8880389e7978 EFLAGS: 00010006
[  176.046963] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000
[  176.047502] RDX: ffff888018953580 RSI: ffffffff81566027 RDI: 0000000000000005
[  176.048018] RBP: ffff888017470000 R08: 0000000000000005 R09: 0000000000000001
[  176.048541] R10: 0000000000000000 R11: 0000000000000001 R12: ffff88803d98d000
[  176.049058] R13: ffff88806cf3d100 R14: ffffffff8547bfc0 R15: 0000000000000002
[  176.049592] FS:  00007fc823ad4700(0000) GS:ffff88806cf00000(0000) knlGS:0000000000000000
[  176.050174] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  176.050609] CR2: 00007f2b5e9fdb70 CR3: 000000001a608000 CR4: 0000000000350ee0
[  176.051124] Call Trace:
[  176.051318]  
[  176.051490]  ctx_sched_out+0x8f1/0xc10
[  176.051785]  __perf_event_task_sched_out+0x6d0/0x18d0
[  176.052179]  ? lock_is_held_type+0xd7/0x130
[  176.052508]  ? __perf_cgroup_move+0x160/0x160
[  176.052845]  ? set_next_entity+0x304/0x550
[  176.053163]  ? update_curr+0x267/0x740
[  176.053461]  ? lock_is_held_type+0xd7/0x130
[  176.053792]  __schedule+0xedd/0x2470
[  176.054077]  ? io_schedule_timeout+0x150/0x150
[  176.054421]  ? find_held_lock+0x2c/0x110
[  176.054725]  ? lock_is_held_type+0xd7/0x130
[  176.055045]  ? __cond_resched+0x17/0x30
[  176.055355]  preempt_schedule_common+0x45/0xc0
[  176.055706]  __cond_resched+0x17/0x30
[  176.055993]  __mutex_lock+0xa3/0x14d0
[  176.056284]  ? lock_is_held_type+0xd7/0x130
[  176.056618]  ? __do_sys_perf_event_open+0x1eec/0x32c0
[  176.057014]  ? mutex_lock_io_nested+0x1310/0x1310
[  176.057380]  ? lock_release+0x3b2/0x750
[  176.057686]  ? __up_read+0x192/0x730
[  176.057969]  ? up_write+0x480/0x480
[  176.058258]  __do_sys_perf_event_open+0x1eec/0x32c0
[  176.058633]  ? perf_compat_ioctl+0x130/0x130
[  176.058961]  ? xfd_validate_state+0x59/0x180
[  176.059304]  ? syscall_enter_from_user_mode+0x1d/0x50
[  176.059691]  ? syscall_enter_from_user_mode+0x1d/0x50
[  176.060079]  do_syscall_64+0x3b/0x90
[  176.060369]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
[  176.060768] RIP: 0033:0x7fc82655eb19
[  176.061039] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[  176.062335] RSP: 002b:00007fc823ad4188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a
[  176.062896] RAX: ffffffffffffffda RBX: 00007fc826671f60 RCX: 00007fc82655eb19
[  176.063421] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 0000000020000280
[  176.063936] RBP: 00007fc8265b8f6d R08: 000000000000000b R09: 0000000000000000
[  176.064460] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000000
[  176.064974] R13: 00007ffdf4f3b97f R14: 00007fc823ad4300 R15: 0000000000022000
[  176.065512]  
[  176.065695] irq event stamp: 3488
[  176.065946] hardirqs last  enabled at (3487): [] asm_sysvec_apic_timer_interrupt+0x16/0x20
[  176.066693] hardirqs last disabled at (3488): [] __schedule+0x1225/0x2470
[  176.067325] softirqs last  enabled at (3204): [] __irq_exit_rcu+0x11b/0x180
[  176.067976] softirqs last disabled at (3199): [] __irq_exit_rcu+0x11b/0x180
[  176.068608] ---[ end trace 0000000000000000 ]---
[  176.461337] hrtimer: interrupt took 12103 ns
[  176.468679] syz-executor.1: attempt to access beyond end of device
[  176.468679] loop1: rw=2049, sector=40, nr_sectors = 4 limit=40
[  176.469817] Buffer I/O error on dev loop1, logical block 10, lost async page write
11:32:35 executing program 2:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff)
sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000001840)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x2}]}, 0x1c}}, 0x0)
11:32:35 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0xffffffff})
11:32:35 executing program 3:
r0 = syz_open_dev$tty20(0xc, 0x4, 0x1)
ioctl$TCSETSW(r0, 0x4b3c, 0x0)
11:32:35 executing program 1:
io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[])
chdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
sendfile(r1, r0, 0x0, 0xfffffdef)
11:32:35 executing program 0:
syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x22, &(0x7f0000000500)={[{}]})
11:32:35 executing program 6:
ioprio_get$pid(0x2, 0xffffffffffffffff)
fcntl$getown(0xffffffffffffffff, 0x9)
getpid()
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, r0, 0x0)
ioprio_set$pid(0x3, 0x0, 0x4007)
11:32:35 executing program 7:
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0003}]})
pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff)
11:32:35 executing program 5:
r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0)
setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, 0x0, 0x0)
[  179.074189] loop1: detected capacity change from 0 to 40
11:32:35 executing program 0:
syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x22, &(0x7f0000000500)={[{}]})
11:32:35 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0xffffffff})
11:32:35 executing program 7:
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0003}]})
pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff)
11:32:35 executing program 2:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff)
sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000001840)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x2}]}, 0x1c}}, 0x0)
11:32:35 executing program 5:
r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0)
setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, 0x0, 0x0)
[  179.231589] syz-executor.1: attempt to access beyond end of device
[  179.231589] loop1: rw=2049, sector=40, nr_sectors = 4 limit=40
[  179.232779] Buffer I/O error on dev loop1, logical block 10, lost async page write
11:32:35 executing program 0:
syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x22, &(0x7f0000000500)={[{}]})
11:32:35 executing program 3:
r0 = syz_open_dev$tty20(0xc, 0x4, 0x1)
ioctl$TCSETSW(r0, 0x4b3c, 0x0)
11:32:35 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0xffffffff})
11:32:35 executing program 7:
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0003}]})
pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff)
11:32:35 executing program 5:
r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0)
setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, 0x0, 0x0)
11:32:35 executing program 6:
ioprio_get$pid(0x2, 0xffffffffffffffff)
fcntl$getown(0xffffffffffffffff, 0x9)
getpid()
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, r0, 0x0)
ioprio_set$pid(0x3, 0x0, 0x4007)
11:32:35 executing program 2:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff)
sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000001840)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x2}]}, 0x1c}}, 0x0)
11:32:35 executing program 1:
io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[])
chdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
sendfile(r1, r0, 0x0, 0xfffffdef)
11:32:35 executing program 6:
ioprio_get$pid(0x2, 0xffffffffffffffff)
fcntl$getown(0xffffffffffffffff, 0x9)
getpid()
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, r0, 0x0)
ioprio_set$pid(0x3, 0x0, 0x4007)
[  179.380503] loop1: detected capacity change from 0 to 40
11:32:35 executing program 3:
r0 = syz_open_dev$tty20(0xc, 0x4, 0x1)
ioctl$TCSETSW(r0, 0x4b3c, 0x0)
11:32:35 executing program 4:
syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x22, &(0x7f0000000500)={[{}]})
11:32:35 executing program 5:
ioprio_get$pid(0x2, 0xffffffffffffffff)
fcntl$getown(0xffffffffffffffff, 0x9)
getpid()
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, r0, 0x0)
ioprio_set$pid(0x3, 0x0, 0x4007)
11:32:35 executing program 0:
io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[])
chdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
sendfile(r1, r0, 0x0, 0xfffffdef)
[  179.446915] loop0: detected capacity change from 0 to 40
[  179.456300] syz-executor.1: attempt to access beyond end of device
[  179.456300] loop1: rw=2049, sector=40, nr_sectors = 4 limit=40
[  179.457309] Buffer I/O error on dev loop1, logical block 10, lost async page write
11:32:35 executing program 6:
io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[])
chdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
sendfile(r1, r0, 0x0, 0xfffffdef)
11:32:35 executing program 2:
io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[])
chdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
sendfile(r1, r0, 0x0, 0xfffffdef)
11:32:35 executing program 7:
openat$bsg(0xffffffffffffff9c, &(0x7f0000002280), 0x105103, 0x0)
[  179.482205] loop6: detected capacity change from 0 to 40
[  179.495518] loop2: detected capacity change from 0 to 40
[  179.544009] syz-executor.6: attempt to access beyond end of device
[  179.544009] loop6: rw=2049, sector=40, nr_sectors = 4 limit=40
[  179.545208] Buffer I/O error on dev loop6, logical block 10, lost async page write
[  179.549636] syz-executor.2: attempt to access beyond end of device
[  179.549636] loop2: rw=2049, sector=40, nr_sectors = 4 limit=40
[  179.550622] Buffer I/O error on dev loop2, logical block 10, lost async page write
[  179.551934] syz-executor.0: attempt to access beyond end of device
[  179.551934] loop0: rw=2049, sector=40, nr_sectors = 4 limit=40
[  179.553037] Buffer I/O error on dev loop0, logical block 10, lost async page write
11:32:35 executing program 5:
ioprio_get$pid(0x2, 0xffffffffffffffff)
fcntl$getown(0xffffffffffffffff, 0x9)
getpid()
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, r0, 0x0)
ioprio_set$pid(0x3, 0x0, 0x4007)
11:32:35 executing program 3:
syz_emit_ethernet(0x46, &(0x7f0000001400)={@multicast, @local, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, '#\x00\b', 0x10, 0x2c, 0x0, @empty, @local, {[], {0x0, 0xfffc, 0x10, 0x0, @opaque="44e67c344da1a96c"}}}}}}, 0x0)
11:32:35 executing program 1:
io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[])
chdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
sendfile(r1, r0, 0x0, 0xfffffdef)
11:32:35 executing program 2:
io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[])
chdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
sendfile(r1, r0, 0x0, 0xfffffdef)
11:32:35 executing program 4:
syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x22, &(0x7f0000000500)={[{}]})
11:32:35 executing program 0:
io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[])
chdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
sendfile(r1, r0, 0x0, 0xfffffdef)
11:32:35 executing program 7:
socket$nl_audit(0x10, 0x3, 0x9)
11:32:35 executing program 6:
io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[])
chdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
sendfile(r1, r0, 0x0, 0xfffffdef)
[  179.642946] loop1: detected capacity change from 0 to 40
[  179.648951] loop0: detected capacity change from 0 to 40
[  179.662982] loop2: detected capacity change from 0 to 40
[  179.681495] loop6: detected capacity change from 0 to 40
11:32:36 executing program 5:
ioprio_get$pid(0x2, 0xffffffffffffffff)
fcntl$getown(0xffffffffffffffff, 0x9)
getpid()
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, r0, 0x0)
ioprio_set$pid(0x3, 0x0, 0x4007)
[  179.708631] syz-executor.0: attempt to access beyond end of device
[  179.708631] loop0: rw=2049, sector=40, nr_sectors = 4 limit=40
[  179.709866] Buffer I/O error on dev loop0, logical block 10, lost async page write
[  179.732755] syz-executor.2: attempt to access beyond end of device
[  179.732755] loop2: rw=2049, sector=40, nr_sectors = 4 limit=40
[  179.733912] Buffer I/O error on dev loop2, logical block 10, lost async page write
11:32:36 executing program 3:
syz_emit_ethernet(0x46, &(0x7f0000001400)={@multicast, @local, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, '#\x00\b', 0x10, 0x2c, 0x0, @empty, @local, {[], {0x0, 0xfffc, 0x10, 0x0, @opaque="44e67c344da1a96c"}}}}}}, 0x0)
11:32:36 executing program 4:
syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0)
syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x22, &(0x7f0000000500)={[{}]})
11:32:36 executing program 7:
syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',access=any,cache=none,debug=0'])
11:32:36 executing program 0:
io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[])
chdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
sendfile(r1, r0, 0x0, 0xfffffdef)
11:32:36 executing program 5:
shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil)
shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil)
r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil)
shmctl$IPC_SET(r0, 0x1, &(0x7f0000000000)={{0x3, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1})
shmat(0x0, &(0x7f0000ffb000/0x4000)=nil, 0x2000)
shmctl$IPC_RMID(0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x208, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00')
shmget(0x1, 0x3000, 0x20, &(0x7f0000ff9000/0x3000)=nil)
pread64(r1, &(0x7f00000000c0)=""/98, 0x62, 0x7fff)
[  179.824457] loop0: detected capacity change from 0 to 40
11:32:36 executing program 2:
io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[])
chdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
sendfile(r1, r0, 0x0, 0xfffffdef)
[  179.887764] syz-executor.0: attempt to access beyond end of device
[  179.887764] loop0: rw=2049, sector=40, nr_sectors = 4 limit=40
[  179.888815] Buffer I/O error on dev loop0, logical block 10, lost async page write
[  179.928499] loop2: detected capacity change from 0 to 40
[  180.031562] syz-executor.6: attempt to access beyond end of device
[  180.031562] loop6: rw=2049, sector=40, nr_sectors = 4 limit=40
[  180.032839] Buffer I/O error on dev loop6, logical block 10, lost async page write
11:32:36 executing program 0:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'})
socket$inet_icmp_raw(0x2, 0x3, 0x1)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x14)
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'})
11:32:36 executing program 3:
syz_emit_ethernet(0x46, &(0x7f0000001400)={@multicast, @local, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, '#\x00\b', 0x10, 0x2c, 0x0, @empty, @local, {[], {0x0, 0xfffc, 0x10, 0x0, @opaque="44e67c344da1a96c"}}}}}}, 0x0)
11:32:36 executing program 7:
syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',access=any,cache=none,debug=0'])
11:32:36 executing program 5:
shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil)
shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil)
r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil)
shmctl$IPC_SET(r0, 0x1, &(0x7f0000000000)={{0x3, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1})
shmat(0x0, &(0x7f0000ffb000/0x4000)=nil, 0x2000)
shmctl$IPC_RMID(0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x208, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00')
shmget(0x1, 0x3000, 0x20, &(0x7f0000ff9000/0x3000)=nil)
pread64(r1, &(0x7f00000000c0)=""/98, 0x62, 0x7fff)
11:32:36 executing program 6:
io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[])
chdir(&(0x7f0000000140)='./file0\x00')
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
sendfile(r1, r0, 0x0, 0xfffffdef)
11:32:36 executing program 1:
syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',access=any,cache=none,debug=0'])
[  180.306019] device lo entered promiscuous mode
[  180.312087] loop6: detected capacity change from 0 to 40
[  180.334498] device lo left promiscuous mode
[  180.335977] device lo entered promiscuous mode
11:32:36 executing program 1:
syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',access=any,cache=none,debug=0'])
11:32:36 executing program 0:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'})
socket$inet_icmp_raw(0x2, 0x3, 0x1)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x14)
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'})
11:32:36 executing program 3:
syz_emit_ethernet(0x46, &(0x7f0000001400)={@multicast, @local, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, '#\x00\b', 0x10, 0x2c, 0x0, @empty, @local, {[], {0x0, 0xfffc, 0x10, 0x0, @opaque="44e67c344da1a96c"}}}}}}, 0x0)
[  180.409695] device lo left promiscuous mode
[  180.413509] device lo entered promiscuous mode
11:32:36 executing program 7:
syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',access=any,cache=none,debug=0'])
11:32:36 executing program 1:
syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',access=any,cache=none,debug=0'])
11:32:36 executing program 0:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'})
socket$inet_icmp_raw(0x2, 0x3, 0x1)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x14)
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'})
[  180.476040] device lo left promiscuous mode
[  180.479191] device lo entered promiscuous mode
11:32:36 executing program 5:
shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil)
shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil)
r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil)
shmctl$IPC_SET(r0, 0x1, &(0x7f0000000000)={{0x3, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1})
shmat(0x0, &(0x7f0000ffb000/0x4000)=nil, 0x2000)
shmctl$IPC_RMID(0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x208, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00')
shmget(0x1, 0x3000, 0x20, &(0x7f0000ff9000/0x3000)=nil)
pread64(r1, &(0x7f00000000c0)=""/98, 0x62, 0x7fff)
11:32:36 executing program 0:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'})
socket$inet_icmp_raw(0x2, 0x3, 0x1)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x14)
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'})
[  180.546129] device lo left promiscuous mode
11:32:36 executing program 7:
syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',access=any,cache=none,debug=0'])
[  180.558154] device lo entered promiscuous mode
11:32:36 executing program 2:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'})
socket$inet_icmp_raw(0x2, 0x3, 0x1)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x14)
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'})
[  180.590454] device lo entered promiscuous mode
11:32:36 executing program 4:
shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil)
shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil)
r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil)
shmctl$IPC_SET(r0, 0x1, &(0x7f0000000000)={{0x3, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1})
shmat(0x0, &(0x7f0000ffb000/0x4000)=nil, 0x2000)
shmctl$IPC_RMID(0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x208, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00')
shmget(0x1, 0x3000, 0x20, &(0x7f0000ff9000/0x3000)=nil)
pread64(r1, &(0x7f00000000c0)=""/98, 0x62, 0x7fff)
11:32:36 executing program 7:
shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil)
shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil)
r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil)
shmctl$IPC_SET(r0, 0x1, &(0x7f0000000000)={{0x3, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1})
shmat(0x0, &(0x7f0000ffb000/0x4000)=nil, 0x2000)
shmctl$IPC_RMID(0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x208, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00')
shmget(0x1, 0x3000, 0x20, &(0x7f0000ff9000/0x3000)=nil)
pread64(r1, &(0x7f00000000c0)=""/98, 0x62, 0x7fff)
11:32:36 executing program 2:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'})
socket$inet_icmp_raw(0x2, 0x3, 0x1)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x14)
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'})
11:32:37 executing program 6:
shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil)
shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil)
r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil)
shmctl$IPC_SET(r0, 0x1, &(0x7f0000000000)={{0x3, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1})
shmat(0x0, &(0x7f0000ffb000/0x4000)=nil, 0x2000)
shmctl$IPC_RMID(0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x208, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00')
shmget(0x1, 0x3000, 0x20, &(0x7f0000ff9000/0x3000)=nil)
pread64(r1, &(0x7f00000000c0)=""/98, 0x62, 0x7fff)
[  180.697719] device lo left promiscuous mode
[  180.707726] device lo entered promiscuous mode
11:32:37 executing program 5:
shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil)
shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil)
r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil)
shmctl$IPC_SET(r0, 0x1, &(0x7f0000000000)={{0x3, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1})
shmat(0x0, &(0x7f0000ffb000/0x4000)=nil, 0x2000)
shmctl$IPC_RMID(0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x208, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00')
shmget(0x1, 0x3000, 0x20, &(0x7f0000ff9000/0x3000)=nil)
pread64(r1, &(0x7f00000000c0)=""/98, 0x62, 0x7fff)
11:32:37 executing program 0:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000011c0)=0x1d)
11:32:37 executing program 3:
shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil)
shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil)
r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil)
shmctl$IPC_SET(r0, 0x1, &(0x7f0000000000)={{0x3, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1})
shmat(0x0, &(0x7f0000ffb000/0x4000)=nil, 0x2000)
shmctl$IPC_RMID(0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x208, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00')
shmget(0x1, 0x3000, 0x20, &(0x7f0000ff9000/0x3000)=nil)
pread64(r1, &(0x7f00000000c0)=""/98, 0x62, 0x7fff)
11:32:37 executing program 7:
shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil)
shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil)
r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil)
shmctl$IPC_SET(r0, 0x1, &(0x7f0000000000)={{0x3, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1})
shmat(0x0, &(0x7f0000ffb000/0x4000)=nil, 0x2000)
shmctl$IPC_RMID(0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x208, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00')
shmget(0x1, 0x3000, 0x20, &(0x7f0000ff9000/0x3000)=nil)
pread64(r1, &(0x7f00000000c0)=""/98, 0x62, 0x7fff)
11:32:37 executing program 2:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'})
socket$inet_icmp_raw(0x2, 0x3, 0x1)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x14)
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'})
11:32:37 executing program 1:
write$selinux_attr(0xffffffffffffffff, &(0x7f0000000000)='system_u:object_r:apt_var_log_t:s0\x00', 0x23)
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'rose0\x00'})
ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f00000001c0)=ANY=[@ANYBLOB="010011"])
11:32:37 executing program 6:
shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil)
shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil)
r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil)
shmctl$IPC_SET(r0, 0x1, &(0x7f0000000000)={{0x3, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1})
shmat(0x0, &(0x7f0000ffb000/0x4000)=nil, 0x2000)
shmctl$IPC_RMID(0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x208, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00')
shmget(0x1, 0x3000, 0x20, &(0x7f0000ff9000/0x3000)=nil)
pread64(r1, &(0x7f00000000c0)=""/98, 0x62, 0x7fff)
11:32:37 executing program 4:
shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil)
shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil)
r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil)
shmctl$IPC_SET(r0, 0x1, &(0x7f0000000000)={{0x3, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1})
shmat(0x0, &(0x7f0000ffb000/0x4000)=nil, 0x2000)
shmctl$IPC_RMID(0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x208, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00')
shmget(0x1, 0x3000, 0x20, &(0x7f0000ff9000/0x3000)=nil)
pread64(r1, &(0x7f00000000c0)=""/98, 0x62, 0x7fff)
[  180.868856] device lo left promiscuous mode
[  180.872172] device lo entered promiscuous mode
11:32:37 executing program 0:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000011c0)=0x1d)
11:32:37 executing program 1:
write$selinux_attr(0xffffffffffffffff, &(0x7f0000000000)='system_u:object_r:apt_var_log_t:s0\x00', 0x23)
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'rose0\x00'})
ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f00000001c0)=ANY=[@ANYBLOB="010011"])
11:32:37 executing program 2:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff})
setsockopt$SO_TIMESTAMP(r1, 0x1, 0x23, &(0x7f0000000080)=0x3ff, 0x4)
sendmsg$unix(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0)
11:32:37 executing program 0:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000011c0)=0x1d)
11:32:37 executing program 3:
shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil)
shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil)
r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil)
shmctl$IPC_SET(r0, 0x1, &(0x7f0000000000)={{0x3, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1})
shmat(0x0, &(0x7f0000ffb000/0x4000)=nil, 0x2000)
shmctl$IPC_RMID(0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x208, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00')
shmget(0x1, 0x3000, 0x20, &(0x7f0000ff9000/0x3000)=nil)
pread64(r1, &(0x7f00000000c0)=""/98, 0x62, 0x7fff)
11:32:37 executing program 2:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff})
setsockopt$SO_TIMESTAMP(r1, 0x1, 0x23, &(0x7f0000000080)=0x3ff, 0x4)
sendmsg$unix(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0)
11:32:37 executing program 5:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff})
setsockopt$SO_TIMESTAMP(r1, 0x1, 0x23, &(0x7f0000000080)=0x3ff, 0x4)
sendmsg$unix(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0)
11:32:37 executing program 1:
write$selinux_attr(0xffffffffffffffff, &(0x7f0000000000)='system_u:object_r:apt_var_log_t:s0\x00', 0x23)
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'rose0\x00'})
ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f00000001c0)=ANY=[@ANYBLOB="010011"])
11:32:37 executing program 7:
shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil)
shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil)
r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil)
shmctl$IPC_SET(r0, 0x1, &(0x7f0000000000)={{0x3, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1})
shmat(0x0, &(0x7f0000ffb000/0x4000)=nil, 0x2000)
shmctl$IPC_RMID(0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x208, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00')
shmget(0x1, 0x3000, 0x20, &(0x7f0000ff9000/0x3000)=nil)
pread64(r1, &(0x7f00000000c0)=""/98, 0x62, 0x7fff)
11:32:37 executing program 6:
shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil)
shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil)
r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil)
shmctl$IPC_SET(r0, 0x1, &(0x7f0000000000)={{0x3, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1})
shmat(0x0, &(0x7f0000ffb000/0x4000)=nil, 0x2000)
shmctl$IPC_RMID(0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x208, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00')
shmget(0x1, 0x3000, 0x20, &(0x7f0000ff9000/0x3000)=nil)
pread64(r1, &(0x7f00000000c0)=""/98, 0x62, 0x7fff)
11:32:37 executing program 4:
shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil)
shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil)
r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil)
shmctl$IPC_SET(r0, 0x1, &(0x7f0000000000)={{0x3, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1})
shmat(0x0, &(0x7f0000ffb000/0x4000)=nil, 0x2000)
shmctl$IPC_RMID(0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x208, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00')
shmget(0x1, 0x3000, 0x20, &(0x7f0000ff9000/0x3000)=nil)
pread64(r1, &(0x7f00000000c0)=""/98, 0x62, 0x7fff)
11:32:37 executing program 0:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000011c0)=0x1d)
11:32:37 executing program 2:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff})
setsockopt$SO_TIMESTAMP(r1, 0x1, 0x23, &(0x7f0000000080)=0x3ff, 0x4)
sendmsg$unix(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0)
11:32:37 executing program 5:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff})
setsockopt$SO_TIMESTAMP(r1, 0x1, 0x23, &(0x7f0000000080)=0x3ff, 0x4)
sendmsg$unix(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0)
11:32:37 executing program 1:
write$selinux_attr(0xffffffffffffffff, &(0x7f0000000000)='system_u:object_r:apt_var_log_t:s0\x00', 0x23)
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'rose0\x00'})
ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f00000001c0)=ANY=[@ANYBLOB="010011"])
11:32:37 executing program 0:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff})
setsockopt$SO_TIMESTAMP(r1, 0x1, 0x23, &(0x7f0000000080)=0x3ff, 0x4)
sendmsg$unix(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0)
11:32:37 executing program 7:
r0 = syz_io_uring_setup(0xeaf, &(0x7f0000000200), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_io_uring_submit(r1, r2, &(0x7f00000006c0)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40}, 0x0)
io_uring_enter(r0, 0x100001, 0x0, 0x0, 0x0, 0x0)
11:32:37 executing program 4:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
getsockopt$inet_udp_int(r0, 0x11, 0x65, 0xffffffffffffffff, &(0x7f0000000000))
11:32:37 executing program 2:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff})
setsockopt$SO_TIMESTAMP(r1, 0x1, 0x23, &(0x7f0000000080)=0x3ff, 0x4)
sendmsg$unix(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0)
11:32:37 executing program 3:
shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil)
shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil)
r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil)
shmctl$IPC_SET(r0, 0x1, &(0x7f0000000000)={{0x3, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1})
shmat(0x0, &(0x7f0000ffb000/0x4000)=nil, 0x2000)
shmctl$IPC_RMID(0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x208, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00')
shmget(0x1, 0x3000, 0x20, &(0x7f0000ff9000/0x3000)=nil)
pread64(r1, &(0x7f00000000c0)=""/98, 0x62, 0x7fff)
11:32:37 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000000c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3f, 0x0, "704f5992d666aa2888e479ca552ee155f638582a91ca97213cf4774a2e4c350cdc3f9f62a4c21970bd149a52fa311b916bf00b51b808c412ed6b9fcbb5be4a2fb7dd8fd0dfa22b4100"}, 0xd8)
setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c)
setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000680)=0x1865, 0x4)
setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000), 0x4)
sendmmsg$inet6(r0, &(0x7f00000011c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000340)="ee", 0x1}], 0x1}}], 0x1, 0x0)
11:32:37 executing program 4:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
getsockopt$inet_udp_int(r0, 0x11, 0x65, 0xffffffffffffffff, &(0x7f0000000000))
11:32:37 executing program 6:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
11:32:37 executing program 7:
r0 = syz_io_uring_setup(0xeaf, &(0x7f0000000200), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_io_uring_submit(r1, r2, &(0x7f00000006c0)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40}, 0x0)
io_uring_enter(r0, 0x100001, 0x0, 0x0, 0x0, 0x0)
11:32:37 executing program 5:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff})
setsockopt$SO_TIMESTAMP(r1, 0x1, 0x23, &(0x7f0000000080)=0x3ff, 0x4)
sendmsg$unix(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0)
11:32:37 executing program 1:
r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
r1 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000300)={'syz', 0x1}, 0x0, 0x0, r0)
r2 = add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)="18419cc68448de3ae8f97ea6a46d823d4f19cecbf569a58b79851d91f3da031fecf4dfebf4ac3b13988a048b4e35761cb05a5d5b28e1ca6ceebae02cbbf7e894098749d5f99cb226f14f00b6034bfb02a7a5af409f531820bd319b9d7c3405022b550d32ad368fdbbddb8ed631d1dde9a4ed", 0xff10, r1)
keyctl$chown(0x4, r2, 0xee00, 0x0)
11:32:37 executing program 0:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff})
setsockopt$SO_TIMESTAMP(r1, 0x1, 0x23, &(0x7f0000000080)=0x3ff, 0x4)
sendmsg$unix(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0)
11:32:37 executing program 0:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff})
setsockopt$SO_TIMESTAMP(r1, 0x1, 0x23, &(0x7f0000000080)=0x3ff, 0x4)
sendmsg$unix(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0)
recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0)
11:32:37 executing program 7:
r0 = syz_io_uring_setup(0xeaf, &(0x7f0000000200), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_io_uring_submit(r1, r2, &(0x7f00000006c0)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40}, 0x0)
io_uring_enter(r0, 0x100001, 0x0, 0x0, 0x0, 0x0)
11:32:37 executing program 4:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
getsockopt$inet_udp_int(r0, 0x11, 0x65, 0xffffffffffffffff, &(0x7f0000000000))
11:32:37 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000000c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3f, 0x0, "704f5992d666aa2888e479ca552ee155f638582a91ca97213cf4774a2e4c350cdc3f9f62a4c21970bd149a52fa311b916bf00b51b808c412ed6b9fcbb5be4a2fb7dd8fd0dfa22b4100"}, 0xd8)
setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c)
setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000680)=0x1865, 0x4)
setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000), 0x4)
sendmmsg$inet6(r0, &(0x7f00000011c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000340)="ee", 0x1}], 0x1}}], 0x1, 0x0)
11:32:37 executing program 6:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
11:32:37 executing program 1:
r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
r1 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000300)={'syz', 0x1}, 0x0, 0x0, r0)
r2 = add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)="18419cc68448de3ae8f97ea6a46d823d4f19cecbf569a58b79851d91f3da031fecf4dfebf4ac3b13988a048b4e35761cb05a5d5b28e1ca6ceebae02cbbf7e894098749d5f99cb226f14f00b6034bfb02a7a5af409f531820bd319b9d7c3405022b550d32ad368fdbbddb8ed631d1dde9a4ed", 0xff10, r1)
keyctl$chown(0x4, r2, 0xee00, 0x0)
11:32:37 executing program 5:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000000c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3f, 0x0, "704f5992d666aa2888e479ca552ee155f638582a91ca97213cf4774a2e4c350cdc3f9f62a4c21970bd149a52fa311b916bf00b51b808c412ed6b9fcbb5be4a2fb7dd8fd0dfa22b4100"}, 0xd8)
setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c)
setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000680)=0x1865, 0x4)
setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000), 0x4)
sendmmsg$inet6(r0, &(0x7f00000011c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000340)="ee", 0x1}], 0x1}}], 0x1, 0x0)
11:32:38 executing program 6:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
11:32:38 executing program 1:
r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
r1 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000300)={'syz', 0x1}, 0x0, 0x0, r0)
r2 = add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)="18419cc68448de3ae8f97ea6a46d823d4f19cecbf569a58b79851d91f3da031fecf4dfebf4ac3b13988a048b4e35761cb05a5d5b28e1ca6ceebae02cbbf7e894098749d5f99cb226f14f00b6034bfb02a7a5af409f531820bd319b9d7c3405022b550d32ad368fdbbddb8ed631d1dde9a4ed", 0xff10, r1)
keyctl$chown(0x4, r2, 0xee00, 0x0)
11:32:38 executing program 4:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
getsockopt$inet_udp_int(r0, 0x11, 0x65, 0xffffffffffffffff, &(0x7f0000000000))
11:32:38 executing program 5:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000000c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3f, 0x0, "704f5992d666aa2888e479ca552ee155f638582a91ca97213cf4774a2e4c350cdc3f9f62a4c21970bd149a52fa311b916bf00b51b808c412ed6b9fcbb5be4a2fb7dd8fd0dfa22b4100"}, 0xd8)
setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c)
setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000680)=0x1865, 0x4)
setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000), 0x4)
sendmmsg$inet6(r0, &(0x7f00000011c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000340)="ee", 0x1}], 0x1}}], 0x1, 0x0)
11:32:38 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000000c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3f, 0x0, "704f5992d666aa2888e479ca552ee155f638582a91ca97213cf4774a2e4c350cdc3f9f62a4c21970bd149a52fa311b916bf00b51b808c412ed6b9fcbb5be4a2fb7dd8fd0dfa22b4100"}, 0xd8)
setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c)
setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000680)=0x1865, 0x4)
setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000), 0x4)
sendmmsg$inet6(r0, &(0x7f00000011c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000340)="ee", 0x1}], 0x1}}], 0x1, 0x0)
11:32:38 executing program 6:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
11:32:38 executing program 0:
r0 = syz_io_uring_setup(0xeaf, &(0x7f0000000200), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_io_uring_submit(r1, r2, &(0x7f00000006c0)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40}, 0x0)
io_uring_enter(r0, 0x100001, 0x0, 0x0, 0x0, 0x0)
11:32:38 executing program 7:
r0 = syz_io_uring_setup(0xeaf, &(0x7f0000000200), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_io_uring_submit(r1, r2, &(0x7f00000006c0)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40}, 0x0)
io_uring_enter(r0, 0x100001, 0x0, 0x0, 0x0, 0x0)
11:32:38 executing program 3:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0)
ioctl$TUNSETTXFILTER(r0, 0x400454d9, &(0x7f0000000140)={0x0, 0x3, [@local, @random="57fd8778c88d", @dev]})
11:32:38 executing program 0:
r0 = syz_io_uring_setup(0xeaf, &(0x7f0000000200), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_io_uring_submit(r1, r2, &(0x7f00000006c0)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40}, 0x0)
io_uring_enter(r0, 0x100001, 0x0, 0x0, 0x0, 0x0)
11:32:38 executing program 5:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000000c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3f, 0x0, "704f5992d666aa2888e479ca552ee155f638582a91ca97213cf4774a2e4c350cdc3f9f62a4c21970bd149a52fa311b916bf00b51b808c412ed6b9fcbb5be4a2fb7dd8fd0dfa22b4100"}, 0xd8)
setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c)
setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000680)=0x1865, 0x4)
setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000), 0x4)
sendmmsg$inet6(r0, &(0x7f00000011c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000340)="ee", 0x1}], 0x1}}], 0x1, 0x0)
11:32:38 executing program 7:
r0 = io_uring_setup(0x454c, &(0x7f0000000240))
io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0)
11:32:38 executing program 6:
r0 = add_key(&(0x7f0000000000)='id_legacy\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="e3", 0x1, 0xfffffffffffffffd)
keyctl$search(0xa, r0, &(0x7f00000002c0)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0}, 0x0)
11:32:38 executing program 1:
r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
r1 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000300)={'syz', 0x1}, 0x0, 0x0, r0)
r2 = add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)="18419cc68448de3ae8f97ea6a46d823d4f19cecbf569a58b79851d91f3da031fecf4dfebf4ac3b13988a048b4e35761cb05a5d5b28e1ca6ceebae02cbbf7e894098749d5f99cb226f14f00b6034bfb02a7a5af409f531820bd319b9d7c3405022b550d32ad368fdbbddb8ed631d1dde9a4ed", 0xff10, r1)
keyctl$chown(0x4, r2, 0xee00, 0x0)
11:32:38 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000000c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3f, 0x0, "704f5992d666aa2888e479ca552ee155f638582a91ca97213cf4774a2e4c350cdc3f9f62a4c21970bd149a52fa311b916bf00b51b808c412ed6b9fcbb5be4a2fb7dd8fd0dfa22b4100"}, 0xd8)
setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c)
setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000680)=0x1865, 0x4)
setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000), 0x4)
sendmmsg$inet6(r0, &(0x7f00000011c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000340)="ee", 0x1}], 0x1}}], 0x1, 0x0)
11:32:38 executing program 4:
r0 = syz_open_dev$loop(&(0x7f0000004300), 0x0, 0x0)
ioctl$LOOP_GET_STATUS64(r0, 0x4c05, 0x0)
11:32:38 executing program 3:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0)
ioctl$TUNSETTXFILTER(r0, 0x400454d9, &(0x7f0000000140)={0x0, 0x3, [@local, @random="57fd8778c88d", @dev]})
11:32:38 executing program 7:
r0 = io_uring_setup(0x454c, &(0x7f0000000240))
io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0)
11:32:38 executing program 0:
r0 = syz_io_uring_setup(0xeaf, &(0x7f0000000200), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_io_uring_submit(r1, r2, &(0x7f00000006c0)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40}, 0x0)
io_uring_enter(r0, 0x100001, 0x0, 0x0, 0x0, 0x0)
11:32:38 executing program 6:
r0 = add_key(&(0x7f0000000000)='id_legacy\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="e3", 0x1, 0xfffffffffffffffd)
keyctl$search(0xa, r0, &(0x7f00000002c0)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0}, 0x0)
11:32:38 executing program 4:
r0 = syz_open_dev$loop(&(0x7f0000004300), 0x0, 0x0)
ioctl$LOOP_GET_STATUS64(r0, 0x4c05, 0x0)
11:32:38 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000004300), 0x0, 0x0)
ioctl$LOOP_GET_STATUS64(r0, 0x4c05, 0x0)
11:32:38 executing program 4:
r0 = syz_open_dev$loop(&(0x7f0000004300), 0x0, 0x0)
ioctl$LOOP_GET_STATUS64(r0, 0x4c05, 0x0)
11:32:38 executing program 6:
r0 = add_key(&(0x7f0000000000)='id_legacy\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="e3", 0x1, 0xfffffffffffffffd)
keyctl$search(0xa, r0, &(0x7f00000002c0)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0}, 0x0)
11:32:38 executing program 3:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0)
ioctl$TUNSETTXFILTER(r0, 0x400454d9, &(0x7f0000000140)={0x0, 0x3, [@local, @random="57fd8778c88d", @dev]})
11:32:38 executing program 7:
r0 = io_uring_setup(0x454c, &(0x7f0000000240))
io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0)
11:32:38 executing program 5:
r0 = add_key(&(0x7f0000000000)='id_legacy\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="e3", 0x1, 0xfffffffffffffffd)
keyctl$search(0xa, r0, &(0x7f00000002c0)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0}, 0x0)
11:32:38 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000004300), 0x0, 0x0)
ioctl$LOOP_GET_STATUS64(r0, 0x4c05, 0x0)
11:32:38 executing program 6:
r0 = add_key(&(0x7f0000000000)='id_legacy\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="e3", 0x1, 0xfffffffffffffffd)
keyctl$search(0xa, r0, &(0x7f00000002c0)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0}, 0x0)
11:32:38 executing program 3:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0)
ioctl$TUNSETTXFILTER(r0, 0x400454d9, &(0x7f0000000140)={0x0, 0x3, [@local, @random="57fd8778c88d", @dev]})
11:32:38 executing program 2:
r0 = socket$packet(0x11, 0x3, 0x300)
getsockopt$packet_int(r0, 0x107, 0xb, &(0x7f0000000080), &(0x7f0000000100)=0x20000084)
11:32:38 executing program 7:
r0 = io_uring_setup(0x454c, &(0x7f0000000240))
io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0)
11:32:38 executing program 0:
r0 = socket$inet(0x2, 0xa, 0x0)
ioctl$sock_inet_SIOCDARP(r0, 0x8955, &(0x7f0000000080)={{0x2, 0x0, @local}, {0x304, @multicast}, 0x4, {0x2, 0x0, @multicast2}})
11:32:38 executing program 4:
r0 = syz_open_dev$loop(&(0x7f0000004300), 0x0, 0x0)
ioctl$LOOP_GET_STATUS64(r0, 0x4c05, 0x0)
[  182.085467] syz-executor.0 uses obsolete (PF_INET,SOCK_PACKET)
11:32:38 executing program 5:
r0 = add_key(&(0x7f0000000000)='id_legacy\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="e3", 0x1, 0xfffffffffffffffd)
keyctl$search(0xa, r0, &(0x7f00000002c0)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0}, 0x0)
11:32:38 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000004300), 0x0, 0x0)
ioctl$LOOP_GET_STATUS64(r0, 0x4c05, 0x0)
11:32:38 executing program 0:
r0 = socket$inet(0x2, 0xa, 0x0)
ioctl$sock_inet_SIOCDARP(r0, 0x8955, &(0x7f0000000080)={{0x2, 0x0, @local}, {0x304, @multicast}, 0x4, {0x2, 0x0, @multicast2}})
11:32:38 executing program 7:
r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/key-users\x00', 0x0, 0x0)
preadv(r0, &(0x7f0000000100)=[{&(0x7f0000002240)=""/4109, 0x100d}], 0x1, 0x7, 0x0)
[  182.220869] netlink: 'syz-executor.4': attribute type 16 has an invalid length.
[  182.223506] netlink: 'syz-executor.4': attribute type 16 has an invalid length.
[  182.227722] loop1: detected capacity change from 0 to 4096
11:32:38 executing program 3:
r0 = socket$inet6_udplite(0xa, 0x2, 0x88)
setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1d, &(0x7f00000000c0)={@dev}, 0x20)
11:32:38 executing program 5:
r0 = add_key(&(0x7f0000000000)='id_legacy\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="e3", 0x1, 0xfffffffffffffffd)
keyctl$search(0xa, r0, &(0x7f00000002c0)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0}, 0x0)
11:32:38 executing program 6:
r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0)
ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000400))
11:32:38 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {0x0}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00))
11:32:38 executing program 0:
r0 = socket$inet(0x2, 0xa, 0x0)
ioctl$sock_inet_SIOCDARP(r0, 0x8955, &(0x7f0000000080)={{0x2, 0x0, @local}, {0x304, @multicast}, 0x4, {0x2, 0x0, @multicast2}})
11:32:38 executing program 2:
r0 = socket$packet(0x11, 0x3, 0x300)
getsockopt$packet_int(r0, 0x107, 0xb, &(0x7f0000000080), &(0x7f0000000100)=0x20000084)
11:32:38 executing program 4:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000001700)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x10}, @void}}}, 0x1c}}, 0x0)
openat(0xffffffffffffff9c, 0x0, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, 0x0, 0x0)
11:32:38 executing program 3:
r0 = socket$inet6_udplite(0xa, 0x2, 0x88)
setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1d, &(0x7f00000000c0)={@dev}, 0x20)
11:32:38 executing program 6:
r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0)
ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000400))
11:32:38 executing program 2:
r0 = socket$packet(0x11, 0x3, 0x300)
getsockopt$packet_int(r0, 0x107, 0xb, &(0x7f0000000080), &(0x7f0000000100)=0x20000084)
11:32:38 executing program 7:
r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/key-users\x00', 0x0, 0x0)
preadv(r0, &(0x7f0000000100)=[{&(0x7f0000002240)=""/4109, 0x100d}], 0x1, 0x7, 0x0)
[  182.277193] Quota error (device loop1): v2_read_file_info: Free block number too big (0 >= 0).
[  182.278001] EXT4-fs warning (device loop1): ext4_enable_quotas:6818: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix.
11:32:38 executing program 5:
r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe)
r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff)
keyctl$KEYCTL_MOVE(0x1e, r0, r1, r0, 0x0)
[  182.282974] EXT4-fs (loop1): mount failed
11:32:38 executing program 0:
r0 = socket$inet(0x2, 0xa, 0x0)
ioctl$sock_inet_SIOCDARP(r0, 0x8955, &(0x7f0000000080)={{0x2, 0x0, @local}, {0x304, @multicast}, 0x4, {0x2, 0x0, @multicast2}})
[  182.288281] loop1: detected capacity change from 0 to 4096
11:32:38 executing program 4:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000001700)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x10}, @void}}}, 0x1c}}, 0x0)
openat(0xffffffffffffff9c, 0x0, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, 0x0, 0x0)
[  182.316547] Quota error (device loop1): v2_read_file_info: Free block number too big (0 >= 0).
[  182.317239] EXT4-fs warning (device loop1): ext4_enable_quotas:6818: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix.
[  182.318942] EXT4-fs (loop1): mount failed
[  182.348358] netlink: 'syz-executor.4': attribute type 16 has an invalid length.
11:32:38 executing program 3:
r0 = socket$inet6_udplite(0xa, 0x2, 0x88)
setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1d, &(0x7f00000000c0)={@dev}, 0x20)
11:32:38 executing program 5:
r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe)
r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff)
keyctl$KEYCTL_MOVE(0x1e, r0, r1, r0, 0x0)
11:32:38 executing program 2:
r0 = socket$packet(0x11, 0x3, 0x300)
getsockopt$packet_int(r0, 0x107, 0xb, &(0x7f0000000080), &(0x7f0000000100)=0x20000084)
11:32:38 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {0x0}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00))
[  182.390087] loop1: detected capacity change from 0 to 4096
[  182.411199] Quota error (device loop1): v2_read_file_info: Free block number too big (0 >= 0).
[  182.412013] EXT4-fs warning (device loop1): ext4_enable_quotas:6818: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix.
[  182.424817] EXT4-fs (loop1): mount failed
11:32:38 executing program 6:
r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0)
ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000400))
11:32:38 executing program 3:
r0 = socket$inet6_udplite(0xa, 0x2, 0x88)
setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1d, &(0x7f00000000c0)={@dev}, 0x20)
[  182.543710] netlink: 'syz-executor.4': attribute type 16 has an invalid length.
11:32:38 executing program 0:
r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe)
r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff)
keyctl$KEYCTL_MOVE(0x1e, r0, r1, r0, 0x0)
11:32:38 executing program 2:
inotify_add_watch(0xffffffffffffffff, 0x0, 0x40000000)
11:32:38 executing program 5:
r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe)
r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff)
keyctl$KEYCTL_MOVE(0x1e, r0, r1, r0, 0x0)
11:32:38 executing program 4:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000001700)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x10}, @void}}}, 0x1c}}, 0x0)
openat(0xffffffffffffff9c, 0x0, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, 0x0, 0x0)
11:32:38 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {0x0}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00))
11:32:38 executing program 7:
r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/key-users\x00', 0x0, 0x0)
preadv(r0, &(0x7f0000000100)=[{&(0x7f0000002240)=""/4109, 0x100d}], 0x1, 0x7, 0x0)
[  182.564181] loop1: detected capacity change from 0 to 4096
11:32:38 executing program 6:
r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0)
ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000400))
11:32:38 executing program 0:
r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe)
r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff)
keyctl$KEYCTL_MOVE(0x1e, r0, r1, r0, 0x0)
11:32:38 executing program 5:
r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe)
r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff)
keyctl$KEYCTL_MOVE(0x1e, r0, r1, r0, 0x0)
11:32:38 executing program 4:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000001700)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x10}, @void}}}, 0x1c}}, 0x0)
openat(0xffffffffffffff9c, 0x0, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, 0x0, 0x0)
11:32:38 executing program 2:
perf_event_open(&(0x7f0000002240)={0x8, 0x80, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
11:32:38 executing program 7:
r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/key-users\x00', 0x0, 0x0)
preadv(r0, &(0x7f0000000100)=[{&(0x7f0000002240)=""/4109, 0x100d}], 0x1, 0x7, 0x0)
[  182.594266] Quota error (device loop1): v2_read_file_info: Free block number too big (0 >= 0).
11:32:38 executing program 3:
rt_sigaction(0xd, &(0x7f0000000040)={&(0x7f0000000240)="c4c3d17cab0000802008c4c179174b32f3440fbd0766d9ec8fe8aca2689700c4417917a708003dec0000000079e67300660f1c4600460fbd76e5", 0x80000006, 0x0}, 0x0, 0x8, &(0x7f0000000280))
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
sendmmsg(r0, &(0x7f0000006700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0)
[  182.608397] EXT4-fs warning (device loop1): ext4_enable_quotas:6818: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix.
[  182.647500] EXT4-fs (loop1): mount failed
[  182.647915] netlink: 'syz-executor.4': attribute type 16 has an invalid length.
11:32:39 executing program 6:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0)
r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x101042, 0x0)
write(r2, &(0x7f0000000080)="01", 0x1)
pwrite64(r0, &(0x7f0000000180)="af71", 0x2, 0x0)
r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0)
pwrite64(r3, &(0x7f0000000140)="c0", 0x1, 0x75d6)
ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0x0, r1})
11:32:39 executing program 2:
perf_event_open(&(0x7f0000002240)={0x8, 0x80, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
11:32:39 executing program 7:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000540)={{}, {0x0, @link_local}, 0x24, {0x2, 0x0, @loopback}, 'bridge_slave_0\x00'})
11:32:39 executing program 0:
r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe)
r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff)
keyctl$KEYCTL_MOVE(0x1e, r0, r1, r0, 0x0)
11:32:39 executing program 7:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000540)={{}, {0x0, @link_local}, 0x24, {0x2, 0x0, @loopback}, 'bridge_slave_0\x00'})
11:32:39 executing program 5:
mmap(&(0x7f0000001000/0xb000)=nil, 0xb000, 0x0, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
sendmsg$inet(r0, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0)
11:32:39 executing program 3:
rt_sigaction(0xd, &(0x7f0000000040)={&(0x7f0000000240)="c4c3d17cab0000802008c4c179174b32f3440fbd0766d9ec8fe8aca2689700c4417917a708003dec0000000079e67300660f1c4600460fbd76e5", 0x80000006, 0x0}, 0x0, 0x8, &(0x7f0000000280))
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
sendmmsg(r0, &(0x7f0000006700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0)
11:32:39 executing program 6:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0)
r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x101042, 0x0)
write(r2, &(0x7f0000000080)="01", 0x1)
pwrite64(r0, &(0x7f0000000180)="af71", 0x2, 0x0)
r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0)
pwrite64(r3, &(0x7f0000000140)="c0", 0x1, 0x75d6)
ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0x0, r1})
11:32:39 executing program 2:
perf_event_open(&(0x7f0000002240)={0x8, 0x80, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
[  182.773535] loop1: detected capacity change from 0 to 4096
11:32:39 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {0x0}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00))
11:32:39 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0)
r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x101042, 0x0)
write(r2, &(0x7f0000000080)="01", 0x1)
pwrite64(r0, &(0x7f0000000180)="af71", 0x2, 0x0)
r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0)
pwrite64(r3, &(0x7f0000000140)="c0", 0x1, 0x75d6)
ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0x0, r1})
11:32:39 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0)
r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x101042, 0x0)
write(r2, &(0x7f0000000080)="01", 0x1)
pwrite64(r0, &(0x7f0000000180)="af71", 0x2, 0x0)
r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0)
pwrite64(r3, &(0x7f0000000140)="c0", 0x1, 0x75d6)
ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0x0, r1})
[  182.792644] Quota error (device loop1): v2_read_file_info: Free block number too big (0 >= 0).
[  182.794868] EXT4-fs warning (device loop1): ext4_enable_quotas:6818: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix.
11:32:39 executing program 3:
rt_sigaction(0xd, &(0x7f0000000040)={&(0x7f0000000240)="c4c3d17cab0000802008c4c179174b32f3440fbd0766d9ec8fe8aca2689700c4417917a708003dec0000000079e67300660f1c4600460fbd76e5", 0x80000006, 0x0}, 0x0, 0x8, &(0x7f0000000280))
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
sendmmsg(r0, &(0x7f0000006700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0)
[  182.816641] EXT4-fs (loop1): mount failed
11:32:39 executing program 2:
perf_event_open(&(0x7f0000002240)={0x8, 0x80, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
11:32:39 executing program 7:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000540)={{}, {0x0, @link_local}, 0x24, {0x2, 0x0, @loopback}, 'bridge_slave_0\x00'})
11:32:39 executing program 6:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0)
r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x101042, 0x0)
write(r2, &(0x7f0000000080)="01", 0x1)
pwrite64(r0, &(0x7f0000000180)="af71", 0x2, 0x0)
r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0)
pwrite64(r3, &(0x7f0000000140)="c0", 0x1, 0x75d6)
ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0x0, r1})
11:32:39 executing program 5:
mmap(&(0x7f0000001000/0xb000)=nil, 0xb000, 0x0, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
sendmsg$inet(r0, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0)
11:32:39 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0)
r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x101042, 0x0)
write(r2, &(0x7f0000000080)="01", 0x1)
pwrite64(r0, &(0x7f0000000180)="af71", 0x2, 0x0)
r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0)
pwrite64(r3, &(0x7f0000000140)="c0", 0x1, 0x75d6)
ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0x0, r1})
11:32:39 executing program 7:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000540)={{}, {0x0, @link_local}, 0x24, {0x2, 0x0, @loopback}, 'bridge_slave_0\x00'})
11:32:39 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0)
r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x101042, 0x0)
write(r2, &(0x7f0000000080)="01", 0x1)
pwrite64(r0, &(0x7f0000000180)="af71", 0x2, 0x0)
r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0)
pwrite64(r3, &(0x7f0000000140)="c0", 0x1, 0x75d6)
ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0x0, r1})
11:32:39 executing program 3:
rt_sigaction(0xd, &(0x7f0000000040)={&(0x7f0000000240)="c4c3d17cab0000802008c4c179174b32f3440fbd0766d9ec8fe8aca2689700c4417917a708003dec0000000079e67300660f1c4600460fbd76e5", 0x80000006, 0x0}, 0x0, 0x8, &(0x7f0000000280))
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
sendmmsg(r0, &(0x7f0000006700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0)
11:32:39 executing program 6:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0)
r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x101042, 0x0)
write(r2, &(0x7f0000000080)="01", 0x1)
pwrite64(r0, &(0x7f0000000180)="af71", 0x2, 0x0)
r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0)
pwrite64(r3, &(0x7f0000000140)="c0", 0x1, 0x75d6)
ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0x0, r1})
11:32:39 executing program 5:
mmap(&(0x7f0000001000/0xb000)=nil, 0xb000, 0x0, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
sendmsg$inet(r0, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0)
11:32:39 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0)
r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x101042, 0x0)
write(r2, &(0x7f0000000080)="01", 0x1)
pwrite64(r0, &(0x7f0000000180)="af71", 0x2, 0x0)
r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0)
pwrite64(r3, &(0x7f0000000140)="c0", 0x1, 0x75d6)
ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0x0, r1})
11:32:39 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0)
r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x101042, 0x0)
write(r2, &(0x7f0000000080)="01", 0x1)
pwrite64(r0, &(0x7f0000000180)="af71", 0x2, 0x0)
r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0)
pwrite64(r3, &(0x7f0000000140)="c0", 0x1, 0x75d6)
ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0x0, r1})
11:32:39 executing program 5:
mmap(&(0x7f0000001000/0xb000)=nil, 0xb000, 0x0, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
sendmsg$inet(r0, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0)
11:32:39 executing program 1:
rt_sigaction(0xd, &(0x7f0000000040)={&(0x7f0000000240)="c4c3d17cab0000802008c4c179174b32f3440fbd0766d9ec8fe8aca2689700c4417917a708003dec0000000079e67300660f1c4600460fbd76e5", 0x80000006, 0x0}, 0x0, 0x8, &(0x7f0000000280))
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
sendmmsg(r0, &(0x7f0000006700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0)
11:32:39 executing program 2:
clock_nanosleep(0xe177c82e9469a081, 0x0, &(0x7f0000000000)={0x0, 0x989680}, 0x0)
11:32:39 executing program 3:
setgroups(0x2cded0eb2b2304a, &(0x7f0000000280)=[0x0, 0x0, 0x0])
11:32:39 executing program 7:
openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x40880, 0x0)
getresuid(0x0, 0x0, &(0x7f0000000a80))
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_open_procfs(0x0, 0x0)
pread64(0xffffffffffffffff, 0x0, 0x0, 0x0)
syz_io_uring_setup(0x0, &(0x7f0000000680)={0x0, 0xbcc0, 0x2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000700), &(0x7f0000000740))
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0)
ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0)
accept4$unix(0xffffffffffffffff, &(0x7f0000000b80)=@abs, 0x0, 0x0)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x31f, &(0x7f0000000700))
mmap$IORING_OFF_CQ_RING(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x1, 0x2010, 0xffffffffffffffff, 0x8000000)
perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0)
socket$inet_icmp_raw(0x2, 0x3, 0x1)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
11:32:39 executing program 1:
rt_sigaction(0xd, &(0x7f0000000040)={&(0x7f0000000240)="c4c3d17cab0000802008c4c179174b32f3440fbd0766d9ec8fe8aca2689700c4417917a708003dec0000000079e67300660f1c4600460fbd76e5", 0x80000006, 0x0}, 0x0, 0x8, &(0x7f0000000280))
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
sendmmsg(r0, &(0x7f0000006700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0)
11:32:39 executing program 6:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$nl_netfilter(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x18, 0x2, 0x1, 0x201, 0x0, 0x0, {}, [@nested={0x4, 0x19}]}, 0x18}}, 0x0)
11:32:39 executing program 3:
setgroups(0x2cded0eb2b2304a, &(0x7f0000000280)=[0x0, 0x0, 0x0])
11:32:39 executing program 4:
r0 = memfd_create(&(0x7f0000000ec0)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<8\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6\xb0p\xa9\xf3\xef\x12\xd1,[v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dE\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00rB\xbf\xb9\x14g\xa3\x82L\xc1\xe5\x8a_s\xbc\x92\x94\x06\x1f}\x80\x13\xe2\x88$\xe0\x1bd\x8d\xde\b\xdf=l`1\xcfq\xa6\xfc\x05\xde\xf4\x8b9,\xb7\xd6x\xa8\xf2\xe9\xc6\x82\xdf\x8dR%s^`(]\a\x123\xd8\x17\xa1%\xe8L]\xea\x1d]\x1c\xeb\x95 \x02\xa0{i\xb1\x99:\xaa\x9c\xc4Q\xf8\x84\xa3\xb7\xc8\x19\xc2b\b*\xf5\x1a\xdbOf\xa1U\x8f\x11\x1eE\x9fw\xf4\xbf(\xa0\xea\xad\"\x1a=\xa7N^\x0f\x90\xdc\x1e\bT\x9c\x9ck2\x1f[\xa1\xddN\x93\x06h\xf1\xa3\x9c\xb7x\xf8\xea\xe9\xc2(\xd8\x01Pq\xa9\x1e\xe2\xc5bG\x8a\xe6\n\x8b\f4I\xe3\x00'/739, 0x5)
fallocate(r0, 0x3, 0x0, 0x8800000)
11:32:39 executing program 7:
openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x40880, 0x0)
getresuid(0x0, 0x0, &(0x7f0000000a80))
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_open_procfs(0x0, 0x0)
pread64(0xffffffffffffffff, 0x0, 0x0, 0x0)
syz_io_uring_setup(0x0, &(0x7f0000000680)={0x0, 0xbcc0, 0x2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000700), &(0x7f0000000740))
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0)
ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0)
accept4$unix(0xffffffffffffffff, &(0x7f0000000b80)=@abs, 0x0, 0x0)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x31f, &(0x7f0000000700))
mmap$IORING_OFF_CQ_RING(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x1, 0x2010, 0xffffffffffffffff, 0x8000000)
perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0)
socket$inet_icmp_raw(0x2, 0x3, 0x1)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
11:32:39 executing program 5:
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000200)={0x0, 0x3}, 0x4)
close_range(r0, 0xffffffffffffffff, 0x0)
11:32:39 executing program 2:
clock_nanosleep(0xe177c82e9469a081, 0x0, &(0x7f0000000000)={0x0, 0x989680}, 0x0)
11:32:39 executing program 1:
rt_sigaction(0xd, &(0x7f0000000040)={&(0x7f0000000240)="c4c3d17cab0000802008c4c179174b32f3440fbd0766d9ec8fe8aca2689700c4417917a708003dec0000000079e67300660f1c4600460fbd76e5", 0x80000006, 0x0}, 0x0, 0x8, &(0x7f0000000280))
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
sendmmsg(r0, &(0x7f0000006700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0)
11:32:39 executing program 6:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$nl_netfilter(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x18, 0x2, 0x1, 0x201, 0x0, 0x0, {}, [@nested={0x4, 0x19}]}, 0x18}}, 0x0)
11:32:39 executing program 3:
setgroups(0x2cded0eb2b2304a, &(0x7f0000000280)=[0x0, 0x0, 0x0])
11:32:39 executing program 2:
clock_nanosleep(0xe177c82e9469a081, 0x0, &(0x7f0000000000)={0x0, 0x989680}, 0x0)
11:32:39 executing program 7:
openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x40880, 0x0)
getresuid(0x0, 0x0, &(0x7f0000000a80))
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_open_procfs(0x0, 0x0)
pread64(0xffffffffffffffff, 0x0, 0x0, 0x0)
syz_io_uring_setup(0x0, &(0x7f0000000680)={0x0, 0xbcc0, 0x2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000700), &(0x7f0000000740))
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0)
ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0)
accept4$unix(0xffffffffffffffff, &(0x7f0000000b80)=@abs, 0x0, 0x0)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x31f, &(0x7f0000000700))
mmap$IORING_OFF_CQ_RING(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x1, 0x2010, 0xffffffffffffffff, 0x8000000)
perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0)
socket$inet_icmp_raw(0x2, 0x3, 0x1)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
11:32:39 executing program 4:
r0 = memfd_create(&(0x7f0000000ec0)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<8\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6\xb0p\xa9\xf3\xef\x12\xd1,[v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dE\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00rB\xbf\xb9\x14g\xa3\x82L\xc1\xe5\x8a_s\xbc\x92\x94\x06\x1f}\x80\x13\xe2\x88$\xe0\x1bd\x8d\xde\b\xdf=l`1\xcfq\xa6\xfc\x05\xde\xf4\x8b9,\xb7\xd6x\xa8\xf2\xe9\xc6\x82\xdf\x8dR%s^`(]\a\x123\xd8\x17\xa1%\xe8L]\xea\x1d]\x1c\xeb\x95 \x02\xa0{i\xb1\x99:\xaa\x9c\xc4Q\xf8\x84\xa3\xb7\xc8\x19\xc2b\b*\xf5\x1a\xdbOf\xa1U\x8f\x11\x1eE\x9fw\xf4\xbf(\xa0\xea\xad\"\x1a=\xa7N^\x0f\x90\xdc\x1e\bT\x9c\x9ck2\x1f[\xa1\xddN\x93\x06h\xf1\xa3\x9c\xb7x\xf8\xea\xe9\xc2(\xd8\x01Pq\xa9\x1e\xe2\xc5bG\x8a\xe6\n\x8b\f4I\xe3\x00'/739, 0x5)
fallocate(r0, 0x3, 0x0, 0x8800000)
11:32:39 executing program 2:
clock_nanosleep(0xe177c82e9469a081, 0x0, &(0x7f0000000000)={0x0, 0x989680}, 0x0)
11:32:39 executing program 0:
r0 = memfd_create(&(0x7f0000000ec0)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<8\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6\xb0p\xa9\xf3\xef\x12\xd1,[v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dE\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00rB\xbf\xb9\x14g\xa3\x82L\xc1\xe5\x8a_s\xbc\x92\x94\x06\x1f}\x80\x13\xe2\x88$\xe0\x1bd\x8d\xde\b\xdf=l`1\xcfq\xa6\xfc\x05\xde\xf4\x8b9,\xb7\xd6x\xa8\xf2\xe9\xc6\x82\xdf\x8dR%s^`(]\a\x123\xd8\x17\xa1%\xe8L]\xea\x1d]\x1c\xeb\x95 \x02\xa0{i\xb1\x99:\xaa\x9c\xc4Q\xf8\x84\xa3\xb7\xc8\x19\xc2b\b*\xf5\x1a\xdbOf\xa1U\x8f\x11\x1eE\x9fw\xf4\xbf(\xa0\xea\xad\"\x1a=\xa7N^\x0f\x90\xdc\x1e\bT\x9c\x9ck2\x1f[\xa1\xddN\x93\x06h\xf1\xa3\x9c\xb7x\xf8\xea\xe9\xc2(\xd8\x01Pq\xa9\x1e\xe2\xc5bG\x8a\xe6\n\x8b\f4I\xe3\x00'/739, 0x5)
fallocate(r0, 0x3, 0x0, 0x8800000)
11:32:39 executing program 5:
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000200)={0x0, 0x3}, 0x4)
close_range(r0, 0xffffffffffffffff, 0x0)
11:32:39 executing program 1:
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000200)={0x0, 0x3}, 0x4)
close_range(r0, 0xffffffffffffffff, 0x0)
11:32:39 executing program 4:
r0 = memfd_create(&(0x7f0000000ec0)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<8\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6\xb0p\xa9\xf3\xef\x12\xd1,[v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dE\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00rB\xbf\xb9\x14g\xa3\x82L\xc1\xe5\x8a_s\xbc\x92\x94\x06\x1f}\x80\x13\xe2\x88$\xe0\x1bd\x8d\xde\b\xdf=l`1\xcfq\xa6\xfc\x05\xde\xf4\x8b9,\xb7\xd6x\xa8\xf2\xe9\xc6\x82\xdf\x8dR%s^`(]\a\x123\xd8\x17\xa1%\xe8L]\xea\x1d]\x1c\xeb\x95 \x02\xa0{i\xb1\x99:\xaa\x9c\xc4Q\xf8\x84\xa3\xb7\xc8\x19\xc2b\b*\xf5\x1a\xdbOf\xa1U\x8f\x11\x1eE\x9fw\xf4\xbf(\xa0\xea\xad\"\x1a=\xa7N^\x0f\x90\xdc\x1e\bT\x9c\x9ck2\x1f[\xa1\xddN\x93\x06h\xf1\xa3\x9c\xb7x\xf8\xea\xe9\xc2(\xd8\x01Pq\xa9\x1e\xe2\xc5bG\x8a\xe6\n\x8b\f4I\xe3\x00'/739, 0x5)
fallocate(r0, 0x3, 0x0, 0x8800000)
11:32:39 executing program 3:
setgroups(0x2cded0eb2b2304a, &(0x7f0000000280)=[0x0, 0x0, 0x0])
11:32:39 executing program 7:
openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x40880, 0x0)
getresuid(0x0, 0x0, &(0x7f0000000a80))
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_open_procfs(0x0, 0x0)
pread64(0xffffffffffffffff, 0x0, 0x0, 0x0)
syz_io_uring_setup(0x0, &(0x7f0000000680)={0x0, 0xbcc0, 0x2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000700), &(0x7f0000000740))
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0)
ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0)
accept4$unix(0xffffffffffffffff, &(0x7f0000000b80)=@abs, 0x0, 0x0)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x31f, &(0x7f0000000700))
mmap$IORING_OFF_CQ_RING(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x1, 0x2010, 0xffffffffffffffff, 0x8000000)
perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0)
socket$inet_icmp_raw(0x2, 0x3, 0x1)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
11:32:39 executing program 6:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$nl_netfilter(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x18, 0x2, 0x1, 0x201, 0x0, 0x0, {}, [@nested={0x4, 0x19}]}, 0x18}}, 0x0)
11:32:39 executing program 0:
r0 = memfd_create(&(0x7f0000000ec0)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<8\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6\xb0p\xa9\xf3\xef\x12\xd1,[v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dE\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00rB\xbf\xb9\x14g\xa3\x82L\xc1\xe5\x8a_s\xbc\x92\x94\x06\x1f}\x80\x13\xe2\x88$\xe0\x1bd\x8d\xde\b\xdf=l`1\xcfq\xa6\xfc\x05\xde\xf4\x8b9,\xb7\xd6x\xa8\xf2\xe9\xc6\x82\xdf\x8dR%s^`(]\a\x123\xd8\x17\xa1%\xe8L]\xea\x1d]\x1c\xeb\x95 \x02\xa0{i\xb1\x99:\xaa\x9c\xc4Q\xf8\x84\xa3\xb7\xc8\x19\xc2b\b*\xf5\x1a\xdbOf\xa1U\x8f\x11\x1eE\x9fw\xf4\xbf(\xa0\xea\xad\"\x1a=\xa7N^\x0f\x90\xdc\x1e\bT\x9c\x9ck2\x1f[\xa1\xddN\x93\x06h\xf1\xa3\x9c\xb7x\xf8\xea\xe9\xc2(\xd8\x01Pq\xa9\x1e\xe2\xc5bG\x8a\xe6\n\x8b\f4I\xe3\x00'/739, 0x5)
fallocate(r0, 0x3, 0x0, 0x8800000)
11:32:39 executing program 1:
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 
VM DIAGNOSIS:
11:32:32  Registers:
info registers vcpu 0
RAX=0000000000000000 RBX=0000000000000001 RCX=ffffffff84264287 RDX=ffffed100d9e6f99
RSI=0000000000000004 RDI=ffff88806cf37cc0 RBP=ffff88806cf37cc0 RSP=ffff88806ce09b20
R8 =0000000000000000 R9 =ffff88806cf37cc3 R10=ffffed100d9e6f98 R11=0000000000000001
R12=0000000000000003 R13=ffffed100d9e6f98 R14=0000000000000001 R15=1ffff1100d9c1365
RIP=ffffffff84264304 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0
ES =0000 0000000000000000 00000000 00000000
CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA]
SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS   [-WA]
DS =0000 0000000000000000 00000000 00000000
FS =0000 0000000000000000 00000000 00000000
GS =0000 ffff88806ce00000 00000000 00000000
LDT=0000 fffffe0000000000 00000000 00000000
TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy
GDT=     fffffe0000001000 0000007f
IDT=     fffffe0000000000 00000fff
CR0=80050033 CR2=00007fe9921d0028 CR3=000000003dfaa000 CR4=00350ef0
DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 
DR6=00000000ffff0ff0 DR7=0000000000000400
EFER=0000000000000d01
FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80
FPR0=0000000000000000 0000 FPR1=0000000000000000 0000
FPR2=0000000000000000 0000 FPR3=0000000000000000 0000
FPR4=0000000000000000 0000 FPR5=0000000000000000 0000
FPR6=0000000000000000 0000 FPR7=0000000000000000 0000
YMM00=0000000000000000 0000000000000000 756e696c2d34365f 3638782f62696c2f
YMM01=0000000000000000 0000000000000000 6f732e616d7a6c62 696c2f756e672d78
YMM02=0000000000000000 0000000000000000 00352e6f732e616d 7a6c62696c2f756e
YMM03=0000000000000000 0000000000000000 672d78756e696c2d 34365f3638782f62
YMM04=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM06=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM08=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000
info registers vcpu 1
RAX=0000000000000031 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8
RSI=ffffffff822b29f1 RDI=ffffffff87641ba0 RBP=ffffffff87641b60 RSP=ffff8880389e73c8
R8 =0000000000000001 R9 =000000000000000a R10=0000000000000031 R11=0000000000000001
R12=0000000000000031 R13=ffffffff87641b60 R14=0000000000000010 R15=ffffffff822b29e0
RIP=ffffffff822b2a49 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0
ES =0000 0000000000000000 00000000 00000000
CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA]
SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS   [-WA]
DS =0000 0000000000000000 00000000 00000000
FS =0000 00007fc823ad4700 00000000 00000000
GS =0000 ffff88806cf00000 00000000 00000000
LDT=0000 fffffe0000000000 00000000 00000000
TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy
GDT=     fffffe0000048000 0000007f
IDT=     fffffe0000000000 00000fff
CR0=80050033 CR2=00007f2b5e9fdb70 CR3=000000001a608000 CR4=00350ee0
DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 
DR6=00000000ffff0ff0 DR7=0000000000000400
EFER=0000000000000d01
FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80
FPR0=0000000000000000 0000 FPR1=0000000000000000 0000
FPR2=0000000000000000 0000 FPR3=0000000000000000 0000
FPR4=0000000000000000 0000 FPR5=0000000000000000 0000
FPR6=0000000000000000 0000 FPR7=0000000000000000 0000
YMM00=0000000000000000 0000000000000000 756e696c2d34365f 3638782f62696c2f
YMM01=0000000000000000 0000000000000000 2e6f747079726362 696c2f756e672d78
YMM02=0000000000000000 0000000000000000 00312e312e6f732e 6f74707972636269
YMM03=0000000000000000 0000000000000000 6c2f756e672d7875 6e696c2d34365f36
YMM04=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM06=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM08=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000