Warning: Permanently added '[localhost]:5122' (ECDSA) to the list of known hosts. 2022/09/15 11:33:51 fuzzer started 2022/09/15 11:33:51 dialing manager at localhost:36559 syzkaller login: [ 43.438862] cgroup: Unknown subsys name 'net' [ 43.537258] cgroup: Unknown subsys name 'rlimit' 2022/09/15 11:34:04 syscalls: 2215 2022/09/15 11:34:04 code coverage: enabled 2022/09/15 11:34:04 comparison tracing: enabled 2022/09/15 11:34:04 extra coverage: enabled 2022/09/15 11:34:04 setuid sandbox: enabled 2022/09/15 11:34:04 namespace sandbox: enabled 2022/09/15 11:34:04 Android sandbox: enabled 2022/09/15 11:34:04 fault injection: enabled 2022/09/15 11:34:04 leak checking: enabled 2022/09/15 11:34:04 net packet injection: enabled 2022/09/15 11:34:04 net device setup: enabled 2022/09/15 11:34:04 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/09/15 11:34:04 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/09/15 11:34:04 USB emulation: enabled 2022/09/15 11:34:04 hci packet injection: enabled 2022/09/15 11:34:04 wifi device emulation: failed to parse kernel version (6.0.0-rc5-next-20220915) 2022/09/15 11:34:04 802.15.4 emulation: enabled 2022/09/15 11:34:04 fetching corpus: 0, signal 0/2000 (executing program) 2022/09/15 11:34:05 fetching corpus: 33, signal 18230/21728 (executing program) 2022/09/15 11:34:05 fetching corpus: 79, signal 34777/39367 (executing program) 2022/09/15 11:34:05 fetching corpus: 129, signal 43816/49506 (executing program) 2022/09/15 11:34:05 fetching corpus: 179, signal 51340/57961 (executing program) 2022/09/15 11:34:05 fetching corpus: 229, signal 59799/67059 (executing program) 2022/09/15 11:34:05 fetching corpus: 279, signal 65083/73019 (executing program) 2022/09/15 11:34:05 fetching corpus: 329, signal 69207/77823 (executing program) 2022/09/15 11:34:06 fetching corpus: 379, signal 73227/82449 (executing program) 2022/09/15 11:34:06 fetching corpus: 429, signal 76977/86830 (executing program) 2022/09/15 11:34:06 fetching corpus: 479, signal 81159/91384 (executing program) 2022/09/15 11:34:06 fetching corpus: 529, signal 85876/96301 (executing program) 2022/09/15 11:34:06 fetching corpus: 579, signal 87627/98633 (executing program) 2022/09/15 11:34:06 fetching corpus: 629, signal 90567/101917 (executing program) 2022/09/15 11:34:07 fetching corpus: 679, signal 93693/105279 (executing program) 2022/09/15 11:34:07 fetching corpus: 729, signal 96984/108675 (executing program) 2022/09/15 11:34:07 fetching corpus: 779, signal 98797/110807 (executing program) 2022/09/15 11:34:07 fetching corpus: 829, signal 101675/113789 (executing program) 2022/09/15 11:34:07 fetching corpus: 879, signal 104745/116815 (executing program) 2022/09/15 11:34:07 fetching corpus: 929, signal 108766/120391 (executing program) 2022/09/15 11:34:08 fetching corpus: 979, signal 111530/122982 (executing program) 2022/09/15 11:34:08 fetching corpus: 1029, signal 113196/124794 (executing program) 2022/09/15 11:34:08 fetching corpus: 1079, signal 117085/128288 (executing program) 2022/09/15 11:34:08 fetching corpus: 1129, signal 120538/131133 (executing program) 2022/09/15 11:34:08 fetching corpus: 1179, signal 124172/134035 (executing program) 2022/09/15 11:34:08 fetching corpus: 1229, signal 126084/135816 (executing program) 2022/09/15 11:34:09 fetching corpus: 1279, signal 128467/137714 (executing program) 2022/09/15 11:34:09 fetching corpus: 1329, signal 130034/139103 (executing program) 2022/09/15 11:34:09 fetching corpus: 1379, signal 131021/140073 (executing program) 2022/09/15 11:34:09 fetching corpus: 1429, signal 133201/141676 (executing program) 2022/09/15 11:34:09 fetching corpus: 1479, signal 134615/142809 (executing program) 2022/09/15 11:34:09 fetching corpus: 1529, signal 135942/143867 (executing program) 2022/09/15 11:34:10 fetching corpus: 1579, signal 137712/145130 (executing program) 2022/09/15 11:34:10 fetching corpus: 1629, signal 138946/146020 (executing program) 2022/09/15 11:34:10 fetching corpus: 1679, signal 140775/147313 (executing program) 2022/09/15 11:34:10 fetching corpus: 1729, signal 143338/148983 (executing program) 2022/09/15 11:34:10 fetching corpus: 1779, signal 144297/149585 (executing program) 2022/09/15 11:34:10 fetching corpus: 1829, signal 146201/150629 (executing program) 2022/09/15 11:34:11 fetching corpus: 1878, signal 147991/151765 (executing program) 2022/09/15 11:34:11 fetching corpus: 1923, signal 149441/152531 (executing program) 2022/09/15 11:34:11 fetching corpus: 1923, signal 149441/152612 (executing program) 2022/09/15 11:34:11 fetching corpus: 1923, signal 149441/152687 (executing program) 2022/09/15 11:34:11 fetching corpus: 1923, signal 149441/152752 (executing program) 2022/09/15 11:34:11 fetching corpus: 1923, signal 149441/152847 (executing program) 2022/09/15 11:34:11 fetching corpus: 1923, signal 149441/152916 (executing program) 2022/09/15 11:34:11 fetching corpus: 1923, signal 149441/152986 (executing program) 2022/09/15 11:34:11 fetching corpus: 1923, signal 149441/153056 (executing program) 2022/09/15 11:34:11 fetching corpus: 1923, signal 149441/153121 (executing program) 2022/09/15 11:34:11 fetching corpus: 1923, signal 149441/153198 (executing program) 2022/09/15 11:34:11 fetching corpus: 1923, signal 149441/153268 (executing program) 2022/09/15 11:34:11 fetching corpus: 1923, signal 149441/153360 (executing program) 2022/09/15 11:34:11 fetching corpus: 1923, signal 149441/153438 (executing program) 2022/09/15 11:34:11 fetching corpus: 1923, signal 149441/153517 (executing program) 2022/09/15 11:34:11 fetching corpus: 1923, signal 149441/153601 (executing program) 2022/09/15 11:34:11 fetching corpus: 1923, signal 149441/153660 (executing program) 2022/09/15 11:34:11 fetching corpus: 1923, signal 149441/153730 (executing program) 2022/09/15 11:34:11 fetching corpus: 1923, signal 149441/153804 (executing program) 2022/09/15 11:34:11 fetching corpus: 1923, signal 149441/153888 (executing program) 2022/09/15 11:34:11 fetching corpus: 1923, signal 149441/153971 (executing program) 2022/09/15 11:34:11 fetching corpus: 1923, signal 149441/154041 (executing program) 2022/09/15 11:34:11 fetching corpus: 1923, signal 149441/154116 (executing program) 2022/09/15 11:34:11 fetching corpus: 1923, signal 149441/154184 (executing program) 2022/09/15 11:34:11 fetching corpus: 1923, signal 149441/154272 (executing program) 2022/09/15 11:34:11 fetching corpus: 1923, signal 149441/154347 (executing program) 2022/09/15 11:34:11 fetching corpus: 1923, signal 149441/154406 (executing program) 2022/09/15 11:34:11 fetching corpus: 1923, signal 149441/154499 (executing program) 2022/09/15 11:34:11 fetching corpus: 1923, signal 149441/154578 (executing program) 2022/09/15 11:34:11 fetching corpus: 1923, signal 149441/154667 (executing program) 2022/09/15 11:34:11 fetching corpus: 1923, signal 149441/154744 (executing program) 2022/09/15 11:34:11 fetching corpus: 1923, signal 149441/154824 (executing program) 2022/09/15 11:34:11 fetching corpus: 1923, signal 149441/154895 (executing program) 2022/09/15 11:34:11 fetching corpus: 1923, signal 149441/154981 (executing program) 2022/09/15 11:34:11 fetching corpus: 1923, signal 149441/155065 (executing program) 2022/09/15 11:34:11 fetching corpus: 1923, signal 149441/155157 (executing program) 2022/09/15 11:34:11 fetching corpus: 1923, signal 149441/155157 (executing program) 2022/09/15 11:34:13 starting 8 fuzzer processes 11:34:13 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000011c0)={0x1, 0x80, 0xff, 0x20, 0x3f, 0x7f, 0x0, 0x2, 0x5010, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x3e, 0x6}, 0x10000, 0x6, 0x3ec000, 0x8, 0xffffffff, 0x9, 0x4, 0x0, 0x2, 0x0, 0x7}, 0xffffffffffffffff, 0x6, r0, 0xa) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYRES64=r0, @ANYRES16=0x0, @ANYBLOB="000427bdabc5ff0000005c000180060004004e23000008002f82950e12d57ad088af20125890dfb9080000020000060004004e230000060082003c00000000000300ff0200000000000000000000000000010c000700200000000100000008000b007369700008000b0073697000060004004e23000007ffe900e90a000008000600020000000800040000007e000800040000210000355c9656f35fdeb7bb961620a0dae802be9f8b74623d42c9bd892fae0aca9f4cee9ce3e2f090f7dcdede6da696d02d3c99137bf2594599b85fa71274d6254704d7bbfdc328a68b82cd0aef0f9c79e2ff669f773f1de1675f18b4af2d804e4ca7912750e0ab515aff130f483b9cad80f41ebf4cc9caea11eae445e79c2b60717a98bc5ef854a8052b2b37acfa7277ced458f939ac2ea170d1c1a2e5760428edadf9d905a4b3f09f09881ca89f7f9096d91beffa584b8d2e7cc5102f09d8868d245590f811541c9d52eec7984fd86c"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x20040044) syz_genetlink_get_family_id$nl80211(&(0x7f0000001280), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000001240)='./file0\x00', 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') 11:34:13 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0xf651, 0x840, 0xf, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000000), 0xe}, 0x104, 0x1, 0x800, 0x4, 0x0, 0x7, 0x3, 0x0, 0x9}, 0x0, 0x8, 0xffffffffffffffff, 0x2) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x80, 0x0, 0x0, 0xffffffffffffffff}}}, 0xb8}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c0000001d0001"], 0x1c}}, 0x0) 11:34:13 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_BT_VOICE(r0, 0x112, 0xc, 0x0, &(0x7f00000002c0)) 11:34:13 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000180)="1cdd1426fbc282e70cc6779777da3007dfce3590010576edb59024ca909f5bf9938b03ea21fcab5428bd833ed807d6620a1bb8cdbd806595e857b1c46be94763794e1e539570491f868e7331d3a8f412585a4ba07da8c9bcb1735b5b76ea45466fb6d44385ccb4a9d55ca3ca1cb2961ef40dc3d9b791e54d61ee4fbe2bb0db8ac1efd16b857d27a945dcf5cb4e775df44d6ed2f65258dea227ecccbf8a4b7e405a6304e9b7f633b6d0b5a3f5678f219a0163b105056c08779e7259ced545c206f4623df23e03722bb1cff091896da4781fd374f5ef51e76d2f4e83460e1847b19639ec8f601f2f274643994abb86200a0a37dfc4f40eda89baf569a086d3e1d91171881c162c913547cc85554cf6e10f0c4eb23594a72df74c4faac4b61f2db52d68f8156b1804b86bac29a788488daf76dca5a3f742260f34da01c64f7159cd5316301d003f8384d0ebd323cce43561c4d9b19f1bb0714f441813b7a0503ca1d2a5521e8e36bb3e3d55dd4aa3c6a20164e6bb910451a1b1dc177c0c4d2a9e6b064bd614e97d33448584968a33fc096d3c2a108f73cd2af97a3116b0e1ab8300004190ad6b322bf373dd5b2e47c1f9d688b44158e863b95b97a38b2796f62225967a5ee4da04d86cbdcf4c39e678f1721fb41177e2015d947b9f096be45ec5282dfe30975980b6e80c32b9c72e054a8185a4bae99630b622d67afa2f79f62c0a6f25ca5f72583ea6e9e075e97690efbc6525ac9fffa1e0e75321c2836d14b8693f267624ad36c2c35f67246b7efa8d58db6013102df5f99106a2f1f937256159971c3ec73ca2ac838239adae64a318a21cc1614d00d815024281a6503769b7513ed9ffad629d987e15bcb08a91d1571c7008355423052470cf611f6de9ffc0368c67d1dd8eafa5ca6f60555413238ca986bf1994954e121b9b364902747b6083bb5b7ea600bdedb188ee62e958d6bedc5a4ce20d5535eedc66cf39d1198c07698d5df7c6249d0d8fb83a6ea7da2c14163259531675c0523a5a0c8e77eac103b261f02097f50aaaa270706b58e242521296fff482ef3723ddd4d9f14313ac46a5e4898e72dfcae786d77a6f61bf9b902e6d212acfcb7bcfdd1942af4a2e3896e31fa218eba372cc92b744b34cf0128dd73cb41c657694a4f111e2ad3284c6ac2491c7ef742f5d1d3fd49fecac7f572f6b9076e132d5172c6778ebda3382457c2914a5dd7879910e5dcec7d7f2471878c3a0f10e94558f94e4cdc08167aabf868484681da16d28bd901cf809a7b676ae3612310bc81fb4bedaa47026a5c66df1e0bfb6dc1ad419d2e3076f5a15e7aadc255c6dfa9957710c32c99ba5033995789081ad6a714410742b314419dd98bc8e6b4f49eefc17c64eeaa63447bbd179971b62086e3d93a904d7bff197c274f32e3fdd727f9464200425d486214c046643535426ad60b41b2a97ba2f0839040d83ce5a26e176d699257f2a62a10658e2c027a8cc0605d4a4e78dad657c95c220aab598311afaed00074831c1af98aab63bbad56c4c76e62c7db123caaadc38ce4831c84cb086a4e67ff3bacecf66a2ac629f905bd5538b14be1647edd550c37102e24fc044dd195979617f914b4407ff81b8ea1616bbcb1753f34cf22b0061371761e498794b9766b9c3320ef141cc17d0465351f8476bcc384113511f8b48df100da12104dcf3ea1b1564aebf917e9efb1bfe5c1a5c36eff022ef7a2637d490b1e898b7028e766881438d51b102dc58f31ad320267cacbd90be4afc895bdf5e221eda7c9d038ba6c5a00e08f30c3dd577ea9a5b18805152d18c13376f7923c2439e9f37340295a3f79166f40021c50b76102b51ec0614e328deba990a7c336df9f281fce37cc626de419a3bdd6757c5d20ca5b8c80f0598a377b99c1992dafdc9d1bac9ef3cad0a0a518a150dbd897f732dbb57be90518c6c566d2a308f0133dacfc1ba2aa0ce5bf1d759f73804885a54228467ace84fe6eb30a533dd3c5794d6bd6c077c8d506f0964d6fa24afc60d5ba929d40ca9a8b4a68d631fba7198fc8261bc3484ce5f9834b02ded85a1d1c50824b27e997d6e0147eadd3ba006a9f7619b0d0df06feccbd4bde270e1d1f75a143651b5586fb634f89d3c97f868798a8e064cdee946316a97342e71a150c9d03fe2d4b696721d5e89cd0f681edab61afad35895f46ff25d849b28b93aa80f9c52c44b0aa878130ace29d580d199dd5477c6591a4e04cd62cece120154dcf5cb885cfbef397626cafd9d3331fd525a8605af7e254c2d3009bd77fddae91ef81e501df8672aa457d8a1c581924e12cb0c4dcd539cce952a770c96b90f308871c25b839cc7bfff44b5e99e3dd58dfa24330fec539e6299e8562f1df254cb88f2924eac2ab97d63b9cd202c2f80d65d7e0f3e24f6da5bb18f27a8615c32855d1efb9b13bc928810e21dae7c9e023e4913d3a758e5f75bb3d6e762c77c2880a8052baf4cb223c9bb8740be20af0e7042080fbcf8ceca01efd66ff82bac2ed8c57f4ad0e2574526551269acab864dfce92fd9dee003d993895c3874ee7bcffa9d78b236f92f73f22b5fe27f73154ef10f39c185ea7b4d981fe1944d5c7a8783adf1d06f4ae77f96fac25d2118ca9c5d343b18e962d899f3c41deb6b0ba6273e3b27d270a00b97a59e7f0196d1ae6d540de03cbcf0552d6ac0474f6a08b982b4141d411d791f40a3e2795255c62fc48b63f56ab4dc7f7f44852523f783da1b3d", 0x79b}], 0x1) [ 65.724835] audit: type=1400 audit(1663241653.945:6): avc: denied { execmem } for pid=288 comm="syz-executor.2" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 11:34:13 executing program 4: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) 11:34:13 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x29, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000280)='devpts\x00', 0x0, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x500) inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x1000210) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 11:34:13 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000140), 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r1, &(0x7f0000000340)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x24048800) sendmmsg$inet(r1, &(0x7f0000001200)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000800)={0x2, 0x0, @local}, 0x10, 0x0}}], 0x2, 0x8001) r2 = epoll_create(0x4) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000000200), 0x8, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000240)={0x20000000}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000000)) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000040)) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f0000001700)={0x0, 0x0, 0x0, 0x7, 0xffffffffffffff37, 0x0, 0x12, 0xc, 0x0, "23c2d80353e2f6a33c3e59015505ac0d65bc8b584c0564cf1252925367d826dee4aed502dc498a3d5c028f7b69f143afd05a4631a6ae553f096dd6e8a33af795", "970da5fd2a5ca37306ba38b5bc51fbc98a6fdf16294e20401cf1632175cc9150dad985aa02040d9d566fd3881b67dd89a5da4c3da629ed5abc60dce05e0c79f8", "367043bc1c4a0680996102355937587a7b0008000000000000035f223600", [0x1a5, 0x1]}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000180)={0x0, {}, 0x0, {}, 0xffffffff, 0x12, 0x9, 0x18, "0c085ee0d43737c7cce643311ec9d0b00b3e0eb0fd5250c5cd319444c5638d84f87683c5b18016b00b3a518f9239394dfd4370da74470a7db67281a92b689c2b", "f0f8f1a18f98bc2c801089c9c49ed0283be50f8eafce21d32f972cf2a96eed7d", [0x7]}) recvmsg$unix(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f0000000240), 0x6e, &(0x7f0000001600)=[{&(0x7f00000002c0)=""/68, 0x44}, {&(0x7f0000000340)=""/228, 0xe4}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000000100)=""/5, 0x5}, {&(0x7f0000001440)=""/243, 0xf3}, {&(0x7f0000001540)=""/138, 0x8a}], 0x6, &(0x7f0000001680)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38}, 0x3) ioctl$LOOP_CLR_FD(r4, 0x4c01) write$P9_RFLUSH(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_complete(0x0) 11:34:13 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0003}]}) shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) mlock(&(0x7f0000ffd000/0x1000)=nil, 0x1000) [ 67.038440] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 67.042272] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 67.043842] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 67.048606] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 67.051824] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 67.053297] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 67.060074] Bluetooth: hci1: HCI_REQ-0x0c1a [ 67.072004] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 67.079905] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 67.083611] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 67.088200] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 67.091349] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 67.094253] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 67.101054] Bluetooth: hci0: HCI_REQ-0x0c1a [ 67.122473] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 67.126116] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 67.127651] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 67.140031] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 67.141178] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 67.143473] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 67.146256] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 67.147998] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 67.149342] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 67.150489] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 67.152148] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 67.153366] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 67.158044] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 67.160231] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 67.161377] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 67.164835] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 67.167674] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 67.168799] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 67.169796] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 67.171640] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 67.176601] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 67.178550] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 67.180289] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 67.181647] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 67.184295] Bluetooth: hci6: HCI_REQ-0x0c1a [ 67.188398] Bluetooth: hci7: HCI_REQ-0x0c1a [ 67.216053] Bluetooth: hci2: HCI_REQ-0x0c1a [ 67.227821] Bluetooth: hci3: HCI_REQ-0x0c1a [ 69.120014] Bluetooth: hci5: Opcode 0x c03 failed: -110 [ 69.121250] Bluetooth: hci4: Opcode 0x c03 failed: -110 [ 69.121327] Bluetooth: hci1: command 0x0409 tx timeout [ 69.184767] Bluetooth: hci0: command 0x0409 tx timeout [ 69.247771] Bluetooth: hci3: command 0x0409 tx timeout [ 69.248238] Bluetooth: hci2: command 0x0409 tx timeout [ 69.248641] Bluetooth: hci6: command 0x0409 tx timeout [ 69.249408] Bluetooth: hci7: command 0x0409 tx timeout [ 71.167850] Bluetooth: hci1: command 0x041b tx timeout [ 71.231790] Bluetooth: hci0: command 0x041b tx timeout [ 71.295816] Bluetooth: hci7: command 0x041b tx timeout [ 71.297388] Bluetooth: hci6: command 0x041b tx timeout [ 71.298399] Bluetooth: hci2: command 0x041b tx timeout [ 71.300577] Bluetooth: hci3: command 0x041b tx timeout [ 72.493402] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 72.495655] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 72.503277] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 72.521472] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 72.534914] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 72.547189] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 72.568791] Bluetooth: hci5: HCI_REQ-0x0c1a [ 73.215872] Bluetooth: hci1: command 0x040f tx timeout [ 73.279899] Bluetooth: hci0: command 0x040f tx timeout [ 73.343977] Bluetooth: hci3: command 0x040f tx timeout [ 73.344842] Bluetooth: hci2: command 0x040f tx timeout [ 73.345612] Bluetooth: hci6: command 0x040f tx timeout [ 73.348834] Bluetooth: hci7: command 0x040f tx timeout [ 74.367810] Bluetooth: hci4: Opcode 0x c03 failed: -110 [ 74.623785] Bluetooth: hci5: command 0x0409 tx timeout [ 75.263783] Bluetooth: hci1: command 0x0419 tx timeout [ 75.327838] Bluetooth: hci0: command 0x0419 tx timeout [ 75.392008] Bluetooth: hci7: command 0x0419 tx timeout [ 75.392557] Bluetooth: hci6: command 0x0419 tx timeout [ 75.393046] Bluetooth: hci2: command 0x0419 tx timeout [ 75.393504] Bluetooth: hci3: command 0x0419 tx timeout [ 76.671759] Bluetooth: hci5: command 0x041b tx timeout [ 78.719868] Bluetooth: hci5: command 0x040f tx timeout [ 78.911862] Bluetooth: hci4: Opcode 0x c03 failed: -110 [ 80.767750] Bluetooth: hci5: command 0x0419 tx timeout [ 83.519755] Bluetooth: hci4: Opcode 0x c03 failed: -110 [ 86.155268] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 86.156911] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 86.158912] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 86.164604] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 86.165970] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 86.167869] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 86.172728] Bluetooth: hci4: HCI_REQ-0x0c1a [ 88.191767] Bluetooth: hci4: command 0x0409 tx timeout [ 90.239987] Bluetooth: hci4: command 0x041b tx timeout [ 92.287797] Bluetooth: hci4: command 0x040f tx timeout [ 94.335847] Bluetooth: hci4: command 0x0419 tx timeout 11:35:11 executing program 4: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) 11:35:11 executing program 4: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) 11:35:12 executing program 4: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) 11:35:12 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0003}]}) shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) mlock(&(0x7f0000ffd000/0x1000)=nil, 0x1000) 11:35:12 executing program 4: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) 11:35:12 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0003}]}) shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) mlock(&(0x7f0000ffd000/0x1000)=nil, 0x1000) 11:35:12 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0003}]}) shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) mlock(&(0x7f0000ffd000/0x1000)=nil, 0x1000) 11:35:12 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_BT_VOICE(r0, 0x112, 0xc, 0x0, &(0x7f00000002c0)) [ 124.360952] audit: type=1400 audit(1663241712.581:7): avc: denied { open } for pid=3733 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 124.362504] audit: type=1400 audit(1663241712.582:8): avc: denied { kernel } for pid=3733 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 124.377361] ------------[ cut here ]------------ [ 124.377380] [ 124.377383] ====================================================== [ 124.377386] WARNING: possible circular locking dependency detected [ 124.377390] 6.0.0-rc5-next-20220915 #1 Not tainted [ 124.377396] ------------------------------------------------------ [ 124.377399] syz-executor.0/3735 is trying to acquire lock: [ 124.377405] ffffffff853fa878 ((console_sem).lock){....}-{2:2}, at: down_trylock+0xe/0x70 [ 124.377441] [ 124.377441] but task is already holding lock: [ 124.377444] ffff88800f97c820 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 124.377471] [ 124.377471] which lock already depends on the new lock. [ 124.377471] [ 124.377473] [ 124.377473] the existing dependency chain (in reverse order) is: [ 124.377476] [ 124.377476] -> #3 (&ctx->lock){....}-{2:2}: [ 124.377490] _raw_spin_lock+0x2a/0x40 [ 124.377508] __perf_event_task_sched_out+0x53b/0x18d0 [ 124.377521] __schedule+0xedd/0x2470 [ 124.377531] schedule+0xda/0x1b0 [ 124.377541] exit_to_user_mode_prepare+0x114/0x1a0 [ 124.377561] syscall_exit_to_user_mode+0x19/0x40 [ 124.377580] do_syscall_64+0x48/0x90 [ 124.377594] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 124.377612] [ 124.377612] -> #2 (&rq->__lock){-.-.}-{2:2}: [ 124.377625] _raw_spin_lock_nested+0x30/0x40 [ 124.377641] raw_spin_rq_lock_nested+0x1e/0x30 [ 124.377654] task_fork_fair+0x63/0x4d0 [ 124.377671] sched_cgroup_fork+0x3d0/0x540 [ 124.377685] copy_process+0x4183/0x6e20 [ 124.377698] kernel_clone+0xe7/0x890 [ 124.377708] user_mode_thread+0xad/0xf0 [ 124.377718] rest_init+0x24/0x250 [ 124.377735] arch_call_rest_init+0xf/0x14 [ 124.377747] start_kernel+0x4c1/0x4e6 [ 124.377757] secondary_startup_64_no_verify+0xe0/0xeb [ 124.377771] [ 124.377771] -> #1 (&p->pi_lock){-.-.}-{2:2}: [ 124.377784] _raw_spin_lock_irqsave+0x39/0x60 [ 124.377800] try_to_wake_up+0xab/0x1920 [ 124.377813] up+0x75/0xb0 [ 124.377825] __up_console_sem+0x6e/0x80 [ 124.377841] console_unlock+0x46a/0x590 [ 124.377857] vt_ioctl+0x2822/0x2ca0 [ 124.377870] tty_ioctl+0x7c4/0x1700 [ 124.377881] __x64_sys_ioctl+0x19a/0x210 [ 124.377897] do_syscall_64+0x3b/0x90 [ 124.377911] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 124.377928] [ 124.377928] -> #0 ((console_sem).lock){....}-{2:2}: [ 124.377942] __lock_acquire+0x2a02/0x5e70 [ 124.377958] lock_acquire+0x1a2/0x530 [ 124.377975] _raw_spin_lock_irqsave+0x39/0x60 [ 124.377990] down_trylock+0xe/0x70 [ 124.378003] __down_trylock_console_sem+0x3b/0xd0 [ 124.378019] vprintk_emit+0x16b/0x560 [ 124.378036] vprintk+0x84/0xa0 [ 124.378052] _printk+0xba/0xf1 [ 124.378070] report_bug.cold+0x72/0xab [ 124.378083] handle_bug+0x3c/0x70 [ 124.378096] exc_invalid_op+0x14/0x50 [ 124.378110] asm_exc_invalid_op+0x16/0x20 [ 124.378127] group_sched_out.part.0+0x2c7/0x460 [ 124.378138] ctx_sched_out+0x8f1/0xc10 [ 124.378147] __perf_event_task_sched_out+0x6d0/0x18d0 [ 124.378159] __schedule+0xedd/0x2470 [ 124.378170] schedule+0xda/0x1b0 [ 124.378179] exit_to_user_mode_prepare+0x114/0x1a0 [ 124.378199] syscall_exit_to_user_mode+0x19/0x40 [ 124.378217] do_syscall_64+0x48/0x90 [ 124.378230] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 124.378248] [ 124.378248] other info that might help us debug this: [ 124.378248] [ 124.378250] Chain exists of: [ 124.378250] (console_sem).lock --> &rq->__lock --> &ctx->lock [ 124.378250] [ 124.378265] Possible unsafe locking scenario: [ 124.378265] [ 124.378267] CPU0 CPU1 [ 124.378269] ---- ---- [ 124.378272] lock(&ctx->lock); [ 124.378277] lock(&rq->__lock); [ 124.378283] lock(&ctx->lock); [ 124.378289] lock((console_sem).lock); [ 124.378295] [ 124.378295] *** DEADLOCK *** [ 124.378295] [ 124.378297] 2 locks held by syz-executor.0/3735: [ 124.378304] #0: ffff88806cf37cd8 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x1cf/0x2470 [ 124.378330] #1: ffff88800f97c820 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 124.378358] [ 124.378358] stack backtrace: [ 124.378360] CPU: 1 PID: 3735 Comm: syz-executor.0 Not tainted 6.0.0-rc5-next-20220915 #1 [ 124.378373] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 124.378380] Call Trace: [ 124.378384] [ 124.378387] dump_stack_lvl+0x8b/0xb3 [ 124.378403] check_noncircular+0x263/0x2e0 [ 124.378420] ? format_decode+0x26c/0xb50 [ 124.378435] ? print_circular_bug+0x450/0x450 [ 124.378453] ? enable_ptr_key_workfn+0x20/0x20 [ 124.378468] ? format_decode+0x26c/0xb50 [ 124.378484] ? alloc_chain_hlocks+0x1ec/0x5a0 [ 124.378502] __lock_acquire+0x2a02/0x5e70 [ 124.378525] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 124.378547] lock_acquire+0x1a2/0x530 [ 124.378565] ? down_trylock+0xe/0x70 [ 124.378579] ? rcu_read_unlock+0x40/0x40 [ 124.378601] ? vprintk+0x84/0xa0 [ 124.378619] _raw_spin_lock_irqsave+0x39/0x60 [ 124.378635] ? down_trylock+0xe/0x70 [ 124.378649] down_trylock+0xe/0x70 [ 124.378663] ? vprintk+0x84/0xa0 [ 124.378680] __down_trylock_console_sem+0x3b/0xd0 [ 124.378698] vprintk_emit+0x16b/0x560 [ 124.378717] vprintk+0x84/0xa0 [ 124.378735] _printk+0xba/0xf1 [ 124.378754] ? record_print_text.cold+0x16/0x16 [ 124.378777] ? report_bug.cold+0x66/0xab [ 124.378791] ? group_sched_out.part.0+0x2c7/0x460 [ 124.378803] report_bug.cold+0x72/0xab [ 124.378819] handle_bug+0x3c/0x70 [ 124.378836] exc_invalid_op+0x14/0x50 [ 124.378853] asm_exc_invalid_op+0x16/0x20 [ 124.378871] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 124.378885] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 124.378896] RSP: 0018:ffff88803f27fc48 EFLAGS: 00010006 [ 124.378905] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 124.378913] RDX: ffff88801dbbb580 RSI: ffffffff81566027 RDI: 0000000000000005 [ 124.378921] RBP: ffff88803f280000 R08: 0000000000000005 R09: 0000000000000001 [ 124.378928] R10: 0000000000000000 R11: ffffffff865ac05b R12: ffff88800f97c800 [ 124.378936] R13: ffff88806cf3d100 R14: ffffffff8547c660 R15: 0000000000000002 [ 124.378946] ? group_sched_out.part.0+0x2c7/0x460 [ 124.378960] ? group_sched_out.part.0+0x2c7/0x460 [ 124.378973] ctx_sched_out+0x8f1/0xc10 [ 124.378986] __perf_event_task_sched_out+0x6d0/0x18d0 [ 124.379001] ? lock_is_held_type+0xd7/0x130 [ 124.379020] ? __perf_cgroup_move+0x160/0x160 [ 124.379032] ? set_next_entity+0x304/0x550 [ 124.379050] ? update_curr+0x267/0x740 [ 124.379069] ? lock_is_held_type+0xd7/0x130 [ 124.379088] __schedule+0xedd/0x2470 [ 124.379102] ? io_schedule_timeout+0x150/0x150 [ 124.379115] ? rcu_read_lock_sched_held+0x3e/0x80 [ 124.379136] schedule+0xda/0x1b0 [ 124.379148] exit_to_user_mode_prepare+0x114/0x1a0 [ 124.379168] syscall_exit_to_user_mode+0x19/0x40 [ 124.379187] do_syscall_64+0x48/0x90 [ 124.379202] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 124.379220] RIP: 0033:0x7fd0c958eb19 [ 124.379229] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 124.379240] RSP: 002b:00007fd0c6b04218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 124.379251] RAX: 0000000000000001 RBX: 00007fd0c96a1f68 RCX: 00007fd0c958eb19 [ 124.379258] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007fd0c96a1f6c [ 124.379266] RBP: 00007fd0c96a1f60 R08: 000000000000000e R09: 0000000000000000 [ 124.379273] R10: 0000000000000003 R11: 0000000000000246 R12: 00007fd0c96a1f6c [ 124.379280] R13: 00007ffd02b88caf R14: 00007fd0c6b04300 R15: 0000000000022000 [ 124.379293] [ 124.483093] WARNING: CPU: 1 PID: 3735 at kernel/events/core.c:2309 group_sched_out.part.0+0x2c7/0x460 [ 124.484490] Modules linked in: [ 124.484973] CPU: 1 PID: 3735 Comm: syz-executor.0 Not tainted 6.0.0-rc5-next-20220915 #1 [ 124.486154] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 124.487801] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 124.488573] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 124.491189] RSP: 0018:ffff88803f27fc48 EFLAGS: 00010006 [ 124.491899] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 124.492958] RDX: ffff88801dbbb580 RSI: ffffffff81566027 RDI: 0000000000000005 [ 124.494013] RBP: ffff88803f280000 R08: 0000000000000005 R09: 0000000000000001 [ 124.495067] R10: 0000000000000000 R11: ffffffff865ac05b R12: ffff88800f97c800 [ 124.496127] R13: ffff88806cf3d100 R14: ffffffff8547c660 R15: 0000000000000002 [ 124.497181] FS: 00007fd0c6b04700(0000) GS:ffff88806cf00000(0000) knlGS:0000000000000000 [ 124.498368] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 124.499223] CR2: 00007fdb83580260 CR3: 000000000d0a4000 CR4: 0000000000350ee0 [ 124.500210] Call Trace: [ 124.500596] [ 124.500949] ctx_sched_out+0x8f1/0xc10 [ 124.501556] __perf_event_task_sched_out+0x6d0/0x18d0 [ 124.502335] ? lock_is_held_type+0xd7/0x130 [ 124.503012] ? __perf_cgroup_move+0x160/0x160 [ 124.503685] ? set_next_entity+0x304/0x550 [ 124.504344] ? update_curr+0x267/0x740 [ 124.504947] ? lock_is_held_type+0xd7/0x130 [ 124.505609] __schedule+0xedd/0x2470 [ 124.506180] ? io_schedule_timeout+0x150/0x150 [ 124.506873] ? rcu_read_lock_sched_held+0x3e/0x80 [ 124.507617] schedule+0xda/0x1b0 [ 124.508161] exit_to_user_mode_prepare+0x114/0x1a0 [ 124.508927] syscall_exit_to_user_mode+0x19/0x40 [ 124.509667] do_syscall_64+0x48/0x90 [ 124.510249] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 124.511035] RIP: 0033:0x7fd0c958eb19 [ 124.511602] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 124.514276] RSP: 002b:00007fd0c6b04218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 124.515277] RAX: 0000000000000001 RBX: 00007fd0c96a1f68 RCX: 00007fd0c958eb19 [ 124.516341] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007fd0c96a1f6c [ 124.517371] RBP: 00007fd0c96a1f60 R08: 000000000000000e R09: 0000000000000000 [ 124.518390] R10: 0000000000000003 R11: 0000000000000246 R12: 00007fd0c96a1f6c [ 124.519404] R13: 00007ffd02b88caf R14: 00007fd0c6b04300 R15: 0000000000022000 [ 124.520452] [ 124.520802] irq event stamp: 630 [ 124.521297] hardirqs last enabled at (629): [] exit_to_user_mode_prepare+0x109/0x1a0 [ 124.522653] hardirqs last disabled at (630): [] __schedule+0x1225/0x2470 [ 124.523825] softirqs last enabled at (510): [] __irq_exit_rcu+0x11b/0x180 [ 124.525063] softirqs last disabled at (473): [] __irq_exit_rcu+0x11b/0x180 [ 124.526284] ---[ end trace 0000000000000000 ]--- [ 124.906717] hrtimer: interrupt took 17353 ns [ 125.167608] audit: type=1400 audit(1663241713.388:9): avc: denied { block_suspend } for pid=3781 comm="syz-executor.6" capability=36 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 [ 125.347790] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 127.496157] audit: type=1400 audit(1663241715.717:10): avc: denied { watch_reads } for pid=3887 comm="syz-executor.5" path="/syzkaller-testdir785420003/syzkaller.bpRgrf/0/file0" dev="sda" ino=15981 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=dir permissive=1 11:35:18 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000011c0)={0x1, 0x80, 0xff, 0x20, 0x3f, 0x7f, 0x0, 0x2, 0x5010, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x3e, 0x6}, 0x10000, 0x6, 0x3ec000, 0x8, 0xffffffff, 0x9, 0x4, 0x0, 0x2, 0x0, 0x7}, 0xffffffffffffffff, 0x6, r0, 0xa) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYRES64=r0, @ANYRES16=0x0, @ANYBLOB="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"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x20040044) syz_genetlink_get_family_id$nl80211(&(0x7f0000001280), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000001240)='./file0\x00', 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') 11:35:18 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000140), 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r1, &(0x7f0000000340)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x24048800) sendmmsg$inet(r1, &(0x7f0000001200)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000800)={0x2, 0x0, @local}, 0x10, 0x0}}], 0x2, 0x8001) r2 = epoll_create(0x4) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000000200), 0x8, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000240)={0x20000000}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000000)) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000040)) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f0000001700)={0x0, 0x0, 0x0, 0x7, 0xffffffffffffff37, 0x0, 0x12, 0xc, 0x0, "23c2d80353e2f6a33c3e59015505ac0d65bc8b584c0564cf1252925367d826dee4aed502dc498a3d5c028f7b69f143afd05a4631a6ae553f096dd6e8a33af795", "970da5fd2a5ca37306ba38b5bc51fbc98a6fdf16294e20401cf1632175cc9150dad985aa02040d9d566fd3881b67dd89a5da4c3da629ed5abc60dce05e0c79f8", "367043bc1c4a0680996102355937587a7b0008000000000000035f223600", [0x1a5, 0x1]}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000180)={0x0, {}, 0x0, {}, 0xffffffff, 0x12, 0x9, 0x18, "0c085ee0d43737c7cce643311ec9d0b00b3e0eb0fd5250c5cd319444c5638d84f87683c5b18016b00b3a518f9239394dfd4370da74470a7db67281a92b689c2b", "f0f8f1a18f98bc2c801089c9c49ed0283be50f8eafce21d32f972cf2a96eed7d", [0x7]}) recvmsg$unix(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f0000000240), 0x6e, &(0x7f0000001600)=[{&(0x7f00000002c0)=""/68, 0x44}, {&(0x7f0000000340)=""/228, 0xe4}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000000100)=""/5, 0x5}, {&(0x7f0000001440)=""/243, 0xf3}, {&(0x7f0000001540)=""/138, 0x8a}], 0x6, &(0x7f0000001680)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38}, 0x3) ioctl$LOOP_CLR_FD(r4, 0x4c01) write$P9_RFLUSH(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_complete(0x0) 11:35:18 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0xf651, 0x840, 0xf, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000000), 0xe}, 0x104, 0x1, 0x800, 0x4, 0x0, 0x7, 0x3, 0x0, 0x9}, 0x0, 0x8, 0xffffffffffffffff, 0x2) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x80, 0x0, 0x0, 0xffffffffffffffff}}}, 0xb8}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c0000001d0001"], 0x1c}}, 0x0) 11:35:18 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000180)="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", 0x79b}], 0x1) 11:35:18 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x29, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000280)='devpts\x00', 0x0, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x500) inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x1000210) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 11:35:18 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0003}]}) shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) mlock(&(0x7f0000ffd000/0x1000)=nil, 0x1000) 11:35:18 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0003}]}) shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) mlock(&(0x7f0000ffd000/0x1000)=nil, 0x1000) 11:35:18 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_BT_VOICE(r0, 0x112, 0xc, 0x0, &(0x7f00000002c0)) 11:35:18 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0003}]}) shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) mlock(&(0x7f0000ffd000/0x1000)=nil, 0x1000) 11:35:18 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x29, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000280)='devpts\x00', 0x0, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x500) inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x1000210) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 11:35:18 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000180)="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", 0x79b}], 0x1) 11:35:18 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000140), 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r1, &(0x7f0000000340)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x24048800) sendmmsg$inet(r1, &(0x7f0000001200)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000800)={0x2, 0x0, @local}, 0x10, 0x0}}], 0x2, 0x8001) r2 = epoll_create(0x4) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000000200), 0x8, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000240)={0x20000000}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000000)) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000040)) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f0000001700)={0x0, 0x0, 0x0, 0x7, 0xffffffffffffff37, 0x0, 0x12, 0xc, 0x0, "23c2d80353e2f6a33c3e59015505ac0d65bc8b584c0564cf1252925367d826dee4aed502dc498a3d5c028f7b69f143afd05a4631a6ae553f096dd6e8a33af795", "970da5fd2a5ca37306ba38b5bc51fbc98a6fdf16294e20401cf1632175cc9150dad985aa02040d9d566fd3881b67dd89a5da4c3da629ed5abc60dce05e0c79f8", "367043bc1c4a0680996102355937587a7b0008000000000000035f223600", [0x1a5, 0x1]}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000180)={0x0, {}, 0x0, {}, 0xffffffff, 0x12, 0x9, 0x18, "0c085ee0d43737c7cce643311ec9d0b00b3e0eb0fd5250c5cd319444c5638d84f87683c5b18016b00b3a518f9239394dfd4370da74470a7db67281a92b689c2b", "f0f8f1a18f98bc2c801089c9c49ed0283be50f8eafce21d32f972cf2a96eed7d", [0x7]}) recvmsg$unix(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f0000000240), 0x6e, &(0x7f0000001600)=[{&(0x7f00000002c0)=""/68, 0x44}, {&(0x7f0000000340)=""/228, 0xe4}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000000100)=""/5, 0x5}, {&(0x7f0000001440)=""/243, 0xf3}, {&(0x7f0000001540)=""/138, 0x8a}], 0x6, &(0x7f0000001680)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38}, 0x3) ioctl$LOOP_CLR_FD(r4, 0x4c01) write$P9_RFLUSH(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_complete(0x0) 11:35:18 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x29, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000280)='devpts\x00', 0x0, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x500) inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x1000210) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 11:35:18 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000180)="1cdd1426fbc282e70cc6779777da3007dfce3590010576edb59024ca909f5bf9938b03ea21fcab5428bd833ed807d6620a1bb8cdbd806595e857b1c46be94763794e1e539570491f868e7331d3a8f412585a4ba07da8c9bcb1735b5b76ea45466fb6d44385ccb4a9d55ca3ca1cb2961ef40dc3d9b791e54d61ee4fbe2bb0db8ac1efd16b857d27a945dcf5cb4e775df44d6ed2f65258dea227ecccbf8a4b7e405a6304e9b7f633b6d0b5a3f5678f219a0163b105056c08779e7259ced545c206f4623df23e03722bb1cff091896da4781fd374f5ef51e76d2f4e83460e1847b19639ec8f601f2f274643994abb86200a0a37dfc4f40eda89baf569a086d3e1d91171881c162c913547cc85554cf6e10f0c4eb23594a72df74c4faac4b61f2db52d68f8156b1804b86bac29a788488daf76dca5a3f742260f34da01c64f7159cd5316301d003f8384d0ebd323cce43561c4d9b19f1bb0714f441813b7a0503ca1d2a5521e8e36bb3e3d55dd4aa3c6a20164e6bb910451a1b1dc177c0c4d2a9e6b064bd614e97d33448584968a33fc096d3c2a108f73cd2af97a3116b0e1ab8300004190ad6b322bf373dd5b2e47c1f9d688b44158e863b95b97a38b2796f62225967a5ee4da04d86cbdcf4c39e678f1721fb41177e2015d947b9f096be45ec5282dfe30975980b6e80c32b9c72e054a8185a4bae99630b622d67afa2f79f62c0a6f25ca5f72583ea6e9e075e97690efbc6525ac9fffa1e0e75321c2836d14b8693f267624ad36c2c35f67246b7efa8d58db6013102df5f99106a2f1f937256159971c3ec73ca2ac838239adae64a318a21cc1614d00d815024281a6503769b7513ed9ffad629d987e15bcb08a91d1571c7008355423052470cf611f6de9ffc0368c67d1dd8eafa5ca6f60555413238ca986bf1994954e121b9b364902747b6083bb5b7ea600bdedb188ee62e958d6bedc5a4ce20d5535eedc66cf39d1198c07698d5df7c6249d0d8fb83a6ea7da2c14163259531675c0523a5a0c8e77eac103b261f02097f50aaaa270706b58e242521296fff482ef3723ddd4d9f14313ac46a5e4898e72dfcae786d77a6f61bf9b902e6d212acfcb7bcfdd1942af4a2e3896e31fa218eba372cc92b744b34cf0128dd73cb41c657694a4f111e2ad3284c6ac2491c7ef742f5d1d3fd49fecac7f572f6b9076e132d5172c6778ebda3382457c2914a5dd7879910e5dcec7d7f2471878c3a0f10e94558f94e4cdc08167aabf868484681da16d28bd901cf809a7b676ae3612310bc81fb4bedaa47026a5c66df1e0bfb6dc1ad419d2e3076f5a15e7aadc255c6dfa9957710c32c99ba5033995789081ad6a714410742b314419dd98bc8e6b4f49eefc17c64eeaa63447bbd179971b62086e3d93a904d7bff197c274f32e3fdd727f9464200425d486214c046643535426ad60b41b2a97ba2f0839040d83ce5a26e176d699257f2a62a10658e2c027a8cc0605d4a4e78dad657c95c220aab598311afaed00074831c1af98aab63bbad56c4c76e62c7db123caaadc38ce4831c84cb086a4e67ff3bacecf66a2ac629f905bd5538b14be1647edd550c37102e24fc044dd195979617f914b4407ff81b8ea1616bbcb1753f34cf22b0061371761e498794b9766b9c3320ef141cc17d0465351f8476bcc384113511f8b48df100da12104dcf3ea1b1564aebf917e9efb1bfe5c1a5c36eff022ef7a2637d490b1e898b7028e766881438d51b102dc58f31ad320267cacbd90be4afc895bdf5e221eda7c9d038ba6c5a00e08f30c3dd577ea9a5b18805152d18c13376f7923c2439e9f37340295a3f79166f40021c50b76102b51ec0614e328deba990a7c336df9f281fce37cc626de419a3bdd6757c5d20ca5b8c80f0598a377b99c1992dafdc9d1bac9ef3cad0a0a518a150dbd897f732dbb57be90518c6c566d2a308f0133dacfc1ba2aa0ce5bf1d759f73804885a54228467ace84fe6eb30a533dd3c5794d6bd6c077c8d506f0964d6fa24afc60d5ba929d40ca9a8b4a68d631fba7198fc8261bc3484ce5f9834b02ded85a1d1c50824b27e997d6e0147eadd3ba006a9f7619b0d0df06feccbd4bde270e1d1f75a143651b5586fb634f89d3c97f868798a8e064cdee946316a97342e71a150c9d03fe2d4b696721d5e89cd0f681edab61afad35895f46ff25d849b28b93aa80f9c52c44b0aa878130ace29d580d199dd5477c6591a4e04cd62cece120154dcf5cb885cfbef397626cafd9d3331fd525a8605af7e254c2d3009bd77fddae91ef81e501df8672aa457d8a1c581924e12cb0c4dcd539cce952a770c96b90f308871c25b839cc7bfff44b5e99e3dd58dfa24330fec539e6299e8562f1df254cb88f2924eac2ab97d63b9cd202c2f80d65d7e0f3e24f6da5bb18f27a8615c32855d1efb9b13bc928810e21dae7c9e023e4913d3a758e5f75bb3d6e762c77c2880a8052baf4cb223c9bb8740be20af0e7042080fbcf8ceca01efd66ff82bac2ed8c57f4ad0e2574526551269acab864dfce92fd9dee003d993895c3874ee7bcffa9d78b236f92f73f22b5fe27f73154ef10f39c185ea7b4d981fe1944d5c7a8783adf1d06f4ae77f96fac25d2118ca9c5d343b18e962d899f3c41deb6b0ba6273e3b27d270a00b97a59e7f0196d1ae6d540de03cbcf0552d6ac0474f6a08b982b4141d411d791f40a3e2795255c62fc48b63f56ab4dc7f7f44852523f783da1b3d", 0x79b}], 0x1) 11:35:18 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000011c0)={0x1, 0x80, 0xff, 0x20, 0x3f, 0x7f, 0x0, 0x2, 0x5010, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x3e, 0x6}, 0x10000, 0x6, 0x3ec000, 0x8, 0xffffffff, 0x9, 0x4, 0x0, 0x2, 0x0, 0x7}, 0xffffffffffffffff, 0x6, r0, 0xa) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYRES64=r0, @ANYRES16=0x0, @ANYBLOB="000427bdabc5ff0000005c000180060004004e23000008002f82950e12d57ad088af20125890dfb9080000020000060004004e230000060082003c00000000000300ff0200000000000000000000000000010c000700200000000100000008000b007369700008000b0073697000060004004e23000007ffe900e90a000008000600020000000800040000007e000800040000210000355c9656f35fdeb7bb961620a0dae802be9f8b74623d42c9bd892fae0aca9f4cee9ce3e2f090f7dcdede6da696d02d3c99137bf2594599b85fa71274d6254704d7bbfdc328a68b82cd0aef0f9c79e2ff669f773f1de1675f18b4af2d804e4ca7912750e0ab515aff130f483b9cad80f41ebf4cc9caea11eae445e79c2b60717a98bc5ef854a8052b2b37acfa7277ced458f939ac2ea170d1c1a2e5760428edadf9d905a4b3f09f09881ca89f7f9096d91beffa584b8d2e7cc5102f09d8868d245590f811541c9d52eec7984fd86c"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x20040044) syz_genetlink_get_family_id$nl80211(&(0x7f0000001280), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000001240)='./file0\x00', 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') 11:35:18 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_BT_VOICE(r0, 0x112, 0xc, 0x0, &(0x7f00000002c0)) [ 130.399628] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 11:35:18 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000011c0)={0x1, 0x80, 0xff, 0x20, 0x3f, 0x7f, 0x0, 0x2, 0x5010, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x3e, 0x6}, 0x10000, 0x6, 0x3ec000, 0x8, 0xffffffff, 0x9, 0x4, 0x0, 0x2, 0x0, 0x7}, 0xffffffffffffffff, 0x6, r0, 0xa) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYRES64=r0, @ANYRES16=0x0, @ANYBLOB="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"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x20040044) syz_genetlink_get_family_id$nl80211(&(0x7f0000001280), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000001240)='./file0\x00', 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') 11:35:18 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0xf651, 0x840, 0xf, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000000), 0xe}, 0x104, 0x1, 0x800, 0x4, 0x0, 0x7, 0x3, 0x0, 0x9}, 0x0, 0x8, 0xffffffffffffffff, 0x2) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x80, 0x0, 0x0, 0xffffffffffffffff}}}, 0xb8}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c0000001d0001"], 0x1c}}, 0x0) 11:35:18 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000011c0)={0x1, 0x80, 0xff, 0x20, 0x3f, 0x7f, 0x0, 0x2, 0x5010, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x3e, 0x6}, 0x10000, 0x6, 0x3ec000, 0x8, 0xffffffff, 0x9, 0x4, 0x0, 0x2, 0x0, 0x7}, 0xffffffffffffffff, 0x6, r0, 0xa) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYRES64=r0, @ANYRES16=0x0, @ANYBLOB="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"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x20040044) syz_genetlink_get_family_id$nl80211(&(0x7f0000001280), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000001240)='./file0\x00', 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') 11:35:18 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000011c0)={0x1, 0x80, 0xff, 0x20, 0x3f, 0x7f, 0x0, 0x2, 0x5010, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x3e, 0x6}, 0x10000, 0x6, 0x3ec000, 0x8, 0xffffffff, 0x9, 0x4, 0x0, 0x2, 0x0, 0x7}, 0xffffffffffffffff, 0x6, r0, 0xa) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYRES64=r0, @ANYRES16=0x0, @ANYBLOB="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"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x20040044) syz_genetlink_get_family_id$nl80211(&(0x7f0000001280), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000001240)='./file0\x00', 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') 11:35:18 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000140), 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r1, &(0x7f0000000340)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x24048800) sendmmsg$inet(r1, &(0x7f0000001200)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000800)={0x2, 0x0, @local}, 0x10, 0x0}}], 0x2, 0x8001) r2 = epoll_create(0x4) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000000200), 0x8, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000240)={0x20000000}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000000)) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000040)) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f0000001700)={0x0, 0x0, 0x0, 0x7, 0xffffffffffffff37, 0x0, 0x12, 0xc, 0x0, "23c2d80353e2f6a33c3e59015505ac0d65bc8b584c0564cf1252925367d826dee4aed502dc498a3d5c028f7b69f143afd05a4631a6ae553f096dd6e8a33af795", "970da5fd2a5ca37306ba38b5bc51fbc98a6fdf16294e20401cf1632175cc9150dad985aa02040d9d566fd3881b67dd89a5da4c3da629ed5abc60dce05e0c79f8", "367043bc1c4a0680996102355937587a7b0008000000000000035f223600", [0x1a5, 0x1]}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000180)={0x0, {}, 0x0, {}, 0xffffffff, 0x12, 0x9, 0x18, "0c085ee0d43737c7cce643311ec9d0b00b3e0eb0fd5250c5cd319444c5638d84f87683c5b18016b00b3a518f9239394dfd4370da74470a7db67281a92b689c2b", "f0f8f1a18f98bc2c801089c9c49ed0283be50f8eafce21d32f972cf2a96eed7d", [0x7]}) recvmsg$unix(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f0000000240), 0x6e, &(0x7f0000001600)=[{&(0x7f00000002c0)=""/68, 0x44}, {&(0x7f0000000340)=""/228, 0xe4}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000000100)=""/5, 0x5}, {&(0x7f0000001440)=""/243, 0xf3}, {&(0x7f0000001540)=""/138, 0x8a}], 0x6, &(0x7f0000001680)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38}, 0x3) ioctl$LOOP_CLR_FD(r4, 0x4c01) write$P9_RFLUSH(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_complete(0x0) 11:35:18 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000011c0)={0x1, 0x80, 0xff, 0x20, 0x3f, 0x7f, 0x0, 0x2, 0x5010, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x3e, 0x6}, 0x10000, 0x6, 0x3ec000, 0x8, 0xffffffff, 0x9, 0x4, 0x0, 0x2, 0x0, 0x7}, 0xffffffffffffffff, 0x6, r0, 0xa) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYRES64=r0, @ANYRES16=0x0, @ANYBLOB="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"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x20040044) syz_genetlink_get_family_id$nl80211(&(0x7f0000001280), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000001240)='./file0\x00', 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') 11:35:18 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000011c0)={0x1, 0x80, 0xff, 0x20, 0x3f, 0x7f, 0x0, 0x2, 0x5010, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x3e, 0x6}, 0x10000, 0x6, 0x3ec000, 0x8, 0xffffffff, 0x9, 0x4, 0x0, 0x2, 0x0, 0x7}, 0xffffffffffffffff, 0x6, r0, 0xa) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYRES64=r0, @ANYRES16=0x0, @ANYBLOB="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"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x20040044) syz_genetlink_get_family_id$nl80211(&(0x7f0000001280), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000001240)='./file0\x00', 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') 11:35:18 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000011c0)={0x1, 0x80, 0xff, 0x20, 0x3f, 0x7f, 0x0, 0x2, 0x5010, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x3e, 0x6}, 0x10000, 0x6, 0x3ec000, 0x8, 0xffffffff, 0x9, 0x4, 0x0, 0x2, 0x0, 0x7}, 0xffffffffffffffff, 0x6, r0, 0xa) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYRES64=r0, @ANYRES16=0x0, @ANYBLOB="000427bdabc5ff0000005c000180060004004e23000008002f82950e12d57ad088af20125890dfb9080000020000060004004e230000060082003c00000000000300ff0200000000000000000000000000010c000700200000000100000008000b007369700008000b0073697000060004004e23000007ffe900e90a000008000600020000000800040000007e000800040000210000355c9656f35fdeb7bb961620a0dae802be9f8b74623d42c9bd892fae0aca9f4cee9ce3e2f090f7dcdede6da696d02d3c99137bf2594599b85fa71274d6254704d7bbfdc328a68b82cd0aef0f9c79e2ff669f773f1de1675f18b4af2d804e4ca7912750e0ab515aff130f483b9cad80f41ebf4cc9caea11eae445e79c2b60717a98bc5ef854a8052b2b37acfa7277ced458f939ac2ea170d1c1a2e5760428edadf9d905a4b3f09f09881ca89f7f9096d91beffa584b8d2e7cc5102f09d8868d245590f811541c9d52eec7984fd86c"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x20040044) syz_genetlink_get_family_id$nl80211(&(0x7f0000001280), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000001240)='./file0\x00', 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') [ 130.493955] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 11:35:18 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000011c0)={0x1, 0x80, 0xff, 0x20, 0x3f, 0x7f, 0x0, 0x2, 0x5010, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x3e, 0x6}, 0x10000, 0x6, 0x3ec000, 0x8, 0xffffffff, 0x9, 0x4, 0x0, 0x2, 0x0, 0x7}, 0xffffffffffffffff, 0x6, r0, 0xa) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYRES64=r0, @ANYRES16=0x0, @ANYBLOB="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"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x20040044) syz_genetlink_get_family_id$nl80211(&(0x7f0000001280), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000001240)='./file0\x00', 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') 11:35:18 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x0, 0x3, 0x1, 0xff, 0x0, 0xf651, 0x840, 0xf, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000000), 0xe}, 0x104, 0x1, 0x800, 0x4, 0x0, 0x7, 0x3, 0x0, 0x9}, 0x0, 0x8, 0xffffffffffffffff, 0x2) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x80, 0x0, 0x0, 0xffffffffffffffff}}}, 0xb8}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c0000001d0001"], 0x1c}}, 0x0) 11:35:18 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000011c0)={0x1, 0x80, 0xff, 0x20, 0x3f, 0x7f, 0x0, 0x2, 0x5010, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x3e, 0x6}, 0x10000, 0x6, 0x3ec000, 0x8, 0xffffffff, 0x9, 0x4, 0x0, 0x2, 0x0, 0x7}, 0xffffffffffffffff, 0x6, r0, 0xa) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYRES64=r0, @ANYRES16=0x0, @ANYBLOB="000427bdabc5ff0000005c000180060004004e23000008002f82950e12d57ad088af20125890dfb9080000020000060004004e230000060082003c00000000000300ff0200000000000000000000000000010c000700200000000100000008000b007369700008000b0073697000060004004e23000007ffe900e90a000008000600020000000800040000007e000800040000210000355c9656f35fdeb7bb961620a0dae802be9f8b74623d42c9bd892fae0aca9f4cee9ce3e2f090f7dcdede6da696d02d3c99137bf2594599b85fa71274d6254704d7bbfdc328a68b82cd0aef0f9c79e2ff669f773f1de1675f18b4af2d804e4ca7912750e0ab515aff130f483b9cad80f41ebf4cc9caea11eae445e79c2b60717a98bc5ef854a8052b2b37acfa7277ced458f939ac2ea170d1c1a2e5760428edadf9d905a4b3f09f09881ca89f7f9096d91beffa584b8d2e7cc5102f09d8868d245590f811541c9d52eec7984fd86c"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x20040044) syz_genetlink_get_family_id$nl80211(&(0x7f0000001280), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000001240)='./file0\x00', 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') 11:35:18 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000011c0)={0x1, 0x80, 0xff, 0x20, 0x3f, 0x7f, 0x0, 0x2, 0x5010, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x3e, 0x6}, 0x10000, 0x6, 0x3ec000, 0x8, 0xffffffff, 0x9, 0x4, 0x0, 0x2, 0x0, 0x7}, 0xffffffffffffffff, 0x6, r0, 0xa) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYRES64=r0, @ANYRES16=0x0, @ANYBLOB="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"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x20040044) syz_genetlink_get_family_id$nl80211(&(0x7f0000001280), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000001240)='./file0\x00', 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') 11:35:18 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000011c0)={0x1, 0x80, 0xff, 0x20, 0x3f, 0x7f, 0x0, 0x2, 0x5010, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x3e, 0x6}, 0x10000, 0x6, 0x3ec000, 0x8, 0xffffffff, 0x9, 0x4, 0x0, 0x2, 0x0, 0x7}, 0xffffffffffffffff, 0x6, r0, 0xa) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYRES64=r0, @ANYRES16=0x0, @ANYBLOB="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"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x20040044) syz_genetlink_get_family_id$nl80211(&(0x7f0000001280), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000001240)='./file0\x00', 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') 11:35:18 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000011c0)={0x1, 0x80, 0xff, 0x20, 0x3f, 0x7f, 0x0, 0x2, 0x5010, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x3e, 0x6}, 0x10000, 0x6, 0x3ec000, 0x8, 0xffffffff, 0x9, 0x4, 0x0, 0x2, 0x0, 0x7}, 0xffffffffffffffff, 0x6, r0, 0xa) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYRES64=r0, @ANYRES16=0x0, @ANYBLOB="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"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x20040044) syz_genetlink_get_family_id$nl80211(&(0x7f0000001280), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000001240)='./file0\x00', 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') 11:35:18 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000011c0)={0x1, 0x80, 0xff, 0x20, 0x3f, 0x7f, 0x0, 0x2, 0x5010, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x3e, 0x6}, 0x10000, 0x6, 0x3ec000, 0x8, 0xffffffff, 0x9, 0x4, 0x0, 0x2, 0x0, 0x7}, 0xffffffffffffffff, 0x6, r0, 0xa) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYRES64=r0, @ANYRES16=0x0, @ANYBLOB="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"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x20040044) syz_genetlink_get_family_id$nl80211(&(0x7f0000001280), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000001240)='./file0\x00', 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') 11:35:18 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000011c0)={0x1, 0x80, 0xff, 0x20, 0x3f, 0x7f, 0x0, 0x2, 0x5010, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x3e, 0x6}, 0x10000, 0x6, 0x3ec000, 0x8, 0xffffffff, 0x9, 0x4, 0x0, 0x2, 0x0, 0x7}, 0xffffffffffffffff, 0x6, r0, 0xa) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYRES64=r0, @ANYRES16=0x0, @ANYBLOB="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"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x20040044) syz_genetlink_get_family_id$nl80211(&(0x7f0000001280), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000001240)='./file0\x00', 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') 11:35:18 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000011c0)={0x1, 0x80, 0xff, 0x20, 0x3f, 0x7f, 0x0, 0x2, 0x5010, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x3e, 0x6}, 0x10000, 0x6, 0x3ec000, 0x8, 0xffffffff, 0x9, 0x4, 0x0, 0x2, 0x0, 0x7}, 0xffffffffffffffff, 0x6, r0, 0xa) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYRES64=r0, @ANYRES16=0x0, @ANYBLOB="000427bdabc5ff0000005c000180060004004e23000008002f82950e12d57ad088af20125890dfb9080000020000060004004e230000060082003c00000000000300ff0200000000000000000000000000010c000700200000000100000008000b007369700008000b0073697000060004004e23000007ffe900e90a000008000600020000000800040000007e000800040000210000355c9656f35fdeb7bb961620a0dae802be9f8b74623d42c9bd892fae0aca9f4cee9ce3e2f090f7dcdede6da696d02d3c99137bf2594599b85fa71274d6254704d7bbfdc328a68b82cd0aef0f9c79e2ff669f773f1de1675f18b4af2d804e4ca7912750e0ab515aff130f483b9cad80f41ebf4cc9caea11eae445e79c2b60717a98bc5ef854a8052b2b37acfa7277ced458f939ac2ea170d1c1a2e5760428edadf9d905a4b3f09f09881ca89f7f9096d91beffa584b8d2e7cc5102f09d8868d245590f811541c9d52eec7984fd86c"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x20040044) syz_genetlink_get_family_id$nl80211(&(0x7f0000001280), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000001240)='./file0\x00', 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') 11:35:19 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000011c0)={0x1, 0x80, 0xff, 0x20, 0x3f, 0x7f, 0x0, 0x2, 0x5010, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x3e, 0x6}, 0x10000, 0x6, 0x3ec000, 0x8, 0xffffffff, 0x9, 0x4, 0x0, 0x2, 0x0, 0x7}, 0xffffffffffffffff, 0x6, r0, 0xa) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYRES64=r0, @ANYRES16=0x0, @ANYBLOB="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"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x20040044) syz_genetlink_get_family_id$nl80211(&(0x7f0000001280), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000001240)='./file0\x00', 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') 11:35:19 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000011c0)={0x1, 0x80, 0xff, 0x20, 0x3f, 0x7f, 0x0, 0x2, 0x5010, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x3e, 0x6}, 0x10000, 0x6, 0x3ec000, 0x8, 0xffffffff, 0x9, 0x4, 0x0, 0x2, 0x0, 0x7}, 0xffffffffffffffff, 0x6, r0, 0xa) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYRES64=r0, @ANYRES16=0x0, @ANYBLOB="000427bdabc5ff0000005c000180060004004e23000008002f82950e12d57ad088af20125890dfb9080000020000060004004e230000060082003c00000000000300ff0200000000000000000000000000010c000700200000000100000008000b007369700008000b0073697000060004004e23000007ffe900e90a000008000600020000000800040000007e000800040000210000355c9656f35fdeb7bb961620a0dae802be9f8b74623d42c9bd892fae0aca9f4cee9ce3e2f090f7dcdede6da696d02d3c99137bf2594599b85fa71274d6254704d7bbfdc328a68b82cd0aef0f9c79e2ff669f773f1de1675f18b4af2d804e4ca7912750e0ab515aff130f483b9cad80f41ebf4cc9caea11eae445e79c2b60717a98bc5ef854a8052b2b37acfa7277ced458f939ac2ea170d1c1a2e5760428edadf9d905a4b3f09f09881ca89f7f9096d91beffa584b8d2e7cc5102f09d8868d245590f811541c9d52eec7984fd86c"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x20040044) syz_genetlink_get_family_id$nl80211(&(0x7f0000001280), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000001240)='./file0\x00', 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') 11:35:19 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000011c0)={0x1, 0x80, 0xff, 0x20, 0x3f, 0x7f, 0x0, 0x2, 0x5010, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x3e, 0x6}, 0x10000, 0x6, 0x3ec000, 0x8, 0xffffffff, 0x9, 0x4, 0x0, 0x2, 0x0, 0x7}, 0xffffffffffffffff, 0x6, r0, 0xa) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYRES64=r0, @ANYRES16=0x0, @ANYBLOB="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"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x20040044) syz_genetlink_get_family_id$nl80211(&(0x7f0000001280), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000001240)='./file0\x00', 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') 11:35:19 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000011c0)={0x1, 0x80, 0xff, 0x20, 0x3f, 0x7f, 0x0, 0x2, 0x5010, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x3e, 0x6}, 0x10000, 0x6, 0x3ec000, 0x8, 0xffffffff, 0x9, 0x4, 0x0, 0x2, 0x0, 0x7}, 0xffffffffffffffff, 0x6, r0, 0xa) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYRES64=r0, @ANYRES16=0x0, @ANYBLOB="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"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x20040044) syz_genetlink_get_family_id$nl80211(&(0x7f0000001280), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000001240)='./file0\x00', 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') 11:35:19 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000011c0)={0x1, 0x80, 0xff, 0x20, 0x3f, 0x7f, 0x0, 0x2, 0x5010, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x3e, 0x6}, 0x10000, 0x6, 0x3ec000, 0x8, 0xffffffff, 0x9, 0x4, 0x0, 0x2, 0x0, 0x7}, 0xffffffffffffffff, 0x6, r0, 0xa) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYRES64=r0, @ANYRES16=0x0, @ANYBLOB="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"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x20040044) syz_genetlink_get_family_id$nl80211(&(0x7f0000001280), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000001240)='./file0\x00', 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') 11:35:19 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000140), 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r1, &(0x7f0000000340)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x24048800) sendmmsg$inet(r1, &(0x7f0000001200)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000800)={0x2, 0x0, @local}, 0x10, 0x0}}], 0x2, 0x8001) r2 = epoll_create(0x4) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000000200), 0x8, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000240)={0x20000000}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000000)) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000040)) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f0000001700)={0x0, 0x0, 0x0, 0x7, 0xffffffffffffff37, 0x0, 0x12, 0xc, 0x0, "23c2d80353e2f6a33c3e59015505ac0d65bc8b584c0564cf1252925367d826dee4aed502dc498a3d5c028f7b69f143afd05a4631a6ae553f096dd6e8a33af795", "970da5fd2a5ca37306ba38b5bc51fbc98a6fdf16294e20401cf1632175cc9150dad985aa02040d9d566fd3881b67dd89a5da4c3da629ed5abc60dce05e0c79f8", "367043bc1c4a0680996102355937587a7b0008000000000000035f223600", [0x1a5, 0x1]}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000180)={0x0, {}, 0x0, {}, 0xffffffff, 0x12, 0x9, 0x18, "0c085ee0d43737c7cce643311ec9d0b00b3e0eb0fd5250c5cd319444c5638d84f87683c5b18016b00b3a518f9239394dfd4370da74470a7db67281a92b689c2b", "f0f8f1a18f98bc2c801089c9c49ed0283be50f8eafce21d32f972cf2a96eed7d", [0x7]}) recvmsg$unix(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f0000000240), 0x6e, &(0x7f0000001600)=[{&(0x7f00000002c0)=""/68, 0x44}, {&(0x7f0000000340)=""/228, 0xe4}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000000100)=""/5, 0x5}, {&(0x7f0000001440)=""/243, 0xf3}, {&(0x7f0000001540)=""/138, 0x8a}], 0x6, &(0x7f0000001680)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38}, 0x3) ioctl$LOOP_CLR_FD(r4, 0x4c01) write$P9_RFLUSH(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_complete(0x0) 11:35:19 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) recvfrom(r0, 0x0, 0x0, 0x40, 0x0, 0x0) 11:35:19 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000140), 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r1, &(0x7f0000000340)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x24048800) sendmmsg$inet(r1, &(0x7f0000001200)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000800)={0x2, 0x0, @local}, 0x10, 0x0}}], 0x2, 0x8001) r2 = epoll_create(0x4) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000000200), 0x8, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000240)={0x20000000}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000000)) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000040)) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f0000001700)={0x0, 0x0, 0x0, 0x7, 0xffffffffffffff37, 0x0, 0x12, 0xc, 0x0, "23c2d80353e2f6a33c3e59015505ac0d65bc8b584c0564cf1252925367d826dee4aed502dc498a3d5c028f7b69f143afd05a4631a6ae553f096dd6e8a33af795", "970da5fd2a5ca37306ba38b5bc51fbc98a6fdf16294e20401cf1632175cc9150dad985aa02040d9d566fd3881b67dd89a5da4c3da629ed5abc60dce05e0c79f8", "367043bc1c4a0680996102355937587a7b0008000000000000035f223600", [0x1a5, 0x1]}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000180)={0x0, {}, 0x0, {}, 0xffffffff, 0x12, 0x9, 0x18, "0c085ee0d43737c7cce643311ec9d0b00b3e0eb0fd5250c5cd319444c5638d84f87683c5b18016b00b3a518f9239394dfd4370da74470a7db67281a92b689c2b", "f0f8f1a18f98bc2c801089c9c49ed0283be50f8eafce21d32f972cf2a96eed7d", [0x7]}) recvmsg$unix(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f0000000240), 0x6e, &(0x7f0000001600)=[{&(0x7f00000002c0)=""/68, 0x44}, {&(0x7f0000000340)=""/228, 0xe4}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000000100)=""/5, 0x5}, {&(0x7f0000001440)=""/243, 0xf3}, {&(0x7f0000001540)=""/138, 0x8a}], 0x6, &(0x7f0000001680)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38}, 0x3) ioctl$LOOP_CLR_FD(r4, 0x4c01) write$P9_RFLUSH(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_complete(0x0) 11:35:19 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r0, 0x29, 0x50, 0x0, &(0x7f0000000080)=0x1b000000) 11:35:19 executing program 2: setresuid(0xee00, 0xee00, 0x0) keyctl$clear(0x7, 0x0) 11:35:19 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140), 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r1, &(0x7f0000000340)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x24048800) sendmmsg$inet(r1, &(0x7f0000001200)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000800)={0x2, 0x0, @local}, 0x10, 0x0}}], 0x2, 0x8001) r2 = epoll_create(0x4) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000000200), 0x8, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000240)={0x20000000}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000000)) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000040)) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f0000001700)={0x0, 0x0, 0x0, 0x7, 0xffffffffffffff37, 0x0, 0x12, 0xc, 0x0, "23c2d80353e2f6a33c3e59015505ac0d65bc8b584c0564cf1252925367d826dee4aed502dc498a3d5c028f7b69f143afd05a4631a6ae553f096dd6e8a33af795", "970da5fd2a5ca37306ba38b5bc51fbc98a6fdf16294e20401cf1632175cc9150dad985aa02040d9d566fd3881b67dd89a5da4c3da629ed5abc60dce05e0c79f8", "367043bc1c4a0680996102355937587a7b0008000000000000035f223600", [0x1a5, 0x1]}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000180)={0x0, {}, 0x0, {}, 0xffffffff, 0x12, 0x9, 0x18, "0c085ee0d43737c7cce643311ec9d0b00b3e0eb0fd5250c5cd319444c5638d84f87683c5b18016b00b3a518f9239394dfd4370da74470a7db67281a92b689c2b", "f0f8f1a18f98bc2c801089c9c49ed0283be50f8eafce21d32f972cf2a96eed7d", [0x7]}) recvmsg$unix(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f0000000240), 0x6e, &(0x7f0000001600)=[{&(0x7f00000002c0)=""/68, 0x44}, {&(0x7f0000000340)=""/228, 0xe4}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000000100)=""/5, 0x5}, {&(0x7f0000001440)=""/243, 0xf3}, {&(0x7f0000001540)=""/138, 0x8a}], 0x6, &(0x7f0000001680)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38}, 0x3) ioctl$LOOP_CLR_FD(r4, 0x4c01) write$P9_RFLUSH(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_complete(0x0) 11:35:19 executing program 7: accept(0xffffffffffffffff, 0x0, 0x0) 11:35:20 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r0, 0x29, 0x50, 0x0, &(0x7f0000000080)=0x1b000000) 11:35:20 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$sock(r0, &(0x7f00000038c0)=[{{&(0x7f00000036c0)=@in={0xa, 0x4e23, @local}, 0x80, 0x0}}], 0x1, 0x4c804) sendmmsg$inet6(r0, &(0x7f0000001140)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000000c0)={0xa, 0x4e22, 0x0, @local, 0x9}, 0x1c, 0x0, 0x0, &(0x7f0000000540)=[@pktinfo={{0x24, 0x29, 0x32, {@mcast2}}}], 0x28}}], 0x2, 0x0) 11:35:20 executing program 7: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000100), 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, 0x0) 11:35:20 executing program 2: setresuid(0xee00, 0xee00, 0x0) keyctl$clear(0x7, 0x0) 11:35:20 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140), 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r1, &(0x7f0000000340)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x24048800) sendmmsg$inet(r1, &(0x7f0000001200)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000800)={0x2, 0x0, @local}, 0x10, 0x0}}], 0x2, 0x8001) r2 = epoll_create(0x4) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000000200), 0x8, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000240)={0x20000000}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000000)) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000040)) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f0000001700)={0x0, 0x0, 0x0, 0x7, 0xffffffffffffff37, 0x0, 0x12, 0xc, 0x0, "23c2d80353e2f6a33c3e59015505ac0d65bc8b584c0564cf1252925367d826dee4aed502dc498a3d5c028f7b69f143afd05a4631a6ae553f096dd6e8a33af795", "970da5fd2a5ca37306ba38b5bc51fbc98a6fdf16294e20401cf1632175cc9150dad985aa02040d9d566fd3881b67dd89a5da4c3da629ed5abc60dce05e0c79f8", "367043bc1c4a0680996102355937587a7b0008000000000000035f223600", [0x1a5, 0x1]}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000180)={0x0, {}, 0x0, {}, 0xffffffff, 0x12, 0x9, 0x18, "0c085ee0d43737c7cce643311ec9d0b00b3e0eb0fd5250c5cd319444c5638d84f87683c5b18016b00b3a518f9239394dfd4370da74470a7db67281a92b689c2b", "f0f8f1a18f98bc2c801089c9c49ed0283be50f8eafce21d32f972cf2a96eed7d", [0x7]}) recvmsg$unix(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f0000000240), 0x6e, &(0x7f0000001600)=[{&(0x7f00000002c0)=""/68, 0x44}, {&(0x7f0000000340)=""/228, 0xe4}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000000100)=""/5, 0x5}, {&(0x7f0000001440)=""/243, 0xf3}, {&(0x7f0000001540)=""/138, 0x8a}], 0x6, &(0x7f0000001680)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38}, 0x3) ioctl$LOOP_CLR_FD(r4, 0x4c01) write$P9_RFLUSH(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_complete(0x0) 11:35:20 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000140), 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r1, &(0x7f0000000340)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x24048800) sendmmsg$inet(r1, &(0x7f0000001200)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000800)={0x2, 0x0, @local}, 0x10, 0x0}}], 0x2, 0x8001) r2 = epoll_create(0x4) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000000200), 0x8, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000240)={0x20000000}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000000)) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000040)) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f0000001700)={0x0, 0x0, 0x0, 0x7, 0xffffffffffffff37, 0x0, 0x12, 0xc, 0x0, "23c2d80353e2f6a33c3e59015505ac0d65bc8b584c0564cf1252925367d826dee4aed502dc498a3d5c028f7b69f143afd05a4631a6ae553f096dd6e8a33af795", "970da5fd2a5ca37306ba38b5bc51fbc98a6fdf16294e20401cf1632175cc9150dad985aa02040d9d566fd3881b67dd89a5da4c3da629ed5abc60dce05e0c79f8", "367043bc1c4a0680996102355937587a7b0008000000000000035f223600", [0x1a5, 0x1]}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000180)={0x0, {}, 0x0, {}, 0xffffffff, 0x12, 0x9, 0x18, "0c085ee0d43737c7cce643311ec9d0b00b3e0eb0fd5250c5cd319444c5638d84f87683c5b18016b00b3a518f9239394dfd4370da74470a7db67281a92b689c2b", "f0f8f1a18f98bc2c801089c9c49ed0283be50f8eafce21d32f972cf2a96eed7d", [0x7]}) recvmsg$unix(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f0000000240), 0x6e, &(0x7f0000001600)=[{&(0x7f00000002c0)=""/68, 0x44}, {&(0x7f0000000340)=""/228, 0xe4}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000000100)=""/5, 0x5}, {&(0x7f0000001440)=""/243, 0xf3}, {&(0x7f0000001540)=""/138, 0x8a}], 0x6, &(0x7f0000001680)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38}, 0x3) ioctl$LOOP_CLR_FD(r4, 0x4c01) write$P9_RFLUSH(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_complete(0x0) 11:35:20 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000140), 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r1, &(0x7f0000000340)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x24048800) sendmmsg$inet(r1, &(0x7f0000001200)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000800)={0x2, 0x0, @local}, 0x10, 0x0}}], 0x2, 0x8001) r2 = epoll_create(0x4) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000000200), 0x8, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000240)={0x20000000}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000000)) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000040)) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f0000001700)={0x0, 0x0, 0x0, 0x7, 0xffffffffffffff37, 0x0, 0x12, 0xc, 0x0, "23c2d80353e2f6a33c3e59015505ac0d65bc8b584c0564cf1252925367d826dee4aed502dc498a3d5c028f7b69f143afd05a4631a6ae553f096dd6e8a33af795", "970da5fd2a5ca37306ba38b5bc51fbc98a6fdf16294e20401cf1632175cc9150dad985aa02040d9d566fd3881b67dd89a5da4c3da629ed5abc60dce05e0c79f8", "367043bc1c4a0680996102355937587a7b0008000000000000035f223600", [0x1a5, 0x1]}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000180)={0x0, {}, 0x0, {}, 0xffffffff, 0x12, 0x9, 0x18, "0c085ee0d43737c7cce643311ec9d0b00b3e0eb0fd5250c5cd319444c5638d84f87683c5b18016b00b3a518f9239394dfd4370da74470a7db67281a92b689c2b", "f0f8f1a18f98bc2c801089c9c49ed0283be50f8eafce21d32f972cf2a96eed7d", [0x7]}) recvmsg$unix(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f0000000240), 0x6e, &(0x7f0000001600)=[{&(0x7f00000002c0)=""/68, 0x44}, {&(0x7f0000000340)=""/228, 0xe4}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000000100)=""/5, 0x5}, {&(0x7f0000001440)=""/243, 0xf3}, {&(0x7f0000001540)=""/138, 0x8a}], 0x6, &(0x7f0000001680)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38}, 0x3) ioctl$LOOP_CLR_FD(r4, 0x4c01) write$P9_RFLUSH(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_complete(0x0) 11:35:20 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r0, 0x29, 0x50, 0x0, &(0x7f0000000080)=0x1b000000) 11:35:20 executing program 2: setresuid(0xee00, 0xee00, 0x0) keyctl$clear(0x7, 0x0) 11:35:20 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000140), 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r1, &(0x7f0000000340)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x24048800) sendmmsg$inet(r1, &(0x7f0000001200)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000800)={0x2, 0x0, @local}, 0x10, 0x0}}], 0x2, 0x8001) r2 = epoll_create(0x4) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000000200), 0x8, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000240)={0x20000000}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000000)) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000040)) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f0000001700)={0x0, 0x0, 0x0, 0x7, 0xffffffffffffff37, 0x0, 0x12, 0xc, 0x0, "23c2d80353e2f6a33c3e59015505ac0d65bc8b584c0564cf1252925367d826dee4aed502dc498a3d5c028f7b69f143afd05a4631a6ae553f096dd6e8a33af795", "970da5fd2a5ca37306ba38b5bc51fbc98a6fdf16294e20401cf1632175cc9150dad985aa02040d9d566fd3881b67dd89a5da4c3da629ed5abc60dce05e0c79f8", "367043bc1c4a0680996102355937587a7b0008000000000000035f223600", [0x1a5, 0x1]}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000180)={0x0, {}, 0x0, {}, 0xffffffff, 0x12, 0x9, 0x18, "0c085ee0d43737c7cce643311ec9d0b00b3e0eb0fd5250c5cd319444c5638d84f87683c5b18016b00b3a518f9239394dfd4370da74470a7db67281a92b689c2b", "f0f8f1a18f98bc2c801089c9c49ed0283be50f8eafce21d32f972cf2a96eed7d", [0x7]}) recvmsg$unix(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f0000000240), 0x6e, &(0x7f0000001600)=[{&(0x7f00000002c0)=""/68, 0x44}, {&(0x7f0000000340)=""/228, 0xe4}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000000100)=""/5, 0x5}, {&(0x7f0000001440)=""/243, 0xf3}, {&(0x7f0000001540)=""/138, 0x8a}], 0x6, &(0x7f0000001680)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38}, 0x3) ioctl$LOOP_CLR_FD(r4, 0x4c01) write$P9_RFLUSH(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_complete(0x0) 11:35:20 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x9, &(0x7f0000000140)=0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x1, 0x80, 0x0, 0xf7, 0x0, 0x0, 0x82000, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xa93, 0x2, @perf_bp={&(0x7f0000000180), 0x4}, 0x2000, 0xed, 0xb7c00, 0x2, 0x1, 0x4, 0x8001, 0x0, 0x3ff, 0x0, 0x401}, 0xffffffffffffffff, 0x6, r0, 0x0) io_submit(r1, 0x1, &(0x7f00000005c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f00000001c0)=')', 0x1}]) r3 = eventfd2(0x7, 0x0) sendfile(r2, r3, &(0x7f0000000340)=0x5, 0x400) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r5) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r6, &(0x7f0000000080)="01", 0x41030) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) read$hiddev(r4, &(0x7f0000000040)=""/169, 0x200000e9) 11:35:20 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000140), 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r1, &(0x7f0000000340)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x24048800) sendmmsg$inet(r1, &(0x7f0000001200)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000800)={0x2, 0x0, @local}, 0x10, 0x0}}], 0x2, 0x8001) r2 = epoll_create(0x4) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000000200), 0x8, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000240)={0x20000000}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000000)) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000040)) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f0000001700)={0x0, 0x0, 0x0, 0x7, 0xffffffffffffff37, 0x0, 0x12, 0xc, 0x0, "23c2d80353e2f6a33c3e59015505ac0d65bc8b584c0564cf1252925367d826dee4aed502dc498a3d5c028f7b69f143afd05a4631a6ae553f096dd6e8a33af795", "970da5fd2a5ca37306ba38b5bc51fbc98a6fdf16294e20401cf1632175cc9150dad985aa02040d9d566fd3881b67dd89a5da4c3da629ed5abc60dce05e0c79f8", "367043bc1c4a0680996102355937587a7b0008000000000000035f223600", [0x1a5, 0x1]}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000180)={0x0, {}, 0x0, {}, 0xffffffff, 0x12, 0x9, 0x18, "0c085ee0d43737c7cce643311ec9d0b00b3e0eb0fd5250c5cd319444c5638d84f87683c5b18016b00b3a518f9239394dfd4370da74470a7db67281a92b689c2b", "f0f8f1a18f98bc2c801089c9c49ed0283be50f8eafce21d32f972cf2a96eed7d", [0x7]}) recvmsg$unix(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f0000000240), 0x6e, &(0x7f0000001600)=[{&(0x7f00000002c0)=""/68, 0x44}, {&(0x7f0000000340)=""/228, 0xe4}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000000100)=""/5, 0x5}, {&(0x7f0000001440)=""/243, 0xf3}, {&(0x7f0000001540)=""/138, 0x8a}], 0x6, &(0x7f0000001680)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38}, 0x3) ioctl$LOOP_CLR_FD(r4, 0x4c01) write$P9_RFLUSH(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_complete(0x0) 11:35:20 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140), 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r1, &(0x7f0000000340)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x24048800) sendmmsg$inet(r1, &(0x7f0000001200)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000800)={0x2, 0x0, @local}, 0x10, 0x0}}], 0x2, 0x8001) r2 = epoll_create(0x4) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000000200), 0x8, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000240)={0x20000000}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000000)) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000040)) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f0000001700)={0x0, 0x0, 0x0, 0x7, 0xffffffffffffff37, 0x0, 0x12, 0xc, 0x0, "23c2d80353e2f6a33c3e59015505ac0d65bc8b584c0564cf1252925367d826dee4aed502dc498a3d5c028f7b69f143afd05a4631a6ae553f096dd6e8a33af795", "970da5fd2a5ca37306ba38b5bc51fbc98a6fdf16294e20401cf1632175cc9150dad985aa02040d9d566fd3881b67dd89a5da4c3da629ed5abc60dce05e0c79f8", "367043bc1c4a0680996102355937587a7b0008000000000000035f223600", [0x1a5, 0x1]}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000180)={0x0, {}, 0x0, {}, 0xffffffff, 0x12, 0x9, 0x18, "0c085ee0d43737c7cce643311ec9d0b00b3e0eb0fd5250c5cd319444c5638d84f87683c5b18016b00b3a518f9239394dfd4370da74470a7db67281a92b689c2b", "f0f8f1a18f98bc2c801089c9c49ed0283be50f8eafce21d32f972cf2a96eed7d", [0x7]}) recvmsg$unix(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f0000000240), 0x6e, &(0x7f0000001600)=[{&(0x7f00000002c0)=""/68, 0x44}, {&(0x7f0000000340)=""/228, 0xe4}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000000100)=""/5, 0x5}, {&(0x7f0000001440)=""/243, 0xf3}, {&(0x7f0000001540)=""/138, 0x8a}], 0x6, &(0x7f0000001680)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38}, 0x3) ioctl$LOOP_CLR_FD(r4, 0x4c01) write$P9_RFLUSH(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_complete(0x0) 11:35:20 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$sock(r0, &(0x7f00000038c0)=[{{&(0x7f00000036c0)=@in={0xa, 0x4e23, @local}, 0x80, 0x0}}], 0x1, 0x4c804) sendmmsg$inet6(r0, &(0x7f0000001140)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000000c0)={0xa, 0x4e22, 0x0, @local, 0x9}, 0x1c, 0x0, 0x0, &(0x7f0000000540)=[@pktinfo={{0x24, 0x29, 0x32, {@mcast2}}}], 0x28}}], 0x2, 0x0) 11:35:20 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r0, 0x29, 0x50, 0x0, &(0x7f0000000080)=0x1b000000) 11:35:20 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$sock(r0, &(0x7f00000038c0)=[{{&(0x7f00000036c0)=@in={0xa, 0x4e23, @local}, 0x80, 0x0}}], 0x1, 0x4c804) sendmmsg$inet6(r0, &(0x7f0000001140)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000000c0)={0xa, 0x4e22, 0x0, @local, 0x9}, 0x1c, 0x0, 0x0, &(0x7f0000000540)=[@pktinfo={{0x24, 0x29, 0x32, {@mcast2}}}], 0x28}}], 0x2, 0x0) 11:35:20 executing program 2: setresuid(0xee00, 0xee00, 0x0) keyctl$clear(0x7, 0x0) 11:35:20 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x4) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000200), 0x8, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000240)={0xa0002000}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r2, 0x40045431, &(0x7f0000000040)) ioctl$TIOCGPTPEER(r2, 0x5441, 0x0) io_submit(0x0, 0x0, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f00000004c0), 0x80000, 0x0) lseek(0xffffffffffffffff, 0xfffffffffffffff7, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0xd29) 11:35:20 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$sock(r0, &(0x7f00000038c0)=[{{&(0x7f00000036c0)=@in={0xa, 0x4e23, @local}, 0x80, 0x0}}], 0x1, 0x4c804) sendmmsg$inet6(r0, &(0x7f0000001140)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000000c0)={0xa, 0x4e22, 0x0, @local, 0x9}, 0x1c, 0x0, 0x0, &(0x7f0000000540)=[@pktinfo={{0x24, 0x29, 0x32, {@mcast2}}}], 0x28}}], 0x2, 0x0) 11:35:20 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000, 0x81}, 0x703, 0x0, 0x0, 0x9, 0x7}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000011c0)="25f603b7fa9fa3548414f40992c1cf45f19705c7eee437fda4265b7eb2e7bb1ca4ec9b16e7d8334d052aeb04b0d5037a01019288274bf0cb88e4b0d450527f3e3100845f824bd7c768b941db8d3d5f400ea29894fe6bc6553b229e9e616dbeb1b077c3ff25d19fa7ce2453d6417761", 0x6f) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) fcntl$dupfd(r0, 0x0, r1) write(r1, &(0x7f0000000080)="01", 0x41030) close(r1) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) r2 = creat(&(0x7f0000000100)='./file0/file0\x00', 0xa) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x40, 0x13d) r3 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x4883, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) readahead(r3, 0x1, 0x3) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r2, 0xf501, 0x0) 11:35:20 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000380)={@desc={0x1, 0x0, @desc4}, 0x21, r0, '\x00', @c}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) write$binfmt_aout(r2, &(0x7f0000000c40)=ANY=[], 0x820) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x4, 0x80, 0x0, 0x8, 0x5, 0x40, 0x0, 0x2000000000000, 0xa0600, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000140), 0x4}, 0x10a46, 0xe4, 0x7, 0x0, 0x7, 0xffff, 0x1, 0x0, 0x9, 0x0, 0x169}, r2, 0x3, 0xffffffffffffffff, 0xf) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000000)) ioctl$BTRFS_IOC_QUOTA_RESCAN(r4, 0x4040942c, &(0x7f0000000040)={0x0, 0xf, [0x2, 0x156280000000000, 0x8001, 0x1, 0x7a]}) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r5, 0x4004662b, &(0x7f0000000340)) 11:35:20 executing program 3: sendmmsg(0xffffffffffffffff, &(0x7f0000001500)=[{{&(0x7f0000000c00)=@pppoe={0x18, 0x0, {0x0, @broadcast, 'team_slave_1\x00'}}, 0x80, 0x0}}], 0x1, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg(r0, &(0x7f0000001500)=[{{&(0x7f0000000c00)=@un=@abs, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000c80)="6f11337d", 0x4}], 0x1}}], 0x1, 0x0) [ 132.805847] audit: type=1400 audit(1663241721.015:11): avc: denied { write } for pid=4125 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 11:35:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x10000, 0x1d, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a090000000000000000", 0x80, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f00"/64, 0x40, 0x4e0}, {&(0x7f00000100c0)="0100000000000000000000000000000000000000040100001200000000000000", 0x20, 0x560}, {&(0x7f00000100e0)="0000000000000000000000000000000000000000010400"/32, 0x20, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b00000000", 0x60, 0x7e0}, {&(0x7f0000010160)="ffff05000c000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b000000dc030a026c6f73742b666f756e6400"/1088, 0x440, 0xc00}, {&(0x7f00000105a0)="0000000000000000000000000000000000000000000000000c0000de46b807b70b0000000c0001022e00000002000000e80302022e2e00"/64, 0x40, 0x13e0}, {&(0x7f00000105e0)="0000000000000000000000000000000000000000000000000c0000de5551aadd00000000f40300"/64, 0x40, 0x17e0}, {&(0x7f0000010620)="0000000000000000000000000000000000000000000000000c0000de2b607f2900000000f40300"/64, 0x40, 0x1be0}, {&(0x7f0000010660)="0000000000000000000000000000000000000000000000000c0000de2b607f2900000000f40300"/64, 0x40, 0x1fe0}, {&(0x7f00000106a0)="0000000000000000000000000000000000000000000000000c0000de2b607f2900000000f40300"/64, 0x40, 0x23e0}, {&(0x7f00000106e0)="0000000000000000000000000000000000000000000000000c0000de2b607f2900000000f40300"/64, 0x40, 0x27e0}, {&(0x7f0000010720)="0000000000000000000000000000000000000000000000000c0000de2b607f2900000000f40300"/64, 0x40, 0x2be0}, {&(0x7f0000010760)="0000000000000000000000000000000000000000000000000c0000de2b607f2900000000f40300"/64, 0x40, 0x2fe0}, {&(0x7f00000107a0)="0000000000000000000000000000000000000000000000000c0000de2b607f2900000000f40300"/64, 0x40, 0x33e0}, {&(0x7f00000107e0)="0000000000000000000000000000000000000000000000000c0000de2b607f2900000000f40300"/64, 0x40, 0x37e0}, {&(0x7f0000010820)="0000000000000000000000000000000000000000000000000c0000de2b607f2900000000f40300"/64, 0x40, 0x3be0}, {&(0x7f0000010860)="0000000000000000000000000000000000000000000000000c0000de2b607f2900000000f40300"/64, 0x40, 0x3fe0}, {&(0x7f00000108a0)="0000000000000000000000000000000000000000000000000c0000de2b607f29", 0x20, 0x43e0}, {&(0x7f00000108c0)="ff07ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0x4c00}, {&(0x7f0000010cc0)="00000000000000009f09c75f9f09c75f9f09c75f00"/32, 0x20, 0x8c00}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005c1f0000", 0xa0, 0x8c60}, {&(0x7f0000010d80)="00000000000000000000000000000000000000000000000000000000acff0000", 0x20, 0x8d60}, {&(0x7f0000010da0)="000000000000000000000000000000000000000000000000000000000ee30000", 0x20, 0x8de0}, {&(0x7f0000010dc0)="00000000000000000000000000000000000000000000000000000000ce1e0000", 0x20, 0x8e60}, {&(0x7f0000010de0)="000000000000000000000000000000000000000000000000000000007f6e000080810000003004049f09c75f9f09c75f9f09c75f000000000000010002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000110000000000000000000000000000000000000000000000000000000000000005620000", 0xa0, 0x8ee0}, {&(0x7f0000010e80)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00;W\x00\x00', 0x20, 0x8fe0}, {&(0x7f0000010ea0)="00000000000000000000000000000000000000000000000000000000fbaa0000", 0x20, 0x9060}, {&(0x7f0000010ec0)="000000000000000000000000000000000000000000000000000000004ada0000c0410000003000009f09c75f9f09c75f9f09c75f00000000000002001800000000000800000000000af301000400000000000000000000000c0000000500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070fa0000", 0xa0, 0x90e0}], 0x0, &(0x7f0000010f60)) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000140)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000500)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f0000000540)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000580)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f00000005c0)='foo', 0x3) 11:35:21 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020801000270008000f801", 0x17}], 0x0, &(0x7f00000006c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000000c0)={0x0, 0x1121}) [ 132.890107] loop1: detected capacity change from 0 to 144 11:35:21 executing program 3: sendmmsg(0xffffffffffffffff, &(0x7f0000001500)=[{{&(0x7f0000000c00)=@pppoe={0x18, 0x0, {0x0, @broadcast, 'team_slave_1\x00'}}, 0x80, 0x0}}], 0x1, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg(r0, &(0x7f0000001500)=[{{&(0x7f0000000c00)=@un=@abs, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000c80)="6f11337d", 0x4}], 0x1}}], 0x1, 0x0) 11:35:21 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x2) getpid() ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000540)={'\x00', 0x2, 0xcc, 0xfffffffb, 0xffffffff, 0x7}) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000680), 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r0) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000004c0)) r1 = syz_io_uring_setup(0x2971, &(0x7f0000000200)={0x0, 0xdd89, 0x2, 0x2, 0x392}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000140), &(0x7f0000000400)) sendfile(r0, r1, &(0x7f0000000100)=0xfffffffffffffe00, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 133.306149] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: none. [ 133.309095] ext4 filesystem being mounted at /syzkaller-testdir113138882/syzkaller.9hxzu5/7/mnt supports timestamps until 2038 (0x7fffffff) [ 133.485659] EXT4-fs (loop1): unmounting filesystem. VM DIAGNOSIS: 11:35:12 Registers: info registers vcpu 0 RAX=dffffc0000000000 RBX=ffff8880174b9ac0 RCX=0000000000010000 RDX=1ffff11002801502 RSI=0000000000000002 RDI=ffff88801400a810 RBP=ffff88801400a800 RSP=ffff88806ce09d60 R8 =0000000000000007 R9 =0000000000000000 R10=0000000000000000 R11=0000000000000001 R12=0000000000000002 R13=00000000000f4240 R14=ffff88801009dfb8 R15=0000000000000001 RIP=ffffffff8127b88e RFL=00000046 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000555555b87400 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f3d204606f4 CR3=000000000de84000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 00007f3d2046f470 00007f3d2046ef20 YMM02=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM03=0000000000000000 0000000000000000 756e20796d6d7564 20736e6f6974706f YMM04=0000000000000000 0000000000000000 2f2f2f2f2f2f2f2f 2f2f2f2f2f2f2f2f YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 73253d656d616e6c 6165722073253d73 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=000000000000002f RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff822b29f1 RDI=ffffffff87641ba0 RBP=ffffffff87641b60 RSP=ffff88803f27f698 R8 =0000000000000001 R9 =000000000000000a R10=000000000000002f R11=0000000000000001 R12=000000000000002f R13=ffffffff87641b60 R14=0000000000000010 R15=ffffffff822b29e0 RIP=ffffffff822b2a49 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fd0c6b04700 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fdb83580260 CR3=000000000d0a4000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 00007fd0c96757c0 00007fd0c96757c8 YMM02=0000000000000000 0000000000000000 00007fd0c96757e0 00007fd0c96757c0 YMM03=0000000000000000 0000000000000000 00007fd0c96757c8 00007fd0c96757c0 YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffff00000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000