syzkaller login: [ 41.871288] sshd (244) used greatest stack depth: 24768 bytes left Warning: Permanently added '[localhost]:11256' (ECDSA) to the list of known hosts. 2022/09/13 14:55:34 fuzzer started 2022/09/13 14:55:35 dialing manager at localhost:36597 [ 44.059029] cgroup: Unknown subsys name 'net' [ 44.164512] cgroup: Unknown subsys name 'rlimit' 2022/09/13 14:55:48 syscalls: 2215 2022/09/13 14:55:48 code coverage: enabled 2022/09/13 14:55:48 comparison tracing: enabled 2022/09/13 14:55:48 extra coverage: enabled 2022/09/13 14:55:48 setuid sandbox: enabled 2022/09/13 14:55:48 namespace sandbox: enabled 2022/09/13 14:55:48 Android sandbox: enabled 2022/09/13 14:55:48 fault injection: enabled 2022/09/13 14:55:48 leak checking: enabled 2022/09/13 14:55:48 net packet injection: enabled 2022/09/13 14:55:48 net device setup: enabled 2022/09/13 14:55:48 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/09/13 14:55:48 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/09/13 14:55:48 USB emulation: enabled 2022/09/13 14:55:48 hci packet injection: enabled 2022/09/13 14:55:48 wifi device emulation: failed to parse kernel version (6.0.0-rc5-next-20220913) 2022/09/13 14:55:48 802.15.4 emulation: enabled 2022/09/13 14:55:48 fetching corpus: 0, signal 0/2000 (executing program) 2022/09/13 14:55:48 fetching corpus: 50, signal 29362/32817 (executing program) 2022/09/13 14:55:48 fetching corpus: 100, signal 46873/51625 (executing program) 2022/09/13 14:55:48 fetching corpus: 150, signal 56222/62247 (executing program) 2022/09/13 14:55:49 fetching corpus: 200, signal 62827/70034 (executing program) 2022/09/13 14:55:49 fetching corpus: 250, signal 68435/76762 (executing program) 2022/09/13 14:55:49 fetching corpus: 300, signal 75527/84796 (executing program) 2022/09/13 14:55:49 fetching corpus: 350, signal 82133/92244 (executing program) 2022/09/13 14:55:49 fetching corpus: 400, signal 87386/98342 (executing program) 2022/09/13 14:55:49 fetching corpus: 450, signal 91225/103083 (executing program) 2022/09/13 14:55:50 fetching corpus: 500, signal 95259/107975 (executing program) 2022/09/13 14:55:50 fetching corpus: 550, signal 98695/112179 (executing program) 2022/09/13 14:55:50 fetching corpus: 600, signal 102428/116614 (executing program) 2022/09/13 14:55:50 fetching corpus: 650, signal 105161/120101 (executing program) 2022/09/13 14:55:50 fetching corpus: 700, signal 107738/123374 (executing program) 2022/09/13 14:55:50 fetching corpus: 750, signal 110820/127050 (executing program) 2022/09/13 14:55:50 fetching corpus: 800, signal 112953/129881 (executing program) 2022/09/13 14:55:51 fetching corpus: 850, signal 116827/134074 (executing program) 2022/09/13 14:55:51 fetching corpus: 900, signal 118589/136542 (executing program) 2022/09/13 14:55:51 fetching corpus: 950, signal 121032/139465 (executing program) 2022/09/13 14:55:51 fetching corpus: 1000, signal 122518/141549 (executing program) 2022/09/13 14:55:51 fetching corpus: 1050, signal 124640/144135 (executing program) 2022/09/13 14:55:51 fetching corpus: 1100, signal 127349/147173 (executing program) 2022/09/13 14:55:52 fetching corpus: 1150, signal 129981/150082 (executing program) 2022/09/13 14:55:52 fetching corpus: 1200, signal 133028/153308 (executing program) 2022/09/13 14:55:52 fetching corpus: 1250, signal 135216/155763 (executing program) 2022/09/13 14:55:52 fetching corpus: 1300, signal 136881/157817 (executing program) 2022/09/13 14:55:52 fetching corpus: 1350, signal 138878/160099 (executing program) 2022/09/13 14:55:52 fetching corpus: 1400, signal 140305/161923 (executing program) 2022/09/13 14:55:52 fetching corpus: 1450, signal 143200/164718 (executing program) 2022/09/13 14:55:53 fetching corpus: 1500, signal 144931/166666 (executing program) 2022/09/13 14:55:53 fetching corpus: 1550, signal 147158/168984 (executing program) 2022/09/13 14:55:53 fetching corpus: 1600, signal 148717/170735 (executing program) 2022/09/13 14:55:53 fetching corpus: 1650, signal 150210/172440 (executing program) 2022/09/13 14:55:53 fetching corpus: 1700, signal 151863/174256 (executing program) 2022/09/13 14:55:53 fetching corpus: 1750, signal 153421/175980 (executing program) 2022/09/13 14:55:54 fetching corpus: 1800, signal 155299/177836 (executing program) 2022/09/13 14:55:54 fetching corpus: 1850, signal 156656/179284 (executing program) 2022/09/13 14:55:54 fetching corpus: 1900, signal 158291/180960 (executing program) 2022/09/13 14:55:54 fetching corpus: 1950, signal 160045/182692 (executing program) 2022/09/13 14:55:54 fetching corpus: 2000, signal 161346/184087 (executing program) 2022/09/13 14:55:54 fetching corpus: 2050, signal 162578/185379 (executing program) 2022/09/13 14:55:54 fetching corpus: 2100, signal 163599/186561 (executing program) 2022/09/13 14:55:55 fetching corpus: 2150, signal 164705/187804 (executing program) 2022/09/13 14:55:55 fetching corpus: 2200, signal 165732/188899 (executing program) 2022/09/13 14:55:55 fetching corpus: 2250, signal 167250/190327 (executing program) 2022/09/13 14:55:55 fetching corpus: 2300, signal 168376/191475 (executing program) 2022/09/13 14:55:55 fetching corpus: 2350, signal 169294/192470 (executing program) 2022/09/13 14:55:55 fetching corpus: 2400, signal 170374/193603 (executing program) 2022/09/13 14:55:55 fetching corpus: 2450, signal 171610/194773 (executing program) 2022/09/13 14:55:56 fetching corpus: 2500, signal 172503/195799 (executing program) 2022/09/13 14:55:56 fetching corpus: 2550, signal 173637/196837 (executing program) 2022/09/13 14:55:56 fetching corpus: 2600, signal 174987/197946 (executing program) 2022/09/13 14:55:56 fetching corpus: 2650, signal 176114/198932 (executing program) 2022/09/13 14:55:56 fetching corpus: 2700, signal 177188/199920 (executing program) 2022/09/13 14:55:56 fetching corpus: 2750, signal 178348/200981 (executing program) 2022/09/13 14:55:57 fetching corpus: 2800, signal 179650/202033 (executing program) 2022/09/13 14:55:57 fetching corpus: 2850, signal 180915/202993 (executing program) 2022/09/13 14:55:57 fetching corpus: 2900, signal 182072/203925 (executing program) 2022/09/13 14:55:57 fetching corpus: 2950, signal 183463/204964 (executing program) 2022/09/13 14:55:57 fetching corpus: 3000, signal 184474/205747 (executing program) 2022/09/13 14:55:57 fetching corpus: 3050, signal 185502/206574 (executing program) 2022/09/13 14:55:58 fetching corpus: 3100, signal 186518/207405 (executing program) 2022/09/13 14:55:58 fetching corpus: 3150, signal 187650/208206 (executing program) 2022/09/13 14:55:58 fetching corpus: 3200, signal 188281/208764 (executing program) 2022/09/13 14:55:58 fetching corpus: 3250, signal 189821/209695 (executing program) 2022/09/13 14:55:58 fetching corpus: 3300, signal 190635/210294 (executing program) 2022/09/13 14:55:58 fetching corpus: 3350, signal 191787/211073 (executing program) 2022/09/13 14:55:58 fetching corpus: 3400, signal 192565/211682 (executing program) 2022/09/13 14:55:59 fetching corpus: 3450, signal 193582/212308 (executing program) 2022/09/13 14:55:59 fetching corpus: 3500, signal 194261/212820 (executing program) 2022/09/13 14:55:59 fetching corpus: 3550, signal 194787/213301 (executing program) 2022/09/13 14:55:59 fetching corpus: 3600, signal 195320/213715 (executing program) 2022/09/13 14:55:59 fetching corpus: 3650, signal 196070/214238 (executing program) 2022/09/13 14:55:59 fetching corpus: 3700, signal 196753/214707 (executing program) 2022/09/13 14:55:59 fetching corpus: 3750, signal 197716/215214 (executing program) 2022/09/13 14:56:00 fetching corpus: 3800, signal 198217/215623 (executing program) 2022/09/13 14:56:00 fetching corpus: 3850, signal 199182/216138 (executing program) 2022/09/13 14:56:00 fetching corpus: 3900, signal 199968/216591 (executing program) 2022/09/13 14:56:00 fetching corpus: 3950, signal 200740/217027 (executing program) 2022/09/13 14:56:00 fetching corpus: 4000, signal 201581/217460 (executing program) 2022/09/13 14:56:00 fetching corpus: 4050, signal 202492/217874 (executing program) 2022/09/13 14:56:00 fetching corpus: 4100, signal 203482/218301 (executing program) 2022/09/13 14:56:00 fetching corpus: 4150, signal 204065/218666 (executing program) 2022/09/13 14:56:01 fetching corpus: 4200, signal 204689/218985 (executing program) 2022/09/13 14:56:01 fetching corpus: 4250, signal 205687/219375 (executing program) 2022/09/13 14:56:01 fetching corpus: 4300, signal 206433/219721 (executing program) 2022/09/13 14:56:01 fetching corpus: 4350, signal 207797/220226 (executing program) 2022/09/13 14:56:01 fetching corpus: 4400, signal 208399/220505 (executing program) 2022/09/13 14:56:01 fetching corpus: 4450, signal 209445/220853 (executing program) 2022/09/13 14:56:01 fetching corpus: 4500, signal 210214/221143 (executing program) 2022/09/13 14:56:01 fetching corpus: 4550, signal 210783/221358 (executing program) 2022/09/13 14:56:02 fetching corpus: 4600, signal 211934/221638 (executing program) 2022/09/13 14:56:02 fetching corpus: 4650, signal 212429/221803 (executing program) 2022/09/13 14:56:02 fetching corpus: 4700, signal 213429/222080 (executing program) 2022/09/13 14:56:02 fetching corpus: 4750, signal 213987/222228 (executing program) 2022/09/13 14:56:02 fetching corpus: 4800, signal 214518/222374 (executing program) 2022/09/13 14:56:02 fetching corpus: 4844, signal 215091/222639 (executing program) 2022/09/13 14:56:02 fetching corpus: 4844, signal 215091/222708 (executing program) 2022/09/13 14:56:02 fetching corpus: 4844, signal 215091/222773 (executing program) 2022/09/13 14:56:02 fetching corpus: 4844, signal 215091/222870 (executing program) 2022/09/13 14:56:02 fetching corpus: 4844, signal 215091/222955 (executing program) 2022/09/13 14:56:02 fetching corpus: 4844, signal 215091/223036 (executing program) 2022/09/13 14:56:02 fetching corpus: 4844, signal 215091/223119 (executing program) 2022/09/13 14:56:02 fetching corpus: 4844, signal 215091/223201 (executing program) 2022/09/13 14:56:02 fetching corpus: 4844, signal 215091/223290 (executing program) 2022/09/13 14:56:02 fetching corpus: 4844, signal 215091/223368 (executing program) 2022/09/13 14:56:02 fetching corpus: 4844, signal 215091/223446 (executing program) 2022/09/13 14:56:02 fetching corpus: 4844, signal 215091/223487 (executing program) 2022/09/13 14:56:02 fetching corpus: 4844, signal 215091/223487 (executing program) 2022/09/13 14:56:05 starting 8 fuzzer processes 14:56:05 executing program 0: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8954, &(0x7f0000002440)={{0x2, 0x0, @loopback}, {0x0, @dev}, 0x0, {0x2, 0x0, @empty}, 'sit0\x00'}) 14:56:05 executing program 1: r0 = fsopen(&(0x7f0000000180)='ramfs\x00', 0x0) r1 = dup(r0) dup(r1) r2 = syz_io_uring_setup(0x137, &(0x7f00000001c0), &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000440)=0x0, &(0x7f0000000380)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_ASYNC_CANCEL={0xe, 0x2}, 0xfffffff7) syz_io_uring_submit(r3, r4, &(0x7f0000000180)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x6, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x3514, &(0x7f0000000040), &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000100)=0x0) syz_io_uring_submit(r3, r5, &(0x7f0000000480)=@IORING_OP_FALLOCATE={0x11, 0x0, 0x0, @fd_index}, 0x0) io_uring_enter(r2, 0x100001, 0x0, 0x0, 0x0, 0x0) 14:56:05 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x3d, &(0x7f0000000200)={0x77359400}, 0x10) 14:56:05 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x8923, &(0x7f0000000080)={'syztnl1\x00', 0x0}) 14:56:05 executing program 4: syz_open_dev$vcsu(&(0x7f0000000080), 0x6, 0x0) 14:56:05 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x0, 0x8}) [ 73.845820] audit: type=1400 audit(1663080965.150:6): avc: denied { execmem } for pid=287 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 14:56:05 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="db", 0x1}], 0x1, 0x8001, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) read(r1, &(0x7f0000000180)=""/136, 0x88) sendfile(r1, r1, 0x0, 0x100000) 14:56:05 executing program 7: msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000140)=""/188) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r0, 0xf507, 0x0) sendfile(r2, r1, 0x0, 0xdb8a) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6, 0x3, 0x9, 0x5, 0x0, 0x40, 0x40c0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000080), 0xd}, 0x40111, 0x2, 0x8, 0x7, 0x400, 0x3, 0x401, 0x0, 0x400, 0x0, 0x3}, 0xffffffffffffffff, 0xc, r1, 0x1) msgctl$IPC_RMID(0x0, 0x0) msgctl$MSG_STAT_ANY(0x0, 0xd, &(0x7f00000007c0)=""/243) msgctl$IPC_RMID(0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/asound/seq/clients\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x10000027f) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32, @ANYBLOB="04000200000000002e2f66696c653100"]) [ 75.028406] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 75.030047] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 75.032364] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 75.035113] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 75.037735] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 75.038949] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 75.044764] Bluetooth: hci0: HCI_REQ-0x0c1a [ 75.097882] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 75.100358] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 75.102626] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 75.112885] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 75.114961] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 75.116386] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 75.123428] Bluetooth: hci3: HCI_REQ-0x0c1a [ 75.147803] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 75.149237] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 75.150891] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 75.152803] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 75.153933] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 75.156273] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 75.158403] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 75.161929] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 75.164241] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 75.166779] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 75.166859] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 75.170004] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 75.171130] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 75.171257] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 75.174018] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 75.180931] Bluetooth: hci1: HCI_REQ-0x0c1a [ 75.182361] Bluetooth: hci2: HCI_REQ-0x0c1a [ 75.192852] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 75.229576] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 75.231054] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 75.236851] Bluetooth: hci4: HCI_REQ-0x0c1a [ 75.237322] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 75.252666] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 75.256583] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 75.261398] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 75.263259] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 75.275879] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 75.278349] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 75.279826] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 75.282239] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 75.288747] Bluetooth: hci6: HCI_REQ-0x0c1a [ 75.306490] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 75.308614] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 75.310064] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 75.314782] Bluetooth: hci7: HCI_REQ-0x0c1a [ 77.117911] Bluetooth: hci0: command 0x0409 tx timeout [ 77.181546] Bluetooth: hci3: command 0x0409 tx timeout [ 77.244534] Bluetooth: hci5: Opcode 0x c03 failed: -110 [ 77.246589] Bluetooth: hci1: command 0x0409 tx timeout [ 77.247435] Bluetooth: hci2: command 0x0409 tx timeout [ 77.308345] Bluetooth: hci6: command 0x0409 tx timeout [ 77.309361] Bluetooth: hci4: command 0x0409 tx timeout [ 77.372340] Bluetooth: hci7: command 0x0409 tx timeout [ 79.164359] Bluetooth: hci0: command 0x041b tx timeout [ 79.228389] Bluetooth: hci3: command 0x041b tx timeout [ 79.307339] Bluetooth: hci2: command 0x041b tx timeout [ 79.307880] Bluetooth: hci1: command 0x041b tx timeout [ 79.373378] Bluetooth: hci4: command 0x041b tx timeout [ 79.374279] Bluetooth: hci6: command 0x041b tx timeout [ 79.438392] Bluetooth: hci7: command 0x041b tx timeout [ 80.161228] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 80.171652] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 80.177533] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 80.180782] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 80.183602] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 80.184908] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 80.232923] Bluetooth: hci5: HCI_REQ-0x0c1a [ 81.212396] Bluetooth: hci0: command 0x040f tx timeout [ 81.276398] Bluetooth: hci3: command 0x040f tx timeout [ 81.340454] Bluetooth: hci1: command 0x040f tx timeout [ 81.341380] Bluetooth: hci2: command 0x040f tx timeout [ 81.404452] Bluetooth: hci6: command 0x040f tx timeout [ 81.405271] Bluetooth: hci4: command 0x040f tx timeout [ 81.468473] Bluetooth: hci7: command 0x040f tx timeout [ 82.300386] Bluetooth: hci5: command 0x0409 tx timeout [ 83.261351] Bluetooth: hci0: command 0x0419 tx timeout [ 83.324379] Bluetooth: hci3: command 0x0419 tx timeout [ 83.389359] Bluetooth: hci2: command 0x0419 tx timeout [ 83.389754] Bluetooth: hci1: command 0x0419 tx timeout [ 83.452341] Bluetooth: hci4: command 0x0419 tx timeout [ 83.452767] Bluetooth: hci6: command 0x0419 tx timeout [ 83.517370] Bluetooth: hci7: command 0x0419 tx timeout [ 84.349331] Bluetooth: hci5: command 0x041b tx timeout [ 86.396364] Bluetooth: hci5: command 0x040f tx timeout [ 88.445335] Bluetooth: hci5: command 0x0419 tx timeout 14:57:00 executing program 1: r0 = fsopen(&(0x7f0000000180)='ramfs\x00', 0x0) r1 = dup(r0) dup(r1) r2 = syz_io_uring_setup(0x137, &(0x7f00000001c0), &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000440)=0x0, &(0x7f0000000380)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_ASYNC_CANCEL={0xe, 0x2}, 0xfffffff7) syz_io_uring_submit(r3, r4, &(0x7f0000000180)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x6, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x3514, &(0x7f0000000040), &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000100)=0x0) syz_io_uring_submit(r3, r5, &(0x7f0000000480)=@IORING_OP_FALLOCATE={0x11, 0x0, 0x0, @fd_index}, 0x0) io_uring_enter(r2, 0x100001, 0x0, 0x0, 0x0, 0x0) 14:57:00 executing program 1: r0 = fsopen(&(0x7f0000000180)='ramfs\x00', 0x0) r1 = dup(r0) dup(r1) r2 = syz_io_uring_setup(0x137, &(0x7f00000001c0), &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000440)=0x0, &(0x7f0000000380)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_ASYNC_CANCEL={0xe, 0x2}, 0xfffffff7) syz_io_uring_submit(r3, r4, &(0x7f0000000180)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x6, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x3514, &(0x7f0000000040), &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000100)=0x0) syz_io_uring_submit(r3, r5, &(0x7f0000000480)=@IORING_OP_FALLOCATE={0x11, 0x0, 0x0, @fd_index}, 0x0) io_uring_enter(r2, 0x100001, 0x0, 0x0, 0x0, 0x0) 14:57:01 executing program 1: r0 = fsopen(&(0x7f0000000180)='ramfs\x00', 0x0) r1 = dup(r0) dup(r1) r2 = syz_io_uring_setup(0x137, &(0x7f00000001c0), &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000440)=0x0, &(0x7f0000000380)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_ASYNC_CANCEL={0xe, 0x2}, 0xfffffff7) syz_io_uring_submit(r3, r4, &(0x7f0000000180)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x6, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x3514, &(0x7f0000000040), &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000100)=0x0) syz_io_uring_submit(r3, r5, &(0x7f0000000480)=@IORING_OP_FALLOCATE={0x11, 0x0, 0x0, @fd_index}, 0x0) io_uring_enter(r2, 0x100001, 0x0, 0x0, 0x0, 0x0) 14:57:01 executing program 1: io_setup(0x4, &(0x7f0000000140)=0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) io_submit(r0, 0x3, &(0x7f00000004c0)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x2}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) [ 129.891136] audit: type=1400 audit(1663081021.195:7): avc: denied { open } for pid=3827 comm="syz-executor.2" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 129.892728] audit: type=1400 audit(1663081021.195:8): avc: denied { kernel } for pid=3827 comm="syz-executor.2" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 129.909958] ------------[ cut here ]------------ [ 129.909982] [ 129.909985] ====================================================== [ 129.909989] WARNING: possible circular locking dependency detected [ 129.909993] 6.0.0-rc5-next-20220913 #1 Not tainted [ 129.910000] ------------------------------------------------------ [ 129.910003] syz-executor.2/3828 is trying to acquire lock: [ 129.910010] ffffffff853fa878 ((console_sem).lock){....}-{2:2}, at: down_trylock+0xe/0x70 [ 129.910049] [ 129.910049] but task is already holding lock: [ 129.910052] ffff8880412f2020 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 129.910080] [ 129.910080] which lock already depends on the new lock. [ 129.910080] [ 129.910083] [ 129.910083] the existing dependency chain (in reverse order) is: [ 129.910086] [ 129.910086] -> #3 (&ctx->lock){....}-{2:2}: [ 129.910101] _raw_spin_lock+0x2a/0x40 [ 129.910118] __perf_event_task_sched_out+0x53b/0x18d0 [ 129.910130] __schedule+0xedd/0x2470 [ 129.910141] schedule+0xda/0x1b0 [ 129.910150] exit_to_user_mode_prepare+0x114/0x1a0 [ 129.910171] syscall_exit_to_user_mode+0x19/0x40 [ 129.910189] do_syscall_64+0x48/0x90 [ 129.910203] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 129.910221] [ 129.910221] -> #2 (&rq->__lock){-.-.}-{2:2}: [ 129.910235] _raw_spin_lock_nested+0x30/0x40 [ 129.910250] raw_spin_rq_lock_nested+0x1e/0x30 [ 129.910263] task_fork_fair+0x63/0x4d0 [ 129.910283] sched_cgroup_fork+0x3d0/0x540 [ 129.910298] copy_process+0x3f9e/0x6df0 [ 129.910308] kernel_clone+0xe7/0x890 [ 129.910318] user_mode_thread+0xad/0xf0 [ 129.910328] rest_init+0x24/0x250 [ 129.910344] arch_call_rest_init+0xf/0x14 [ 129.910364] start_kernel+0x4c1/0x4e6 [ 129.910382] secondary_startup_64_no_verify+0xe0/0xeb [ 129.910397] [ 129.910397] -> #1 (&p->pi_lock){-.-.}-{2:2}: [ 129.910410] _raw_spin_lock_irqsave+0x39/0x60 [ 129.910425] try_to_wake_up+0xab/0x1920 [ 129.910439] up+0x75/0xb0 [ 129.910450] __up_console_sem+0x6e/0x80 [ 129.910466] console_unlock+0x46a/0x590 [ 129.910483] vprintk_emit+0x1bd/0x560 [ 129.910500] devkmsg_emit.constprop.0+0xbb/0xf4 [ 129.910520] devkmsg_write.cold+0x83/0xd9 [ 129.910538] do_iter_readv_writev+0x211/0x3c0 [ 129.910555] do_iter_write+0x18b/0x700 [ 129.910572] vfs_writev+0x1ae/0x630 [ 129.910589] do_writev+0x133/0x300 [ 129.910605] do_syscall_64+0x3b/0x90 [ 129.910618] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 129.910635] [ 129.910635] -> #0 ((console_sem).lock){....}-{2:2}: [ 129.910648] __lock_acquire+0x2a02/0x5e70 [ 129.910665] lock_acquire+0x1a2/0x530 [ 129.910681] _raw_spin_lock_irqsave+0x39/0x60 [ 129.910696] down_trylock+0xe/0x70 [ 129.910708] __down_trylock_console_sem+0x3b/0xd0 [ 129.910725] vprintk_emit+0x16b/0x560 [ 129.910741] vprintk+0x84/0xa0 [ 129.910758] _printk+0xba/0xf1 [ 129.910774] report_bug.cold+0x72/0xab [ 129.910786] handle_bug+0x3c/0x70 [ 129.910799] exc_invalid_op+0x14/0x50 [ 129.910812] asm_exc_invalid_op+0x16/0x20 [ 129.910829] group_sched_out.part.0+0x2c7/0x460 [ 129.910839] ctx_sched_out+0x8f1/0xc10 [ 129.910849] __perf_event_task_sched_out+0x6d0/0x18d0 [ 129.910861] __schedule+0xedd/0x2470 [ 129.910870] schedule+0xda/0x1b0 [ 129.910879] exit_to_user_mode_prepare+0x114/0x1a0 [ 129.910899] syscall_exit_to_user_mode+0x19/0x40 [ 129.910916] do_syscall_64+0x48/0x90 [ 129.910929] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 129.910946] [ 129.910946] other info that might help us debug this: [ 129.910946] [ 129.910949] Chain exists of: [ 129.910949] (console_sem).lock --> &rq->__lock --> &ctx->lock [ 129.910949] [ 129.910964] Possible unsafe locking scenario: [ 129.910964] [ 129.910966] CPU0 CPU1 [ 129.910968] ---- ---- [ 129.910971] lock(&ctx->lock); [ 129.910976] lock(&rq->__lock); [ 129.910983] lock(&ctx->lock); [ 129.910989] lock((console_sem).lock); [ 129.910995] [ 129.910995] *** DEADLOCK *** [ 129.910995] [ 129.910997] 2 locks held by syz-executor.2/3828: [ 129.911004] #0: ffff88806ce37cd8 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x1cf/0x2470 [ 129.911029] #1: ffff8880412f2020 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 129.911056] [ 129.911056] stack backtrace: [ 129.911059] CPU: 0 PID: 3828 Comm: syz-executor.2 Not tainted 6.0.0-rc5-next-20220913 #1 [ 129.911072] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 129.911080] Call Trace: [ 129.911084] [ 129.911088] dump_stack_lvl+0x8b/0xb3 [ 129.911103] check_noncircular+0x263/0x2e0 [ 129.911120] ? format_decode+0x26c/0xb50 [ 129.911135] ? print_circular_bug+0x450/0x450 [ 129.911153] ? enable_ptr_key_workfn+0x20/0x20 [ 129.911167] ? perf_trace_lock+0x308/0x560 [ 129.911182] ? format_decode+0x26c/0xb50 [ 129.911198] ? alloc_chain_hlocks+0x1ec/0x5a0 [ 129.911216] __lock_acquire+0x2a02/0x5e70 [ 129.911240] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 129.911265] lock_acquire+0x1a2/0x530 [ 129.911282] ? down_trylock+0xe/0x70 [ 129.911297] ? rcu_read_unlock+0x40/0x40 [ 129.911320] ? vprintk+0x84/0xa0 [ 129.911338] _raw_spin_lock_irqsave+0x39/0x60 [ 129.911354] ? down_trylock+0xe/0x70 [ 129.911368] down_trylock+0xe/0x70 [ 129.911381] ? vprintk+0x84/0xa0 [ 129.911399] __down_trylock_console_sem+0x3b/0xd0 [ 129.911416] vprintk_emit+0x16b/0x560 [ 129.911435] vprintk+0x84/0xa0 [ 129.911453] _printk+0xba/0xf1 [ 129.911471] ? record_print_text.cold+0x16/0x16 [ 129.911495] ? report_bug.cold+0x66/0xab [ 129.911509] ? group_sched_out.part.0+0x2c7/0x460 [ 129.911521] report_bug.cold+0x72/0xab [ 129.911536] handle_bug+0x3c/0x70 [ 129.911550] exc_invalid_op+0x14/0x50 [ 129.911565] asm_exc_invalid_op+0x16/0x20 [ 129.911582] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 129.911596] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 129.911607] RSP: 0018:ffff8880419f7c48 EFLAGS: 00010006 [ 129.911616] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 129.911624] RDX: ffff88800cfcb580 RSI: ffffffff81566027 RDI: 0000000000000005 [ 129.911632] RBP: ffff888008660000 R08: 0000000000000005 R09: 0000000000000001 [ 129.911639] R10: 0000000000000000 R11: ffffffff865aa01b R12: ffff8880412f2000 [ 129.911647] R13: ffff88806ce3d100 R14: ffffffff8547c7c0 R15: 0000000000000002 [ 129.911659] ? group_sched_out.part.0+0x2c7/0x460 [ 129.911673] ? group_sched_out.part.0+0x2c7/0x460 [ 129.911687] ctx_sched_out+0x8f1/0xc10 [ 129.911700] __perf_event_task_sched_out+0x6d0/0x18d0 [ 129.911716] ? lock_is_held_type+0xd7/0x130 [ 129.911735] ? __perf_cgroup_move+0x160/0x160 [ 129.911747] ? set_next_entity+0x304/0x550 [ 129.911765] ? update_curr+0x267/0x740 [ 129.911784] ? lock_is_held_type+0xd7/0x130 [ 129.911803] __schedule+0xedd/0x2470 [ 129.911818] ? io_schedule_timeout+0x150/0x150 [ 129.911831] ? __x64_sys_futex_time32+0x480/0x480 [ 129.911845] schedule+0xda/0x1b0 [ 129.911857] exit_to_user_mode_prepare+0x114/0x1a0 [ 129.911878] syscall_exit_to_user_mode+0x19/0x40 [ 129.911897] do_syscall_64+0x48/0x90 [ 129.911910] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 129.911927] RIP: 0033:0x7efcbf3a7b19 [ 129.911936] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 129.911947] RSP: 002b:00007efcbc91d218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 129.911958] RAX: 0000000000000001 RBX: 00007efcbf4baf68 RCX: 00007efcbf3a7b19 [ 129.911966] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007efcbf4baf6c [ 129.911973] RBP: 00007efcbf4baf60 R08: 000000000000000e R09: 0000000000000000 [ 129.911980] R10: 0000000000000003 R11: 0000000000000246 R12: 00007efcbf4baf6c [ 129.911988] R13: 00007fff5a96f74f R14: 00007efcbc91d300 R15: 0000000000022000 [ 129.912002] [ 129.969413] WARNING: CPU: 0 PID: 3828 at kernel/events/core.c:2309 group_sched_out.part.0+0x2c7/0x460 [ 129.970099] Modules linked in: [ 129.970345] CPU: 0 PID: 3828 Comm: syz-executor.2 Not tainted 6.0.0-rc5-next-20220913 #1 [ 129.970942] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 129.971770] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 129.972177] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 129.973527] RSP: 0018:ffff8880419f7c48 EFLAGS: 00010006 [ 129.973920] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 129.974449] RDX: ffff88800cfcb580 RSI: ffffffff81566027 RDI: 0000000000000005 [ 129.974978] RBP: ffff888008660000 R08: 0000000000000005 R09: 0000000000000001 [ 129.975510] R10: 0000000000000000 R11: ffffffff865aa01b R12: ffff8880412f2000 [ 129.976036] R13: ffff88806ce3d100 R14: ffffffff8547c7c0 R15: 0000000000000002 [ 129.976560] FS: 00007efcbc91d700(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 129.977155] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 129.977595] CR2: 00007ff4fe8714a1 CR3: 000000000e2ea000 CR4: 0000000000350ef0 [ 129.978128] Call Trace: [ 129.978321] [ 129.978498] ctx_sched_out+0x8f1/0xc10 [ 129.978797] __perf_event_task_sched_out+0x6d0/0x18d0 [ 129.979189] ? lock_is_held_type+0xd7/0x130 [ 129.979524] ? __perf_cgroup_move+0x160/0x160 [ 129.979858] ? set_next_entity+0x304/0x550 [ 129.980176] ? update_curr+0x267/0x740 [ 129.980480] ? lock_is_held_type+0xd7/0x130 [ 129.980814] __schedule+0xedd/0x2470 [ 129.981106] ? io_schedule_timeout+0x150/0x150 [ 129.981460] ? __x64_sys_futex_time32+0x480/0x480 [ 129.981825] schedule+0xda/0x1b0 [ 129.982083] exit_to_user_mode_prepare+0x114/0x1a0 [ 129.982464] syscall_exit_to_user_mode+0x19/0x40 [ 129.982826] do_syscall_64+0x48/0x90 [ 129.983110] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 129.983505] RIP: 0033:0x7efcbf3a7b19 [ 129.983783] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 129.985119] RSP: 002b:00007efcbc91d218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 129.985697] RAX: 0000000000000001 RBX: 00007efcbf4baf68 RCX: 00007efcbf3a7b19 [ 129.986226] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007efcbf4baf6c [ 129.986748] RBP: 00007efcbf4baf60 R08: 000000000000000e R09: 0000000000000000 [ 129.987286] R10: 0000000000000003 R11: 0000000000000246 R12: 00007efcbf4baf6c [ 129.987811] R13: 00007fff5a96f74f R14: 00007efcbc91d300 R15: 0000000000022000 [ 129.988345] [ 129.988521] irq event stamp: 778 [ 129.988776] hardirqs last enabled at (777): [] exit_to_user_mode_prepare+0x109/0x1a0 [ 129.989490] hardirqs last disabled at (778): [] __schedule+0x1225/0x2470 [ 129.990102] softirqs last enabled at (542): [] __irq_exit_rcu+0x11b/0x180 [ 129.990744] softirqs last disabled at (537): [] __irq_exit_rcu+0x11b/0x180 [ 129.991374] ---[ end trace 0000000000000000 ]--- 14:57:01 executing program 1: io_setup(0x4, &(0x7f0000000140)=0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) io_submit(r0, 0x3, &(0x7f00000004c0)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x2}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 14:57:01 executing program 1: io_setup(0x4, &(0x7f0000000140)=0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) io_submit(r0, 0x3, &(0x7f00000004c0)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x2}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 14:57:01 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x3d, &(0x7f0000000200)={0x77359400}, 0x10) 14:57:01 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="db", 0x1}], 0x1, 0x8001, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) read(r1, &(0x7f0000000180)=""/136, 0x88) sendfile(r1, r1, 0x0, 0x100000) [ 130.257807] syz-executor.0 uses obsolete (PF_INET,SOCK_PACKET) 14:57:03 executing program 0: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8954, &(0x7f0000002440)={{0x2, 0x0, @loopback}, {0x0, @dev}, 0x0, {0x2, 0x0, @empty}, 'sit0\x00'}) 14:57:03 executing program 7: msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000140)=""/188) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r0, 0xf507, 0x0) sendfile(r2, r1, 0x0, 0xdb8a) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6, 0x3, 0x9, 0x5, 0x0, 0x40, 0x40c0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000080), 0xd}, 0x40111, 0x2, 0x8, 0x7, 0x400, 0x3, 0x401, 0x0, 0x400, 0x0, 0x3}, 0xffffffffffffffff, 0xc, r1, 0x1) msgctl$IPC_RMID(0x0, 0x0) msgctl$MSG_STAT_ANY(0x0, 0xd, &(0x7f00000007c0)=""/243) msgctl$IPC_RMID(0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/asound/seq/clients\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x10000027f) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32, @ANYBLOB="04000200000000002e2f66696c653100"]) 14:57:03 executing program 4: syz_open_dev$vcsu(&(0x7f0000000080), 0x6, 0x0) 14:57:03 executing program 1: io_setup(0x4, &(0x7f0000000140)=0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) io_submit(r0, 0x3, &(0x7f00000004c0)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x2}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 14:57:03 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x8923, &(0x7f0000000080)={'syztnl1\x00', 0x0}) 14:57:03 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x0, 0x8}) 14:57:03 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x3d, &(0x7f0000000200)={0x77359400}, 0x10) 14:57:03 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="db", 0x1}], 0x1, 0x8001, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) read(r1, &(0x7f0000000180)=""/136, 0x88) sendfile(r1, r1, 0x0, 0x100000) 14:57:03 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x0, 0x8}) 14:57:03 executing program 4: syz_open_dev$vcsu(&(0x7f0000000080), 0x6, 0x0) 14:57:04 executing program 0: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8954, &(0x7f0000002440)={{0x2, 0x0, @loopback}, {0x0, @dev}, 0x0, {0x2, 0x0, @empty}, 'sit0\x00'}) 14:57:04 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x3d, &(0x7f0000000200)={0x77359400}, 0x10) 14:57:04 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="db", 0x1}], 0x1, 0x8001, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) read(r1, &(0x7f0000000180)=""/136, 0x88) sendfile(r1, r1, 0x0, 0x100000) 14:57:04 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x0, 0x8}) 14:57:04 executing program 1: msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000140)=""/188) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r0, 0xf507, 0x0) sendfile(r2, r1, 0x0, 0xdb8a) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6, 0x3, 0x9, 0x5, 0x0, 0x40, 0x40c0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000080), 0xd}, 0x40111, 0x2, 0x8, 0x7, 0x400, 0x3, 0x401, 0x0, 0x400, 0x0, 0x3}, 0xffffffffffffffff, 0xc, r1, 0x1) msgctl$IPC_RMID(0x0, 0x0) msgctl$MSG_STAT_ANY(0x0, 0xd, &(0x7f00000007c0)=""/243) msgctl$IPC_RMID(0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/asound/seq/clients\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x10000027f) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32, @ANYBLOB="04000200000000002e2f66696c653100"]) 14:57:04 executing program 7: msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000140)=""/188) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r0, 0xf507, 0x0) sendfile(r2, r1, 0x0, 0xdb8a) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6, 0x3, 0x9, 0x5, 0x0, 0x40, 0x40c0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000080), 0xd}, 0x40111, 0x2, 0x8, 0x7, 0x400, 0x3, 0x401, 0x0, 0x400, 0x0, 0x3}, 0xffffffffffffffff, 0xc, r1, 0x1) msgctl$IPC_RMID(0x0, 0x0) msgctl$MSG_STAT_ANY(0x0, 0xd, &(0x7f00000007c0)=""/243) msgctl$IPC_RMID(0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/asound/seq/clients\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x10000027f) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32, @ANYBLOB="04000200000000002e2f66696c653100"]) 14:57:04 executing program 4: syz_open_dev$vcsu(&(0x7f0000000080), 0x6, 0x0) 14:57:04 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x8923, &(0x7f0000000080)={'syztnl1\x00', 0x0}) 14:57:04 executing program 5: msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000140)=""/188) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r0, 0xf507, 0x0) sendfile(r2, r1, 0x0, 0xdb8a) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6, 0x3, 0x9, 0x5, 0x0, 0x40, 0x40c0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000080), 0xd}, 0x40111, 0x2, 0x8, 0x7, 0x400, 0x3, 0x401, 0x0, 0x400, 0x0, 0x3}, 0xffffffffffffffff, 0xc, r1, 0x1) msgctl$IPC_RMID(0x0, 0x0) msgctl$MSG_STAT_ANY(0x0, 0xd, &(0x7f00000007c0)=""/243) msgctl$IPC_RMID(0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/asound/seq/clients\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x10000027f) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32, @ANYBLOB="04000200000000002e2f66696c653100"]) [ 132.790301] hrtimer: interrupt took 21320 ns 14:57:04 executing program 0: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8954, &(0x7f0000002440)={{0x2, 0x0, @loopback}, {0x0, @dev}, 0x0, {0x2, 0x0, @empty}, 'sit0\x00'}) 14:57:04 executing program 7: msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000140)=""/188) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r0, 0xf507, 0x0) sendfile(r2, r1, 0x0, 0xdb8a) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6, 0x3, 0x9, 0x5, 0x0, 0x40, 0x40c0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000080), 0xd}, 0x40111, 0x2, 0x8, 0x7, 0x400, 0x3, 0x401, 0x0, 0x400, 0x0, 0x3}, 0xffffffffffffffff, 0xc, r1, 0x1) msgctl$IPC_RMID(0x0, 0x0) msgctl$MSG_STAT_ANY(0x0, 0xd, &(0x7f00000007c0)=""/243) msgctl$IPC_RMID(0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/asound/seq/clients\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x10000027f) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32, @ANYBLOB="04000200000000002e2f66696c653100"]) 14:57:04 executing program 2: setgroups(0x4000000000000352, &(0x7f0000000300)=[0x0, 0x0]) getegid() memfd_secret(0x0) r0 = getpid() pidfd_open(r0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x9, 0x4, &(0x7f0000000800)=[{&(0x7f00000001c0)="506ace23e53df1153d4e7fff401c1b280455c9f815e907aedf3d707b795691a151c379e1ea4c073dfd0acbef4066510713e41d20d982f1ee563cc6ed994a7f5e9c373d81edeadababa257bfc6179410ead9dc257949f08241e10632febffb61f8371a58b1f4f74a3ba6549d535f514e61280649d98b44c1d5be5235cc8be2d861fd8cbc2722938fade549c130acc2f3f071bf00f236a1a3af8b3b34e7b782d5e017789b61f47c63ff7ef922486debe0f8c1ab10395b6edebf529143ea8f1cac52872303a70e795c9316fc64dc0aab1e733fcefb9617fada8b0e26ac20b970b8d7f7ff7bf29288fab2189", 0xea, 0x62}, {&(0x7f0000000600)="dd02e73e4c811356f3aaf30db9cc42ec6a2f2275f5a6b8987e9d891161a320d4c2554fb09baf2e9f5ccf44b9487de6a295a9d229a9faa541c20fb6bc907bbe043d087c4ff4b41509527b0470a38f002b17089eaf9fef7ddb32a683e0fe88da6f2f709f87bf5d36285563599f66d6c3722256cecf15b84500736dbab6", 0x7c, 0x200}, {&(0x7f0000000680)="4dec32614cf054998476a197bdf20c26ddbaa038a1711724291a5959066089954c9f03bdb86160e5269d4c05eb313a7a988eb1e2da139c239765da30f59f162a2422b42e0b4dd235945eddcf51f07df24611e2cbb6dcf845fded97a4abc83fdae90d40cb64cab653050a5e71023f2851370c84110ea011a7ae35d2c96de4f8a4ac5173c7", 0x84, 0x4}, {&(0x7f0000000740)="129cc8ce13864e5d41cfd8835a1a393416af7db5a6a8360ed15d0b49dbeff08c13fc3a5db5cd51d614dbcbbcaba55426ad6f827df7bb9504ccad3548f1b08253062f2328db4c157f4195c9bb7c7f21be901c25fe0be6a439fce6206e306857fd546d61b5c40edd3569717e81a3bb9fbc880b5e7caf5329c079c9ff5b07d10ce58e222089728f19db72c79ef7687da2967b19aee16362a4a73a8221cfb45c679b4743e11b44bbc89b6537f96f0e83e9f5e0a4f456598afcbe9ce1", 0xba, 0x10001}], 0x2, &(0x7f0000000880)={[{@fat=@dmask={'dmask', 0x3d, 0x80000000}}, {@utf8no}, {@shortname_winnt}], [{@dont_appraise}, {@measure}, {@fsname={'fsname', 0x3d, '\\^/\''}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) r1 = getpid() r2 = pidfd_open(r1, 0x0) pidfd_send_signal(r2, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) r3 = getpid() r4 = pidfd_open(r3, 0x0) pidfd_send_signal(r4, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) epoll_create(0x0) 14:57:04 executing program 1: msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000140)=""/188) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r0, 0xf507, 0x0) sendfile(r2, r1, 0x0, 0xdb8a) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6, 0x3, 0x9, 0x5, 0x0, 0x40, 0x40c0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000080), 0xd}, 0x40111, 0x2, 0x8, 0x7, 0x400, 0x3, 0x401, 0x0, 0x400, 0x0, 0x3}, 0xffffffffffffffff, 0xc, r1, 0x1) msgctl$IPC_RMID(0x0, 0x0) msgctl$MSG_STAT_ANY(0x0, 0xd, &(0x7f00000007c0)=""/243) msgctl$IPC_RMID(0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/asound/seq/clients\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x10000027f) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32, @ANYBLOB="04000200000000002e2f66696c653100"]) 14:57:04 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f00000021c0)='./file0\x00', 0xa0000158) r2 = dup2(r1, r0) ioctl$FIONREAD(r2, 0x541b, &(0x7f00000000c0)) [ 133.194830] audit: type=1400 audit(1663081024.499:9): avc: denied { watch_reads } for pid=4018 comm="syz-executor.0" path="/syzkaller-testdir044022517/syzkaller.l10tLU/4/file0" dev="sda" ino=15986 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=dir permissive=1 14:57:04 executing program 5: msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000140)=""/188) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r0, 0xf507, 0x0) sendfile(r2, r1, 0x0, 0xdb8a) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6, 0x3, 0x9, 0x5, 0x0, 0x40, 0x40c0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000080), 0xd}, 0x40111, 0x2, 0x8, 0x7, 0x400, 0x3, 0x401, 0x0, 0x400, 0x0, 0x3}, 0xffffffffffffffff, 0xc, r1, 0x1) msgctl$IPC_RMID(0x0, 0x0) msgctl$MSG_STAT_ANY(0x0, 0xd, &(0x7f00000007c0)=""/243) msgctl$IPC_RMID(0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/asound/seq/clients\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x10000027f) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32, @ANYBLOB="04000200000000002e2f66696c653100"]) 14:57:04 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x8923, &(0x7f0000000080)={'syztnl1\x00', 0x0}) 14:57:04 executing program 6: msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000140)=""/188) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r0, 0xf507, 0x0) sendfile(r2, r1, 0x0, 0xdb8a) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6, 0x3, 0x9, 0x5, 0x0, 0x40, 0x40c0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000080), 0xd}, 0x40111, 0x2, 0x8, 0x7, 0x400, 0x3, 0x401, 0x0, 0x400, 0x0, 0x3}, 0xffffffffffffffff, 0xc, r1, 0x1) msgctl$IPC_RMID(0x0, 0x0) msgctl$MSG_STAT_ANY(0x0, 0xd, &(0x7f00000007c0)=""/243) msgctl$IPC_RMID(0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/asound/seq/clients\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x10000027f) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32, @ANYBLOB="04000200000000002e2f66696c653100"]) [ 133.217370] loop2: detected capacity change from 0 to 256 14:57:04 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) dup3(r0, r1, 0x0) openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) [ 133.262637] loop2: detected capacity change from 0 to 256 14:57:04 executing program 2: setgroups(0x4000000000000352, &(0x7f0000000300)=[0x0, 0x0]) getegid() memfd_secret(0x0) r0 = getpid() pidfd_open(r0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x9, 0x4, &(0x7f0000000800)=[{&(0x7f00000001c0)="506ace23e53df1153d4e7fff401c1b280455c9f815e907aedf3d707b795691a151c379e1ea4c073dfd0acbef4066510713e41d20d982f1ee563cc6ed994a7f5e9c373d81edeadababa257bfc6179410ead9dc257949f08241e10632febffb61f8371a58b1f4f74a3ba6549d535f514e61280649d98b44c1d5be5235cc8be2d861fd8cbc2722938fade549c130acc2f3f071bf00f236a1a3af8b3b34e7b782d5e017789b61f47c63ff7ef922486debe0f8c1ab10395b6edebf529143ea8f1cac52872303a70e795c9316fc64dc0aab1e733fcefb9617fada8b0e26ac20b970b8d7f7ff7bf29288fab2189", 0xea, 0x62}, {&(0x7f0000000600)="dd02e73e4c811356f3aaf30db9cc42ec6a2f2275f5a6b8987e9d891161a320d4c2554fb09baf2e9f5ccf44b9487de6a295a9d229a9faa541c20fb6bc907bbe043d087c4ff4b41509527b0470a38f002b17089eaf9fef7ddb32a683e0fe88da6f2f709f87bf5d36285563599f66d6c3722256cecf15b84500736dbab6", 0x7c, 0x200}, {&(0x7f0000000680)="4dec32614cf054998476a197bdf20c26ddbaa038a1711724291a5959066089954c9f03bdb86160e5269d4c05eb313a7a988eb1e2da139c239765da30f59f162a2422b42e0b4dd235945eddcf51f07df24611e2cbb6dcf845fded97a4abc83fdae90d40cb64cab653050a5e71023f2851370c84110ea011a7ae35d2c96de4f8a4ac5173c7", 0x84, 0x4}, {&(0x7f0000000740)="129cc8ce13864e5d41cfd8835a1a393416af7db5a6a8360ed15d0b49dbeff08c13fc3a5db5cd51d614dbcbbcaba55426ad6f827df7bb9504ccad3548f1b08253062f2328db4c157f4195c9bb7c7f21be901c25fe0be6a439fce6206e306857fd546d61b5c40edd3569717e81a3bb9fbc880b5e7caf5329c079c9ff5b07d10ce58e222089728f19db72c79ef7687da2967b19aee16362a4a73a8221cfb45c679b4743e11b44bbc89b6537f96f0e83e9f5e0a4f456598afcbe9ce1", 0xba, 0x10001}], 0x2, &(0x7f0000000880)={[{@fat=@dmask={'dmask', 0x3d, 0x80000000}}, {@utf8no}, {@shortname_winnt}], [{@dont_appraise}, {@measure}, {@fsname={'fsname', 0x3d, '\\^/\''}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) r1 = getpid() r2 = pidfd_open(r1, 0x0) pidfd_send_signal(r2, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) r3 = getpid() r4 = pidfd_open(r3, 0x0) pidfd_send_signal(r4, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) epoll_create(0x0) 14:57:04 executing program 3: setgroups(0x4000000000000352, &(0x7f0000000300)=[0x0, 0x0]) getegid() memfd_secret(0x0) r0 = getpid() pidfd_open(r0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x9, 0x4, &(0x7f0000000800)=[{&(0x7f00000001c0)="506ace23e53df1153d4e7fff401c1b280455c9f815e907aedf3d707b795691a151c379e1ea4c073dfd0acbef4066510713e41d20d982f1ee563cc6ed994a7f5e9c373d81edeadababa257bfc6179410ead9dc257949f08241e10632febffb61f8371a58b1f4f74a3ba6549d535f514e61280649d98b44c1d5be5235cc8be2d861fd8cbc2722938fade549c130acc2f3f071bf00f236a1a3af8b3b34e7b782d5e017789b61f47c63ff7ef922486debe0f8c1ab10395b6edebf529143ea8f1cac52872303a70e795c9316fc64dc0aab1e733fcefb9617fada8b0e26ac20b970b8d7f7ff7bf29288fab2189", 0xea, 0x62}, {&(0x7f0000000600)="dd02e73e4c811356f3aaf30db9cc42ec6a2f2275f5a6b8987e9d891161a320d4c2554fb09baf2e9f5ccf44b9487de6a295a9d229a9faa541c20fb6bc907bbe043d087c4ff4b41509527b0470a38f002b17089eaf9fef7ddb32a683e0fe88da6f2f709f87bf5d36285563599f66d6c3722256cecf15b84500736dbab6", 0x7c, 0x200}, {&(0x7f0000000680)="4dec32614cf054998476a197bdf20c26ddbaa038a1711724291a5959066089954c9f03bdb86160e5269d4c05eb313a7a988eb1e2da139c239765da30f59f162a2422b42e0b4dd235945eddcf51f07df24611e2cbb6dcf845fded97a4abc83fdae90d40cb64cab653050a5e71023f2851370c84110ea011a7ae35d2c96de4f8a4ac5173c7", 0x84, 0x4}, {&(0x7f0000000740)="129cc8ce13864e5d41cfd8835a1a393416af7db5a6a8360ed15d0b49dbeff08c13fc3a5db5cd51d614dbcbbcaba55426ad6f827df7bb9504ccad3548f1b08253062f2328db4c157f4195c9bb7c7f21be901c25fe0be6a439fce6206e306857fd546d61b5c40edd3569717e81a3bb9fbc880b5e7caf5329c079c9ff5b07d10ce58e222089728f19db72c79ef7687da2967b19aee16362a4a73a8221cfb45c679b4743e11b44bbc89b6537f96f0e83e9f5e0a4f456598afcbe9ce1", 0xba, 0x10001}], 0x2, &(0x7f0000000880)={[{@fat=@dmask={'dmask', 0x3d, 0x80000000}}, {@utf8no}, {@shortname_winnt}], [{@dont_appraise}, {@measure}, {@fsname={'fsname', 0x3d, '\\^/\''}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) r1 = getpid() r2 = pidfd_open(r1, 0x0) pidfd_send_signal(r2, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) r3 = getpid() r4 = pidfd_open(r3, 0x0) pidfd_send_signal(r4, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) epoll_create(0x0) 14:57:04 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f00000021c0)='./file0\x00', 0xa0000158) r2 = dup2(r1, r0) ioctl$FIONREAD(r2, 0x541b, &(0x7f00000000c0)) 14:57:04 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) dup3(r0, r1, 0x0) openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) [ 133.399804] loop3: detected capacity change from 0 to 256 [ 133.439042] loop2: detected capacity change from 0 to 256 14:57:04 executing program 6: msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000140)=""/188) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r0, 0xf507, 0x0) sendfile(r2, r1, 0x0, 0xdb8a) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6, 0x3, 0x9, 0x5, 0x0, 0x40, 0x40c0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000080), 0xd}, 0x40111, 0x2, 0x8, 0x7, 0x400, 0x3, 0x401, 0x0, 0x400, 0x0, 0x3}, 0xffffffffffffffff, 0xc, r1, 0x1) msgctl$IPC_RMID(0x0, 0x0) msgctl$MSG_STAT_ANY(0x0, 0xd, &(0x7f00000007c0)=""/243) msgctl$IPC_RMID(0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/asound/seq/clients\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x10000027f) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32, @ANYBLOB="04000200000000002e2f66696c653100"]) 14:57:04 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f00000021c0)='./file0\x00', 0xa0000158) r2 = dup2(r1, r0) ioctl$FIONREAD(r2, 0x541b, &(0x7f00000000c0)) 14:57:04 executing program 3: setgroups(0x4000000000000352, &(0x7f0000000300)=[0x0, 0x0]) getegid() memfd_secret(0x0) r0 = getpid() pidfd_open(r0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x9, 0x4, &(0x7f0000000800)=[{&(0x7f00000001c0)="506ace23e53df1153d4e7fff401c1b280455c9f815e907aedf3d707b795691a151c379e1ea4c073dfd0acbef4066510713e41d20d982f1ee563cc6ed994a7f5e9c373d81edeadababa257bfc6179410ead9dc257949f08241e10632febffb61f8371a58b1f4f74a3ba6549d535f514e61280649d98b44c1d5be5235cc8be2d861fd8cbc2722938fade549c130acc2f3f071bf00f236a1a3af8b3b34e7b782d5e017789b61f47c63ff7ef922486debe0f8c1ab10395b6edebf529143ea8f1cac52872303a70e795c9316fc64dc0aab1e733fcefb9617fada8b0e26ac20b970b8d7f7ff7bf29288fab2189", 0xea, 0x62}, {&(0x7f0000000600)="dd02e73e4c811356f3aaf30db9cc42ec6a2f2275f5a6b8987e9d891161a320d4c2554fb09baf2e9f5ccf44b9487de6a295a9d229a9faa541c20fb6bc907bbe043d087c4ff4b41509527b0470a38f002b17089eaf9fef7ddb32a683e0fe88da6f2f709f87bf5d36285563599f66d6c3722256cecf15b84500736dbab6", 0x7c, 0x200}, {&(0x7f0000000680)="4dec32614cf054998476a197bdf20c26ddbaa038a1711724291a5959066089954c9f03bdb86160e5269d4c05eb313a7a988eb1e2da139c239765da30f59f162a2422b42e0b4dd235945eddcf51f07df24611e2cbb6dcf845fded97a4abc83fdae90d40cb64cab653050a5e71023f2851370c84110ea011a7ae35d2c96de4f8a4ac5173c7", 0x84, 0x4}, {&(0x7f0000000740)="129cc8ce13864e5d41cfd8835a1a393416af7db5a6a8360ed15d0b49dbeff08c13fc3a5db5cd51d614dbcbbcaba55426ad6f827df7bb9504ccad3548f1b08253062f2328db4c157f4195c9bb7c7f21be901c25fe0be6a439fce6206e306857fd546d61b5c40edd3569717e81a3bb9fbc880b5e7caf5329c079c9ff5b07d10ce58e222089728f19db72c79ef7687da2967b19aee16362a4a73a8221cfb45c679b4743e11b44bbc89b6537f96f0e83e9f5e0a4f456598afcbe9ce1", 0xba, 0x10001}], 0x2, &(0x7f0000000880)={[{@fat=@dmask={'dmask', 0x3d, 0x80000000}}, {@utf8no}, {@shortname_winnt}], [{@dont_appraise}, {@measure}, {@fsname={'fsname', 0x3d, '\\^/\''}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) r1 = getpid() r2 = pidfd_open(r1, 0x0) pidfd_send_signal(r2, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) r3 = getpid() r4 = pidfd_open(r3, 0x0) pidfd_send_signal(r4, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) epoll_create(0x0) 14:57:04 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) dup3(r0, r1, 0x0) openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) 14:57:04 executing program 2: setgroups(0x4000000000000352, &(0x7f0000000300)=[0x0, 0x0]) getegid() memfd_secret(0x0) r0 = getpid() pidfd_open(r0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x9, 0x4, &(0x7f0000000800)=[{&(0x7f00000001c0)="506ace23e53df1153d4e7fff401c1b280455c9f815e907aedf3d707b795691a151c379e1ea4c073dfd0acbef4066510713e41d20d982f1ee563cc6ed994a7f5e9c373d81edeadababa257bfc6179410ead9dc257949f08241e10632febffb61f8371a58b1f4f74a3ba6549d535f514e61280649d98b44c1d5be5235cc8be2d861fd8cbc2722938fade549c130acc2f3f071bf00f236a1a3af8b3b34e7b782d5e017789b61f47c63ff7ef922486debe0f8c1ab10395b6edebf529143ea8f1cac52872303a70e795c9316fc64dc0aab1e733fcefb9617fada8b0e26ac20b970b8d7f7ff7bf29288fab2189", 0xea, 0x62}, {&(0x7f0000000600)="dd02e73e4c811356f3aaf30db9cc42ec6a2f2275f5a6b8987e9d891161a320d4c2554fb09baf2e9f5ccf44b9487de6a295a9d229a9faa541c20fb6bc907bbe043d087c4ff4b41509527b0470a38f002b17089eaf9fef7ddb32a683e0fe88da6f2f709f87bf5d36285563599f66d6c3722256cecf15b84500736dbab6", 0x7c, 0x200}, {&(0x7f0000000680)="4dec32614cf054998476a197bdf20c26ddbaa038a1711724291a5959066089954c9f03bdb86160e5269d4c05eb313a7a988eb1e2da139c239765da30f59f162a2422b42e0b4dd235945eddcf51f07df24611e2cbb6dcf845fded97a4abc83fdae90d40cb64cab653050a5e71023f2851370c84110ea011a7ae35d2c96de4f8a4ac5173c7", 0x84, 0x4}, {&(0x7f0000000740)="129cc8ce13864e5d41cfd8835a1a393416af7db5a6a8360ed15d0b49dbeff08c13fc3a5db5cd51d614dbcbbcaba55426ad6f827df7bb9504ccad3548f1b08253062f2328db4c157f4195c9bb7c7f21be901c25fe0be6a439fce6206e306857fd546d61b5c40edd3569717e81a3bb9fbc880b5e7caf5329c079c9ff5b07d10ce58e222089728f19db72c79ef7687da2967b19aee16362a4a73a8221cfb45c679b4743e11b44bbc89b6537f96f0e83e9f5e0a4f456598afcbe9ce1", 0xba, 0x10001}], 0x2, &(0x7f0000000880)={[{@fat=@dmask={'dmask', 0x3d, 0x80000000}}, {@utf8no}, {@shortname_winnt}], [{@dont_appraise}, {@measure}, {@fsname={'fsname', 0x3d, '\\^/\''}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) r1 = getpid() r2 = pidfd_open(r1, 0x0) pidfd_send_signal(r2, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) r3 = getpid() r4 = pidfd_open(r3, 0x0) pidfd_send_signal(r4, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) epoll_create(0x0) [ 133.635717] loop3: detected capacity change from 0 to 256 14:57:04 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f00000021c0)='./file0\x00', 0xa0000158) r2 = dup2(r1, r0) ioctl$FIONREAD(r2, 0x541b, &(0x7f00000000c0)) [ 133.657017] loop2: detected capacity change from 0 to 256 14:57:04 executing program 1: msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000140)=""/188) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r0, 0xf507, 0x0) sendfile(r2, r1, 0x0, 0xdb8a) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6, 0x3, 0x9, 0x5, 0x0, 0x40, 0x40c0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000080), 0xd}, 0x40111, 0x2, 0x8, 0x7, 0x400, 0x3, 0x401, 0x0, 0x400, 0x0, 0x3}, 0xffffffffffffffff, 0xc, r1, 0x1) msgctl$IPC_RMID(0x0, 0x0) msgctl$MSG_STAT_ANY(0x0, 0xd, &(0x7f00000007c0)=""/243) msgctl$IPC_RMID(0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/asound/seq/clients\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x10000027f) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32, @ANYBLOB="04000200000000002e2f66696c653100"]) 14:57:04 executing program 5: msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000140)=""/188) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r0, 0xf507, 0x0) sendfile(r2, r1, 0x0, 0xdb8a) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6, 0x3, 0x9, 0x5, 0x0, 0x40, 0x40c0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000080), 0xd}, 0x40111, 0x2, 0x8, 0x7, 0x400, 0x3, 0x401, 0x0, 0x400, 0x0, 0x3}, 0xffffffffffffffff, 0xc, r1, 0x1) msgctl$IPC_RMID(0x0, 0x0) msgctl$MSG_STAT_ANY(0x0, 0xd, &(0x7f00000007c0)=""/243) msgctl$IPC_RMID(0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/asound/seq/clients\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x10000027f) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32, @ANYBLOB="04000200000000002e2f66696c653100"]) 14:57:04 executing program 7: syz_mount_image$vfat(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f00000021c0)='./file0\x00', 0xa0000158) r2 = dup2(r1, r0) ioctl$FIONREAD(r2, 0x541b, &(0x7f00000000c0)) 14:57:04 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) dup3(r0, r1, 0x0) openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(0x0, 0x0) 14:57:05 executing program 3: setgroups(0x4000000000000352, &(0x7f0000000300)=[0x0, 0x0]) getegid() memfd_secret(0x0) r0 = getpid() pidfd_open(r0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x9, 0x4, &(0x7f0000000800)=[{&(0x7f00000001c0)="506ace23e53df1153d4e7fff401c1b280455c9f815e907aedf3d707b795691a151c379e1ea4c073dfd0acbef4066510713e41d20d982f1ee563cc6ed994a7f5e9c373d81edeadababa257bfc6179410ead9dc257949f08241e10632febffb61f8371a58b1f4f74a3ba6549d535f514e61280649d98b44c1d5be5235cc8be2d861fd8cbc2722938fade549c130acc2f3f071bf00f236a1a3af8b3b34e7b782d5e017789b61f47c63ff7ef922486debe0f8c1ab10395b6edebf529143ea8f1cac52872303a70e795c9316fc64dc0aab1e733fcefb9617fada8b0e26ac20b970b8d7f7ff7bf29288fab2189", 0xea, 0x62}, {&(0x7f0000000600)="dd02e73e4c811356f3aaf30db9cc42ec6a2f2275f5a6b8987e9d891161a320d4c2554fb09baf2e9f5ccf44b9487de6a295a9d229a9faa541c20fb6bc907bbe043d087c4ff4b41509527b0470a38f002b17089eaf9fef7ddb32a683e0fe88da6f2f709f87bf5d36285563599f66d6c3722256cecf15b84500736dbab6", 0x7c, 0x200}, {&(0x7f0000000680)="4dec32614cf054998476a197bdf20c26ddbaa038a1711724291a5959066089954c9f03bdb86160e5269d4c05eb313a7a988eb1e2da139c239765da30f59f162a2422b42e0b4dd235945eddcf51f07df24611e2cbb6dcf845fded97a4abc83fdae90d40cb64cab653050a5e71023f2851370c84110ea011a7ae35d2c96de4f8a4ac5173c7", 0x84, 0x4}, {&(0x7f0000000740)="129cc8ce13864e5d41cfd8835a1a393416af7db5a6a8360ed15d0b49dbeff08c13fc3a5db5cd51d614dbcbbcaba55426ad6f827df7bb9504ccad3548f1b08253062f2328db4c157f4195c9bb7c7f21be901c25fe0be6a439fce6206e306857fd546d61b5c40edd3569717e81a3bb9fbc880b5e7caf5329c079c9ff5b07d10ce58e222089728f19db72c79ef7687da2967b19aee16362a4a73a8221cfb45c679b4743e11b44bbc89b6537f96f0e83e9f5e0a4f456598afcbe9ce1", 0xba, 0x10001}], 0x2, &(0x7f0000000880)={[{@fat=@dmask={'dmask', 0x3d, 0x80000000}}, {@utf8no}, {@shortname_winnt}], [{@dont_appraise}, {@measure}, {@fsname={'fsname', 0x3d, '\\^/\''}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) r1 = getpid() r2 = pidfd_open(r1, 0x0) pidfd_send_signal(r2, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) r3 = getpid() r4 = pidfd_open(r3, 0x0) pidfd_send_signal(r4, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) epoll_create(0x0) 14:57:05 executing program 2: setgroups(0x4000000000000352, &(0x7f0000000300)=[0x0, 0x0]) getegid() memfd_secret(0x0) r0 = getpid() pidfd_open(r0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x9, 0x4, &(0x7f0000000800)=[{&(0x7f00000001c0)="506ace23e53df1153d4e7fff401c1b280455c9f815e907aedf3d707b795691a151c379e1ea4c073dfd0acbef4066510713e41d20d982f1ee563cc6ed994a7f5e9c373d81edeadababa257bfc6179410ead9dc257949f08241e10632febffb61f8371a58b1f4f74a3ba6549d535f514e61280649d98b44c1d5be5235cc8be2d861fd8cbc2722938fade549c130acc2f3f071bf00f236a1a3af8b3b34e7b782d5e017789b61f47c63ff7ef922486debe0f8c1ab10395b6edebf529143ea8f1cac52872303a70e795c9316fc64dc0aab1e733fcefb9617fada8b0e26ac20b970b8d7f7ff7bf29288fab2189", 0xea, 0x62}, {&(0x7f0000000600)="dd02e73e4c811356f3aaf30db9cc42ec6a2f2275f5a6b8987e9d891161a320d4c2554fb09baf2e9f5ccf44b9487de6a295a9d229a9faa541c20fb6bc907bbe043d087c4ff4b41509527b0470a38f002b17089eaf9fef7ddb32a683e0fe88da6f2f709f87bf5d36285563599f66d6c3722256cecf15b84500736dbab6", 0x7c, 0x200}, {&(0x7f0000000680)="4dec32614cf054998476a197bdf20c26ddbaa038a1711724291a5959066089954c9f03bdb86160e5269d4c05eb313a7a988eb1e2da139c239765da30f59f162a2422b42e0b4dd235945eddcf51f07df24611e2cbb6dcf845fded97a4abc83fdae90d40cb64cab653050a5e71023f2851370c84110ea011a7ae35d2c96de4f8a4ac5173c7", 0x84, 0x4}, {&(0x7f0000000740)="129cc8ce13864e5d41cfd8835a1a393416af7db5a6a8360ed15d0b49dbeff08c13fc3a5db5cd51d614dbcbbcaba55426ad6f827df7bb9504ccad3548f1b08253062f2328db4c157f4195c9bb7c7f21be901c25fe0be6a439fce6206e306857fd546d61b5c40edd3569717e81a3bb9fbc880b5e7caf5329c079c9ff5b07d10ce58e222089728f19db72c79ef7687da2967b19aee16362a4a73a8221cfb45c679b4743e11b44bbc89b6537f96f0e83e9f5e0a4f456598afcbe9ce1", 0xba, 0x10001}], 0x2, &(0x7f0000000880)={[{@fat=@dmask={'dmask', 0x3d, 0x80000000}}, {@utf8no}, {@shortname_winnt}], [{@dont_appraise}, {@measure}, {@fsname={'fsname', 0x3d, '\\^/\''}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) r1 = getpid() r2 = pidfd_open(r1, 0x0) pidfd_send_signal(r2, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) r3 = getpid() r4 = pidfd_open(r3, 0x0) pidfd_send_signal(r4, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) epoll_create(0x0) 14:57:05 executing program 7: syz_mount_image$vfat(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f00000021c0)='./file0\x00', 0xa0000158) r2 = dup2(r1, r0) ioctl$FIONREAD(r2, 0x541b, &(0x7f00000000c0)) 14:57:05 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f00000021c0)='./file0\x00', 0xa0000158) r2 = dup2(r1, r0) ioctl$FIONREAD(r2, 0x541b, &(0x7f00000000c0)) [ 133.824800] loop3: detected capacity change from 0 to 256 14:57:05 executing program 4: setgroups(0x4000000000000352, &(0x7f0000000300)=[0x0, 0x0]) getegid() memfd_secret(0x0) r0 = getpid() pidfd_open(r0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x9, 0x4, &(0x7f0000000800)=[{&(0x7f00000001c0)="506ace23e53df1153d4e7fff401c1b280455c9f815e907aedf3d707b795691a151c379e1ea4c073dfd0acbef4066510713e41d20d982f1ee563cc6ed994a7f5e9c373d81edeadababa257bfc6179410ead9dc257949f08241e10632febffb61f8371a58b1f4f74a3ba6549d535f514e61280649d98b44c1d5be5235cc8be2d861fd8cbc2722938fade549c130acc2f3f071bf00f236a1a3af8b3b34e7b782d5e017789b61f47c63ff7ef922486debe0f8c1ab10395b6edebf529143ea8f1cac52872303a70e795c9316fc64dc0aab1e733fcefb9617fada8b0e26ac20b970b8d7f7ff7bf29288fab2189", 0xea, 0x62}, {&(0x7f0000000600)="dd02e73e4c811356f3aaf30db9cc42ec6a2f2275f5a6b8987e9d891161a320d4c2554fb09baf2e9f5ccf44b9487de6a295a9d229a9faa541c20fb6bc907bbe043d087c4ff4b41509527b0470a38f002b17089eaf9fef7ddb32a683e0fe88da6f2f709f87bf5d36285563599f66d6c3722256cecf15b84500736dbab6", 0x7c, 0x200}, {&(0x7f0000000680)="4dec32614cf054998476a197bdf20c26ddbaa038a1711724291a5959066089954c9f03bdb86160e5269d4c05eb313a7a988eb1e2da139c239765da30f59f162a2422b42e0b4dd235945eddcf51f07df24611e2cbb6dcf845fded97a4abc83fdae90d40cb64cab653050a5e71023f2851370c84110ea011a7ae35d2c96de4f8a4ac5173c7", 0x84, 0x4}, {&(0x7f0000000740)="129cc8ce13864e5d41cfd8835a1a393416af7db5a6a8360ed15d0b49dbeff08c13fc3a5db5cd51d614dbcbbcaba55426ad6f827df7bb9504ccad3548f1b08253062f2328db4c157f4195c9bb7c7f21be901c25fe0be6a439fce6206e306857fd546d61b5c40edd3569717e81a3bb9fbc880b5e7caf5329c079c9ff5b07d10ce58e222089728f19db72c79ef7687da2967b19aee16362a4a73a8221cfb45c679b4743e11b44bbc89b6537f96f0e83e9f5e0a4f456598afcbe9ce1", 0xba, 0x10001}], 0x2, &(0x7f0000000880)={[{@fat=@dmask={'dmask', 0x3d, 0x80000000}}, {@utf8no}, {@shortname_winnt}], [{@dont_appraise}, {@measure}, {@fsname={'fsname', 0x3d, '\\^/\''}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) r1 = getpid() r2 = pidfd_open(r1, 0x0) pidfd_send_signal(r2, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) r3 = getpid() r4 = pidfd_open(r3, 0x0) pidfd_send_signal(r4, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) epoll_create(0x0) [ 133.873133] loop2: detected capacity change from 0 to 256 14:57:05 executing program 7: syz_mount_image$vfat(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f00000021c0)='./file0\x00', 0xa0000158) r2 = dup2(r1, r0) ioctl$FIONREAD(r2, 0x541b, &(0x7f00000000c0)) [ 134.071698] loop4: detected capacity change from 0 to 256 14:57:05 executing program 6: msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000140)=""/188) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r0, 0xf507, 0x0) sendfile(r2, r1, 0x0, 0xdb8a) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6, 0x3, 0x9, 0x5, 0x0, 0x40, 0x40c0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000080), 0xd}, 0x40111, 0x2, 0x8, 0x7, 0x400, 0x3, 0x401, 0x0, 0x400, 0x0, 0x3}, 0xffffffffffffffff, 0xc, r1, 0x1) msgctl$IPC_RMID(0x0, 0x0) msgctl$MSG_STAT_ANY(0x0, 0xd, &(0x7f00000007c0)=""/243) msgctl$IPC_RMID(0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/asound/seq/clients\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x10000027f) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32, @ANYBLOB="04000200000000002e2f66696c653100"]) 14:57:05 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$sock_linger(r0, 0x1, 0x3d, &(0x7f0000000040)={0x0, 0x1000000}, 0x8) 14:57:05 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f00000021c0)='./file0\x00', 0xa0000158) r2 = dup2(r1, r0) ioctl$FIONREAD(r2, 0x541b, &(0x7f00000000c0)) 14:57:05 executing program 3: r0 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup2(r1, r0) listen(r2, 0x0) 14:57:05 executing program 4: setgroups(0x4000000000000352, &(0x7f0000000300)=[0x0, 0x0]) getegid() memfd_secret(0x0) r0 = getpid() pidfd_open(r0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x9, 0x4, &(0x7f0000000800)=[{&(0x7f00000001c0)="506ace23e53df1153d4e7fff401c1b280455c9f815e907aedf3d707b795691a151c379e1ea4c073dfd0acbef4066510713e41d20d982f1ee563cc6ed994a7f5e9c373d81edeadababa257bfc6179410ead9dc257949f08241e10632febffb61f8371a58b1f4f74a3ba6549d535f514e61280649d98b44c1d5be5235cc8be2d861fd8cbc2722938fade549c130acc2f3f071bf00f236a1a3af8b3b34e7b782d5e017789b61f47c63ff7ef922486debe0f8c1ab10395b6edebf529143ea8f1cac52872303a70e795c9316fc64dc0aab1e733fcefb9617fada8b0e26ac20b970b8d7f7ff7bf29288fab2189", 0xea, 0x62}, {&(0x7f0000000600)="dd02e73e4c811356f3aaf30db9cc42ec6a2f2275f5a6b8987e9d891161a320d4c2554fb09baf2e9f5ccf44b9487de6a295a9d229a9faa541c20fb6bc907bbe043d087c4ff4b41509527b0470a38f002b17089eaf9fef7ddb32a683e0fe88da6f2f709f87bf5d36285563599f66d6c3722256cecf15b84500736dbab6", 0x7c, 0x200}, {&(0x7f0000000680)="4dec32614cf054998476a197bdf20c26ddbaa038a1711724291a5959066089954c9f03bdb86160e5269d4c05eb313a7a988eb1e2da139c239765da30f59f162a2422b42e0b4dd235945eddcf51f07df24611e2cbb6dcf845fded97a4abc83fdae90d40cb64cab653050a5e71023f2851370c84110ea011a7ae35d2c96de4f8a4ac5173c7", 0x84, 0x4}, {&(0x7f0000000740)="129cc8ce13864e5d41cfd8835a1a393416af7db5a6a8360ed15d0b49dbeff08c13fc3a5db5cd51d614dbcbbcaba55426ad6f827df7bb9504ccad3548f1b08253062f2328db4c157f4195c9bb7c7f21be901c25fe0be6a439fce6206e306857fd546d61b5c40edd3569717e81a3bb9fbc880b5e7caf5329c079c9ff5b07d10ce58e222089728f19db72c79ef7687da2967b19aee16362a4a73a8221cfb45c679b4743e11b44bbc89b6537f96f0e83e9f5e0a4f456598afcbe9ce1", 0xba, 0x10001}], 0x2, &(0x7f0000000880)={[{@fat=@dmask={'dmask', 0x3d, 0x80000000}}, {@utf8no}, {@shortname_winnt}], [{@dont_appraise}, {@measure}, {@fsname={'fsname', 0x3d, '\\^/\''}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) r1 = getpid() r2 = pidfd_open(r1, 0x0) pidfd_send_signal(r2, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) r3 = getpid() r4 = pidfd_open(r3, 0x0) pidfd_send_signal(r4, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) epoll_create(0x0) 14:57:05 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r0, 0x0, 0x0, 0x0, 0x0) 14:57:05 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000080)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@empty}}, 0xae) close(r0) 14:57:05 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18}, './file0\x00'}) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f0000001700)={0x0, 0x2}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000500)=ANY=[@ANYRESHEX, @ANYRES32, @ANYRES64, @ANYRESHEX, @ANYRES64, @ANYRESDEC, @ANYRES64, @ANYRES32, @ANYRESOCT]) fstat(r1, &(0x7f0000000a40)) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0xa8420, &(0x7f0000000940)={'trans=unix,', {[{@cache_fscache}, {@access_client}, {@access_any}, {@access_uid={'access', 0x3d, 0xee01}}, {@privport}, {@dfltgid={'dfltgid', 0x3d, r2}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, 'environ\x00'}}, {@subj_role={'subj_role', 0x3d, 'environ\x00'}}, {@euid_eq={'euid', 0x3d, r3}}, {@measure}]}}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000ac0)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@private1}, 0x0, @in=@private}}, &(0x7f0000000bc0)=0xe8) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0xa8420, &(0x7f0000000300)={'trans=unix,', {[{@cache_fscache}, {@access_client}, {@access_any}, {@access_uid={'access', 0x3d, 0xee01}}, {@privport}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, 'environ\x00'}}, {@subj_role={'subj_role', 0x3d, 'environ\x00'}}, {@euid_eq={'euid', 0x3d, r5}}, {@measure}]}}) pwritev(r1, &(0x7f0000000380)=[{&(0x7f0000000000)='5', 0x1}], 0x1, 0x0, 0x0) getdents(r0, &(0x7f0000000000)=""/94, 0x20000018) fstat(0xffffffffffffffff, &(0x7f0000000400)) [ 134.293626] loop4: detected capacity change from 0 to 256 14:57:05 executing program 3: r0 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup2(r1, r0) listen(r2, 0x0) 14:57:05 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000080)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@empty}}, 0xae) close(r0) 14:57:05 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$sock_linger(r0, 0x1, 0x3d, &(0x7f0000000040)={0x0, 0x1000000}, 0x8) 14:57:05 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f00000021c0)='./file0\x00', 0xa0000158) r2 = dup2(r1, r0) ioctl$FIONREAD(r2, 0x541b, &(0x7f00000000c0)) 14:57:05 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r0, 0x0, 0x0, 0x0, 0x0) 14:57:05 executing program 4: setgroups(0x4000000000000352, &(0x7f0000000300)=[0x0, 0x0]) getegid() memfd_secret(0x0) r0 = getpid() pidfd_open(r0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x9, 0x4, &(0x7f0000000800)=[{&(0x7f00000001c0)="506ace23e53df1153d4e7fff401c1b280455c9f815e907aedf3d707b795691a151c379e1ea4c073dfd0acbef4066510713e41d20d982f1ee563cc6ed994a7f5e9c373d81edeadababa257bfc6179410ead9dc257949f08241e10632febffb61f8371a58b1f4f74a3ba6549d535f514e61280649d98b44c1d5be5235cc8be2d861fd8cbc2722938fade549c130acc2f3f071bf00f236a1a3af8b3b34e7b782d5e017789b61f47c63ff7ef922486debe0f8c1ab10395b6edebf529143ea8f1cac52872303a70e795c9316fc64dc0aab1e733fcefb9617fada8b0e26ac20b970b8d7f7ff7bf29288fab2189", 0xea, 0x62}, {&(0x7f0000000600)="dd02e73e4c811356f3aaf30db9cc42ec6a2f2275f5a6b8987e9d891161a320d4c2554fb09baf2e9f5ccf44b9487de6a295a9d229a9faa541c20fb6bc907bbe043d087c4ff4b41509527b0470a38f002b17089eaf9fef7ddb32a683e0fe88da6f2f709f87bf5d36285563599f66d6c3722256cecf15b84500736dbab6", 0x7c, 0x200}, {&(0x7f0000000680)="4dec32614cf054998476a197bdf20c26ddbaa038a1711724291a5959066089954c9f03bdb86160e5269d4c05eb313a7a988eb1e2da139c239765da30f59f162a2422b42e0b4dd235945eddcf51f07df24611e2cbb6dcf845fded97a4abc83fdae90d40cb64cab653050a5e71023f2851370c84110ea011a7ae35d2c96de4f8a4ac5173c7", 0x84, 0x4}, {&(0x7f0000000740)="129cc8ce13864e5d41cfd8835a1a393416af7db5a6a8360ed15d0b49dbeff08c13fc3a5db5cd51d614dbcbbcaba55426ad6f827df7bb9504ccad3548f1b08253062f2328db4c157f4195c9bb7c7f21be901c25fe0be6a439fce6206e306857fd546d61b5c40edd3569717e81a3bb9fbc880b5e7caf5329c079c9ff5b07d10ce58e222089728f19db72c79ef7687da2967b19aee16362a4a73a8221cfb45c679b4743e11b44bbc89b6537f96f0e83e9f5e0a4f456598afcbe9ce1", 0xba, 0x10001}], 0x2, &(0x7f0000000880)={[{@fat=@dmask={'dmask', 0x3d, 0x80000000}}, {@utf8no}, {@shortname_winnt}], [{@dont_appraise}, {@measure}, {@fsname={'fsname', 0x3d, '\\^/\''}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) r1 = getpid() r2 = pidfd_open(r1, 0x0) pidfd_send_signal(r2, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) r3 = getpid() r4 = pidfd_open(r3, 0x0) pidfd_send_signal(r4, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffa}, 0x0) epoll_create(0x0) 14:57:05 executing program 3: r0 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup2(r1, r0) listen(r2, 0x0) 14:57:05 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000080)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@empty}}, 0xae) close(r0) [ 134.536102] loop4: detected capacity change from 0 to 256 14:57:06 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000080)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@empty}}, 0xae) close(r0) 14:57:06 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$sock_linger(r0, 0x1, 0x3d, &(0x7f0000000040)={0x0, 0x1000000}, 0x8) 14:57:06 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r0, 0x0, 0x0, 0x0, 0x0) 14:57:06 executing program 4: r0 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup2(r1, r0) listen(r2, 0x0) 14:57:06 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000080)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@empty}}, 0xae) close(r0) 14:57:06 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18}, './file0\x00'}) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f0000001700)={0x0, 0x2}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000500)=ANY=[@ANYRESHEX, @ANYRES32, @ANYRES64, @ANYRESHEX, @ANYRES64, @ANYRESDEC, @ANYRES64, @ANYRES32, @ANYRESOCT]) fstat(r1, &(0x7f0000000a40)) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0xa8420, &(0x7f0000000940)={'trans=unix,', {[{@cache_fscache}, {@access_client}, {@access_any}, {@access_uid={'access', 0x3d, 0xee01}}, {@privport}, {@dfltgid={'dfltgid', 0x3d, r2}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, 'environ\x00'}}, {@subj_role={'subj_role', 0x3d, 'environ\x00'}}, {@euid_eq={'euid', 0x3d, r3}}, {@measure}]}}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000ac0)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@private1}, 0x0, @in=@private}}, &(0x7f0000000bc0)=0xe8) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0xa8420, &(0x7f0000000300)={'trans=unix,', {[{@cache_fscache}, {@access_client}, {@access_any}, {@access_uid={'access', 0x3d, 0xee01}}, {@privport}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, 'environ\x00'}}, {@subj_role={'subj_role', 0x3d, 'environ\x00'}}, {@euid_eq={'euid', 0x3d, r5}}, {@measure}]}}) pwritev(r1, &(0x7f0000000380)=[{&(0x7f0000000000)='5', 0x1}], 0x1, 0x0, 0x0) getdents(r0, &(0x7f0000000000)=""/94, 0x20000018) fstat(0xffffffffffffffff, &(0x7f0000000400)) 14:57:06 executing program 3: r0 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup2(r1, r0) listen(r2, 0x0) 14:57:06 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18}, './file0\x00'}) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f0000001700)={0x0, 0x2}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000500)=ANY=[@ANYRESHEX, @ANYRES32, @ANYRES64, @ANYRESHEX, @ANYRES64, @ANYRESDEC, @ANYRES64, @ANYRES32, @ANYRESOCT]) fstat(r1, &(0x7f0000000a40)) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0xa8420, &(0x7f0000000940)={'trans=unix,', {[{@cache_fscache}, {@access_client}, {@access_any}, {@access_uid={'access', 0x3d, 0xee01}}, {@privport}, {@dfltgid={'dfltgid', 0x3d, r2}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, 'environ\x00'}}, {@subj_role={'subj_role', 0x3d, 'environ\x00'}}, {@euid_eq={'euid', 0x3d, r3}}, {@measure}]}}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000ac0)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@private1}, 0x0, @in=@private}}, &(0x7f0000000bc0)=0xe8) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0xa8420, &(0x7f0000000300)={'trans=unix,', {[{@cache_fscache}, {@access_client}, {@access_any}, {@access_uid={'access', 0x3d, 0xee01}}, {@privport}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, 'environ\x00'}}, {@subj_role={'subj_role', 0x3d, 'environ\x00'}}, {@euid_eq={'euid', 0x3d, r5}}, {@measure}]}}) pwritev(r1, &(0x7f0000000380)=[{&(0x7f0000000000)='5', 0x1}], 0x1, 0x0, 0x0) getdents(r0, &(0x7f0000000000)=""/94, 0x20000018) fstat(0xffffffffffffffff, &(0x7f0000000400)) 14:57:06 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000080)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@empty}}, 0xae) close(r0) 14:57:06 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$sock_linger(r0, 0x1, 0x3d, &(0x7f0000000040)={0x0, 0x1000000}, 0x8) 14:57:06 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$inet(r0, &(0x7f0000002d00)={&(0x7f0000002600)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000002d40)=[@ip_retopts={{0x10}}, @ip_retopts={{0x18, 0x0, 0x7, {[@cipso={0x86, 0x6}]}}}], 0x28}, 0x0) 14:57:06 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r0, 0x0, 0x0, 0x0, 0x0) 14:57:06 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="28f5c1f7e7f795d8", @ANYRES16=r1, @ANYBLOB="080cfcffffff000000007e00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900c677ffff3c000000"], 0x28}}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cgroup.kill\x00', 0x0, 0x0) r2 = fork() kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x0) epoll_pwait(r3, &(0x7f0000000100)=[{}], 0x1, 0x0, &(0x7f0000000140)={[0x1ff]}, 0xfffffffffffffdd5) openat(r3, &(0x7f0000000200)='./file0\x00', 0x400800, 0x14) r4 = fork() r5 = fork() kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f00000001c0)={r3, 0xffffffffffffffff, 0x7}) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x1, 0x1f, 0x41, 0x4, 0x0, 0xb0, 0x1, 0xe, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xb0, 0x0, @perf_bp={&(0x7f00000003c0), 0x1}, 0x11, 0x7, 0xfffffffa, 0x4, 0x8, 0x3ff, 0x7, 0x0, 0x41557dbe, 0x0, 0x5}, 0x0, 0xb, r3, 0x9) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_INTERFACE(r6, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r7, @ANYBLOB="050000000000000a0c7b3b1edf2ed4e7b9ac460000020000000c"], 0x20}}, 0x0) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) 14:57:06 executing program 4: r0 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup2(r1, r0) listen(r2, 0x0) 14:57:06 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18}, './file0\x00'}) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f0000001700)={0x0, 0x2}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000500)=ANY=[@ANYRESHEX, @ANYRES32, @ANYRES64, @ANYRESHEX, @ANYRES64, @ANYRESDEC, @ANYRES64, @ANYRES32, @ANYRESOCT]) fstat(r1, &(0x7f0000000a40)) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0xa8420, &(0x7f0000000940)={'trans=unix,', {[{@cache_fscache}, {@access_client}, {@access_any}, {@access_uid={'access', 0x3d, 0xee01}}, {@privport}, {@dfltgid={'dfltgid', 0x3d, r2}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, 'environ\x00'}}, {@subj_role={'subj_role', 0x3d, 'environ\x00'}}, {@euid_eq={'euid', 0x3d, r3}}, {@measure}]}}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000ac0)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@private1}, 0x0, @in=@private}}, &(0x7f0000000bc0)=0xe8) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0xa8420, &(0x7f0000000300)={'trans=unix,', {[{@cache_fscache}, {@access_client}, {@access_any}, {@access_uid={'access', 0x3d, 0xee01}}, {@privport}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, 'environ\x00'}}, {@subj_role={'subj_role', 0x3d, 'environ\x00'}}, {@euid_eq={'euid', 0x3d, r5}}, {@measure}]}}) pwritev(r1, &(0x7f0000000380)=[{&(0x7f0000000000)='5', 0x1}], 0x1, 0x0, 0x0) getdents(r0, &(0x7f0000000000)=""/94, 0x20000018) fstat(0xffffffffffffffff, &(0x7f0000000400)) 14:57:06 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18}, './file0\x00'}) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f0000001700)={0x0, 0x2}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000500)=ANY=[@ANYRESHEX, @ANYRES32, @ANYRES64, @ANYRESHEX, @ANYRES64, @ANYRESDEC, @ANYRES64, @ANYRES32, @ANYRESOCT]) fstat(r1, &(0x7f0000000a40)) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0xa8420, &(0x7f0000000940)={'trans=unix,', {[{@cache_fscache}, {@access_client}, {@access_any}, {@access_uid={'access', 0x3d, 0xee01}}, {@privport}, {@dfltgid={'dfltgid', 0x3d, r2}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, 'environ\x00'}}, {@subj_role={'subj_role', 0x3d, 'environ\x00'}}, {@euid_eq={'euid', 0x3d, r3}}, {@measure}]}}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000ac0)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@private1}, 0x0, @in=@private}}, &(0x7f0000000bc0)=0xe8) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0xa8420, &(0x7f0000000300)={'trans=unix,', {[{@cache_fscache}, {@access_client}, {@access_any}, {@access_uid={'access', 0x3d, 0xee01}}, {@privport}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, 'environ\x00'}}, {@subj_role={'subj_role', 0x3d, 'environ\x00'}}, {@euid_eq={'euid', 0x3d, r5}}, {@measure}]}}) pwritev(r1, &(0x7f0000000380)=[{&(0x7f0000000000)='5', 0x1}], 0x1, 0x0, 0x0) getdents(r0, &(0x7f0000000000)=""/94, 0x20000018) fstat(0xffffffffffffffff, &(0x7f0000000400)) 14:57:06 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000080)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@empty}}, 0xae) close(r0) 14:57:06 executing program 4: r0 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup2(r1, r0) listen(r2, 0x0) 14:57:06 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='limits\x00') fgetxattr(r0, &(0x7f0000000400)=@random={'osx.', '-:{+#}\x00'}, &(0x7f0000000440)=""/90, 0x5a) 14:57:06 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$inet(r0, &(0x7f0000002d00)={&(0x7f0000002600)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000002d40)=[@ip_retopts={{0x10}}, @ip_retopts={{0x18, 0x0, 0x7, {[@cipso={0x86, 0x6}]}}}], 0x28}, 0x0) 14:57:06 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r0, 0x8983, 0x0) [ 135.529548] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. 14:57:06 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$inet(r0, &(0x7f0000002d00)={&(0x7f0000002600)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000002d40)=[@ip_retopts={{0x10}}, @ip_retopts={{0x18, 0x0, 0x7, {[@cipso={0x86, 0x6}]}}}], 0x28}, 0x0) [ 135.768919] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. 14:57:07 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="28f5c1f7e7f795d8", @ANYRES16=r1, @ANYBLOB="080cfcffffff000000007e00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900c677ffff3c000000"], 0x28}}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cgroup.kill\x00', 0x0, 0x0) r2 = fork() kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x0) epoll_pwait(r3, &(0x7f0000000100)=[{}], 0x1, 0x0, &(0x7f0000000140)={[0x1ff]}, 0xfffffffffffffdd5) openat(r3, &(0x7f0000000200)='./file0\x00', 0x400800, 0x14) r4 = fork() r5 = fork() kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f00000001c0)={r3, 0xffffffffffffffff, 0x7}) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x1, 0x1f, 0x41, 0x4, 0x0, 0xb0, 0x1, 0xe, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xb0, 0x0, @perf_bp={&(0x7f00000003c0), 0x1}, 0x11, 0x7, 0xfffffffa, 0x4, 0x8, 0x3ff, 0x7, 0x0, 0x41557dbe, 0x0, 0x5}, 0x0, 0xb, r3, 0x9) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_INTERFACE(r6, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r7, @ANYBLOB="050000000000000a0c7b3b1edf2ed4e7b9ac460000020000000c"], 0x20}}, 0x0) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) 14:57:07 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040c00) fallocate(r0, 0x10, 0x0, 0x8800000) 14:57:07 executing program 4: setpriority(0x0, 0xffffffffffffffff, 0x0) 14:57:07 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18}, './file0\x00'}) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f0000001700)={0x0, 0x2}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000500)=ANY=[@ANYRESHEX, @ANYRES32, @ANYRES64, @ANYRESHEX, @ANYRES64, @ANYRESDEC, @ANYRES64, @ANYRES32, @ANYRESOCT]) fstat(r1, &(0x7f0000000a40)) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0xa8420, &(0x7f0000000940)={'trans=unix,', {[{@cache_fscache}, {@access_client}, {@access_any}, {@access_uid={'access', 0x3d, 0xee01}}, {@privport}, {@dfltgid={'dfltgid', 0x3d, r2}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, 'environ\x00'}}, {@subj_role={'subj_role', 0x3d, 'environ\x00'}}, {@euid_eq={'euid', 0x3d, r3}}, {@measure}]}}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000ac0)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@private1}, 0x0, @in=@private}}, &(0x7f0000000bc0)=0xe8) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0xa8420, &(0x7f0000000300)={'trans=unix,', {[{@cache_fscache}, {@access_client}, {@access_any}, {@access_uid={'access', 0x3d, 0xee01}}, {@privport}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, 'environ\x00'}}, {@subj_role={'subj_role', 0x3d, 'environ\x00'}}, {@euid_eq={'euid', 0x3d, r5}}, {@measure}]}}) pwritev(r1, &(0x7f0000000380)=[{&(0x7f0000000000)='5', 0x1}], 0x1, 0x0, 0x0) getdents(r0, &(0x7f0000000000)=""/94, 0x20000018) fstat(0xffffffffffffffff, &(0x7f0000000400)) 14:57:07 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r0, 0x8983, 0x0) 14:57:07 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18}, './file0\x00'}) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f0000001700)={0x0, 0x2}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000500)=ANY=[@ANYRESHEX, @ANYRES32, @ANYRES64, @ANYRESHEX, @ANYRES64, @ANYRESDEC, @ANYRES64, @ANYRES32, @ANYRESOCT]) fstat(r1, &(0x7f0000000a40)) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0xa8420, &(0x7f0000000940)={'trans=unix,', {[{@cache_fscache}, {@access_client}, {@access_any}, {@access_uid={'access', 0x3d, 0xee01}}, {@privport}, {@dfltgid={'dfltgid', 0x3d, r2}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, 'environ\x00'}}, {@subj_role={'subj_role', 0x3d, 'environ\x00'}}, {@euid_eq={'euid', 0x3d, r3}}, {@measure}]}}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000ac0)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@private1}, 0x0, @in=@private}}, &(0x7f0000000bc0)=0xe8) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0xa8420, &(0x7f0000000300)={'trans=unix,', {[{@cache_fscache}, {@access_client}, {@access_any}, {@access_uid={'access', 0x3d, 0xee01}}, {@privport}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, 'environ\x00'}}, {@subj_role={'subj_role', 0x3d, 'environ\x00'}}, {@euid_eq={'euid', 0x3d, r5}}, {@measure}]}}) pwritev(r1, &(0x7f0000000380)=[{&(0x7f0000000000)='5', 0x1}], 0x1, 0x0, 0x0) getdents(r0, &(0x7f0000000000)=""/94, 0x20000018) fstat(0xffffffffffffffff, &(0x7f0000000400)) 14:57:07 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$inet(r0, &(0x7f0000002d00)={&(0x7f0000002600)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000002d40)=[@ip_retopts={{0x10}}, @ip_retopts={{0x18, 0x0, 0x7, {[@cipso={0x86, 0x6}]}}}], 0x28}, 0x0) 14:57:07 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="28f5c1f7e7f795d8", @ANYRES16=r1, @ANYBLOB="080cfcffffff000000007e00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900c677ffff3c000000"], 0x28}}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cgroup.kill\x00', 0x0, 0x0) r2 = fork() kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x0) epoll_pwait(r3, &(0x7f0000000100)=[{}], 0x1, 0x0, &(0x7f0000000140)={[0x1ff]}, 0xfffffffffffffdd5) openat(r3, &(0x7f0000000200)='./file0\x00', 0x400800, 0x14) r4 = fork() r5 = fork() kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f00000001c0)={r3, 0xffffffffffffffff, 0x7}) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x1, 0x1f, 0x41, 0x4, 0x0, 0xb0, 0x1, 0xe, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xb0, 0x0, @perf_bp={&(0x7f00000003c0), 0x1}, 0x11, 0x7, 0xfffffffa, 0x4, 0x8, 0x3ff, 0x7, 0x0, 0x41557dbe, 0x0, 0x5}, 0x0, 0xb, r3, 0x9) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_INTERFACE(r6, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r7, @ANYBLOB="050000000000000a0c7b3b1edf2ed4e7b9ac460000020000000c"], 0x20}}, 0x0) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) 14:57:07 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="28f5c1f7e7f795d8", @ANYRES16=r1, @ANYBLOB="080cfcffffff000000007e00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900c677ffff3c000000"], 0x28}}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cgroup.kill\x00', 0x0, 0x0) r2 = fork() kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x0) epoll_pwait(r3, &(0x7f0000000100)=[{}], 0x1, 0x0, &(0x7f0000000140)={[0x1ff]}, 0xfffffffffffffdd5) openat(r3, &(0x7f0000000200)='./file0\x00', 0x400800, 0x14) r4 = fork() r5 = fork() kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f00000001c0)={r3, 0xffffffffffffffff, 0x7}) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x1, 0x1f, 0x41, 0x4, 0x0, 0xb0, 0x1, 0xe, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xb0, 0x0, @perf_bp={&(0x7f00000003c0), 0x1}, 0x11, 0x7, 0xfffffffa, 0x4, 0x8, 0x3ff, 0x7, 0x0, 0x41557dbe, 0x0, 0x5}, 0x0, 0xb, r3, 0x9) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_INTERFACE(r6, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r7, @ANYBLOB="050000000000000a0c7b3b1edf2ed4e7b9ac460000020000000c"], 0x20}}, 0x0) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) 14:57:07 executing program 4: setpriority(0x0, 0xffffffffffffffff, 0x0) 14:57:07 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040c00) fallocate(r0, 0x10, 0x0, 0x8800000) 14:57:07 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r0, 0x8983, 0x0) 14:57:07 executing program 4: setpriority(0x0, 0xffffffffffffffff, 0x0) [ 136.467569] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 136.483396] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 136.527778] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 14:57:07 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040c00) fallocate(r0, 0x10, 0x0, 0x8800000) 14:57:07 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="28f5c1f7e7f795d8", @ANYRES16=r1, @ANYBLOB="080cfcffffff000000007e00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900c677ffff3c000000"], 0x28}}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cgroup.kill\x00', 0x0, 0x0) r2 = fork() kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x0) epoll_pwait(r3, &(0x7f0000000100)=[{}], 0x1, 0x0, &(0x7f0000000140)={[0x1ff]}, 0xfffffffffffffdd5) openat(r3, &(0x7f0000000200)='./file0\x00', 0x400800, 0x14) r4 = fork() r5 = fork() kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f00000001c0)={r3, 0xffffffffffffffff, 0x7}) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x1, 0x1f, 0x41, 0x4, 0x0, 0xb0, 0x1, 0xe, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xb0, 0x0, @perf_bp={&(0x7f00000003c0), 0x1}, 0x11, 0x7, 0xfffffffa, 0x4, 0x8, 0x3ff, 0x7, 0x0, 0x41557dbe, 0x0, 0x5}, 0x0, 0xb, r3, 0x9) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_INTERFACE(r6, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r7, @ANYBLOB="050000000000000a0c7b3b1edf2ed4e7b9ac460000020000000c"], 0x20}}, 0x0) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) 14:57:07 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r0, 0x8983, 0x0) 14:57:07 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="28f5c1f7e7f795d8", @ANYRES16=r1, @ANYBLOB="080cfcffffff000000007e00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900c677ffff3c000000"], 0x28}}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cgroup.kill\x00', 0x0, 0x0) r2 = fork() kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x0) epoll_pwait(r3, &(0x7f0000000100)=[{}], 0x1, 0x0, &(0x7f0000000140)={[0x1ff]}, 0xfffffffffffffdd5) openat(r3, &(0x7f0000000200)='./file0\x00', 0x400800, 0x14) r4 = fork() r5 = fork() kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f00000001c0)={r3, 0xffffffffffffffff, 0x7}) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x1, 0x1f, 0x41, 0x4, 0x0, 0xb0, 0x1, 0xe, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xb0, 0x0, @perf_bp={&(0x7f00000003c0), 0x1}, 0x11, 0x7, 0xfffffffa, 0x4, 0x8, 0x3ff, 0x7, 0x0, 0x41557dbe, 0x0, 0x5}, 0x0, 0xb, r3, 0x9) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_INTERFACE(r6, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r7, @ANYBLOB="050000000000000a0c7b3b1edf2ed4e7b9ac460000020000000c"], 0x20}}, 0x0) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) 14:57:07 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="28f5c1f7e7f795d8", @ANYRES16=r1, @ANYBLOB="080cfcffffff000000007e00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900c677ffff3c000000"], 0x28}}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cgroup.kill\x00', 0x0, 0x0) r2 = fork() kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x0) epoll_pwait(r3, &(0x7f0000000100)=[{}], 0x1, 0x0, &(0x7f0000000140)={[0x1ff]}, 0xfffffffffffffdd5) openat(r3, &(0x7f0000000200)='./file0\x00', 0x400800, 0x14) r4 = fork() r5 = fork() kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f00000001c0)={r3, 0xffffffffffffffff, 0x7}) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x1, 0x1f, 0x41, 0x4, 0x0, 0xb0, 0x1, 0xe, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xb0, 0x0, @perf_bp={&(0x7f00000003c0), 0x1}, 0x11, 0x7, 0xfffffffa, 0x4, 0x8, 0x3ff, 0x7, 0x0, 0x41557dbe, 0x0, 0x5}, 0x0, 0xb, r3, 0x9) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_INTERFACE(r6, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r7, @ANYBLOB="050000000000000a0c7b3b1edf2ed4e7b9ac460000020000000c"], 0x20}}, 0x0) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) 14:57:07 executing program 4: setpriority(0x0, 0xffffffffffffffff, 0x0) 14:57:07 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="28f5c1f7e7f795d8", @ANYRES16=r1, @ANYBLOB="080cfcffffff000000007e00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900c677ffff3c000000"], 0x28}}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cgroup.kill\x00', 0x0, 0x0) r2 = fork() kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x0) epoll_pwait(r3, &(0x7f0000000100)=[{}], 0x1, 0x0, &(0x7f0000000140)={[0x1ff]}, 0xfffffffffffffdd5) openat(r3, &(0x7f0000000200)='./file0\x00', 0x400800, 0x14) r4 = fork() r5 = fork() kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f00000001c0)={r3, 0xffffffffffffffff, 0x7}) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x1, 0x1f, 0x41, 0x4, 0x0, 0xb0, 0x1, 0xe, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xb0, 0x0, @perf_bp={&(0x7f00000003c0), 0x1}, 0x11, 0x7, 0xfffffffa, 0x4, 0x8, 0x3ff, 0x7, 0x0, 0x41557dbe, 0x0, 0x5}, 0x0, 0xb, r3, 0x9) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_INTERFACE(r6, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r7, @ANYBLOB="050000000000000a0c7b3b1edf2ed4e7b9ac460000020000000c"], 0x20}}, 0x0) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) 14:57:07 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="28f5c1f7e7f795d8", @ANYRES16=r1, @ANYBLOB="080cfcffffff000000007e00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900c677ffff3c000000"], 0x28}}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cgroup.kill\x00', 0x0, 0x0) r2 = fork() kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x0) epoll_pwait(r3, &(0x7f0000000100)=[{}], 0x1, 0x0, &(0x7f0000000140)={[0x1ff]}, 0xfffffffffffffdd5) openat(r3, &(0x7f0000000200)='./file0\x00', 0x400800, 0x14) r4 = fork() r5 = fork() kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f00000001c0)={r3, 0xffffffffffffffff, 0x7}) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x1, 0x1f, 0x41, 0x4, 0x0, 0xb0, 0x1, 0xe, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xb0, 0x0, @perf_bp={&(0x7f00000003c0), 0x1}, 0x11, 0x7, 0xfffffffa, 0x4, 0x8, 0x3ff, 0x7, 0x0, 0x41557dbe, 0x0, 0x5}, 0x0, 0xb, r3, 0x9) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_INTERFACE(r6, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r7, @ANYBLOB="050000000000000a0c7b3b1edf2ed4e7b9ac460000020000000c"], 0x20}}, 0x0) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) 14:57:08 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040c00) fallocate(r0, 0x10, 0x0, 0x8800000) 14:57:08 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="28f5c1f7e7f795d8", @ANYRES16=r1, @ANYBLOB="080cfcffffff000000007e00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900c677ffff3c000000"], 0x28}}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cgroup.kill\x00', 0x0, 0x0) r2 = fork() kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x0) epoll_pwait(r3, &(0x7f0000000100)=[{}], 0x1, 0x0, &(0x7f0000000140)={[0x1ff]}, 0xfffffffffffffdd5) openat(r3, &(0x7f0000000200)='./file0\x00', 0x400800, 0x14) r4 = fork() r5 = fork() kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f00000001c0)={r3, 0xffffffffffffffff, 0x7}) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x1, 0x1f, 0x41, 0x4, 0x0, 0xb0, 0x1, 0xe, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xb0, 0x0, @perf_bp={&(0x7f00000003c0), 0x1}, 0x11, 0x7, 0xfffffffa, 0x4, 0x8, 0x3ff, 0x7, 0x0, 0x41557dbe, 0x0, 0x5}, 0x0, 0xb, r3, 0x9) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_INTERFACE(r6, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r7, @ANYBLOB="050000000000000a0c7b3b1edf2ed4e7b9ac460000020000000c"], 0x20}}, 0x0) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) 14:57:08 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="28f5c1f7e7f795d8", @ANYRES16=r1, @ANYBLOB="080cfcffffff000000007e00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900c677ffff3c000000"], 0x28}}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cgroup.kill\x00', 0x0, 0x0) r2 = fork() kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x0) epoll_pwait(r3, &(0x7f0000000100)=[{}], 0x1, 0x0, &(0x7f0000000140)={[0x1ff]}, 0xfffffffffffffdd5) openat(r3, &(0x7f0000000200)='./file0\x00', 0x400800, 0x14) r4 = fork() r5 = fork() kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f00000001c0)={r3, 0xffffffffffffffff, 0x7}) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x1, 0x1f, 0x41, 0x4, 0x0, 0xb0, 0x1, 0xe, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xb0, 0x0, @perf_bp={&(0x7f00000003c0), 0x1}, 0x11, 0x7, 0xfffffffa, 0x4, 0x8, 0x3ff, 0x7, 0x0, 0x41557dbe, 0x0, 0x5}, 0x0, 0xb, r3, 0x9) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_INTERFACE(r6, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r7, @ANYBLOB="050000000000000a0c7b3b1edf2ed4e7b9ac460000020000000c"], 0x20}}, 0x0) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) 14:57:08 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="28f5c1f7e7f795d8", @ANYRES16=r1, @ANYBLOB="080cfcffffff000000007e00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900c677ffff3c000000"], 0x28}}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cgroup.kill\x00', 0x0, 0x0) r2 = fork() kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x0) epoll_pwait(r3, &(0x7f0000000100)=[{}], 0x1, 0x0, &(0x7f0000000140)={[0x1ff]}, 0xfffffffffffffdd5) openat(r3, &(0x7f0000000200)='./file0\x00', 0x400800, 0x14) r4 = fork() r5 = fork() kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f00000001c0)={r3, 0xffffffffffffffff, 0x7}) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x1, 0x1f, 0x41, 0x4, 0x0, 0xb0, 0x1, 0xe, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xb0, 0x0, @perf_bp={&(0x7f00000003c0), 0x1}, 0x11, 0x7, 0xfffffffa, 0x4, 0x8, 0x3ff, 0x7, 0x0, 0x41557dbe, 0x0, 0x5}, 0x0, 0xb, r3, 0x9) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_INTERFACE(r6, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r7, @ANYBLOB="050000000000000a0c7b3b1edf2ed4e7b9ac460000020000000c"], 0x20}}, 0x0) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) [ 137.027175] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 137.046660] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 137.056671] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 14:57:08 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="28f5c1f7e7f795d8", @ANYRES16=r1, @ANYBLOB="080cfcffffff000000007e00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900c677ffff3c000000"], 0x28}}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cgroup.kill\x00', 0x0, 0x0) r2 = fork() kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x0) epoll_pwait(r3, &(0x7f0000000100)=[{}], 0x1, 0x0, &(0x7f0000000140)={[0x1ff]}, 0xfffffffffffffdd5) openat(r3, &(0x7f0000000200)='./file0\x00', 0x400800, 0x14) r4 = fork() r5 = fork() kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f00000001c0)={r3, 0xffffffffffffffff, 0x7}) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x1, 0x1f, 0x41, 0x4, 0x0, 0xb0, 0x1, 0xe, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xb0, 0x0, @perf_bp={&(0x7f00000003c0), 0x1}, 0x11, 0x7, 0xfffffffa, 0x4, 0x8, 0x3ff, 0x7, 0x0, 0x41557dbe, 0x0, 0x5}, 0x0, 0xb, r3, 0x9) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_INTERFACE(r6, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r7, @ANYBLOB="050000000000000a0c7b3b1edf2ed4e7b9ac460000020000000c"], 0x20}}, 0x0) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) [ 137.112143] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. 14:57:08 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="28f5c1f7e7f795d8", @ANYRES16=r1, @ANYBLOB="080cfcffffff000000007e00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900c677ffff3c000000"], 0x28}}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cgroup.kill\x00', 0x0, 0x0) r2 = fork() kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x0) epoll_pwait(r3, &(0x7f0000000100)=[{}], 0x1, 0x0, &(0x7f0000000140)={[0x1ff]}, 0xfffffffffffffdd5) openat(r3, &(0x7f0000000200)='./file0\x00', 0x400800, 0x14) r4 = fork() r5 = fork() kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f00000001c0)={r3, 0xffffffffffffffff, 0x7}) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x1, 0x1f, 0x41, 0x4, 0x0, 0xb0, 0x1, 0xe, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xb0, 0x0, @perf_bp={&(0x7f00000003c0), 0x1}, 0x11, 0x7, 0xfffffffa, 0x4, 0x8, 0x3ff, 0x7, 0x0, 0x41557dbe, 0x0, 0x5}, 0x0, 0xb, r3, 0x9) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_INTERFACE(r6, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r7, @ANYBLOB="050000000000000a0c7b3b1edf2ed4e7b9ac460000020000000c"], 0x20}}, 0x0) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) [ 137.138945] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 14:57:08 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="28f5c1f7e7f795d8", @ANYRES16=r1, @ANYBLOB="080cfcffffff000000007e00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900c677ffff3c000000"], 0x28}}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cgroup.kill\x00', 0x0, 0x0) r2 = fork() kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x0) epoll_pwait(r3, &(0x7f0000000100)=[{}], 0x1, 0x0, &(0x7f0000000140)={[0x1ff]}, 0xfffffffffffffdd5) openat(r3, &(0x7f0000000200)='./file0\x00', 0x400800, 0x14) r4 = fork() r5 = fork() kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f00000001c0)={r3, 0xffffffffffffffff, 0x7}) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x1, 0x1f, 0x41, 0x4, 0x0, 0xb0, 0x1, 0xe, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xb0, 0x0, @perf_bp={&(0x7f00000003c0), 0x1}, 0x11, 0x7, 0xfffffffa, 0x4, 0x8, 0x3ff, 0x7, 0x0, 0x41557dbe, 0x0, 0x5}, 0x0, 0xb, r3, 0x9) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_INTERFACE(r6, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r7, @ANYBLOB="050000000000000a0c7b3b1edf2ed4e7b9ac460000020000000c"], 0x20}}, 0x0) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) 14:57:08 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="28f5c1f7e7f795d8", @ANYRES16=r1, @ANYBLOB="080cfcffffff000000007e00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900c677ffff3c000000"], 0x28}}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cgroup.kill\x00', 0x0, 0x0) r2 = fork() kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x0) epoll_pwait(r3, &(0x7f0000000100)=[{}], 0x1, 0x0, &(0x7f0000000140)={[0x1ff]}, 0xfffffffffffffdd5) openat(r3, &(0x7f0000000200)='./file0\x00', 0x400800, 0x14) r4 = fork() r5 = fork() kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f00000001c0)={r3, 0xffffffffffffffff, 0x7}) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x1, 0x1f, 0x41, 0x4, 0x0, 0xb0, 0x1, 0xe, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xb0, 0x0, @perf_bp={&(0x7f00000003c0), 0x1}, 0x11, 0x7, 0xfffffffa, 0x4, 0x8, 0x3ff, 0x7, 0x0, 0x41557dbe, 0x0, 0x5}, 0x0, 0xb, r3, 0x9) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_INTERFACE(r6, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r7, @ANYBLOB="050000000000000a0c7b3b1edf2ed4e7b9ac460000020000000c"], 0x20}}, 0x0) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) 14:57:08 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, VM DIAGNOSIS: 14:57:01 Registers: info registers vcpu 0 RAX=0000000000000079 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff822b25c1 RDI=ffffffff8763fae0 RBP=ffffffff8763faa0 RSP=ffff8880419f7698 R8 =0000000000000001 R9 =000000000000000a R10=0000000000000079 R11=0000000000000001 R12=0000000000000079 R13=ffffffff8763faa0 R14=0000000000000010 R15=ffffffff822b25b0 RIP=ffffffff822b2619 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007efcbc91d700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007ff4fe8714a1 CR3=000000000e2ea000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 00007efcbf48e7c0 00007efcbf48e7c8 YMM02=0000000000000000 0000000000000000 00007efcbf48e7e0 00007efcbf48e7c0 YMM03=0000000000000000 0000000000000000 00007efcbf48e7c8 00007efcbf48e7c0 YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffff00000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=0000000080000001 RBX=0000000000000001 RCX=1ffffffff0e0ace0 RDX=0000000000000000 RSI=0000000000000004 RDI=0000000000000001 RBP=ffff8880104c86c0 RSP=ffff88804174f6e8 R8 =0000000000000000 R9 =ffff8880104c8753 R10=ffffed10020990ea R11=0000000000000001 R12=0000000000000202 R13=ffff8880104c8700 R14=dffffc0000000000 R15=ffff888007c75000 RIP=ffffffff8120521a RFL=00000046 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fcce6138368 CR3=000000001af82000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 756e696c2d34365f 3638782f62696c2f YMM01=0000000000000000 0000000000000000 322e6f732e6c6462 696c2f756e672d78 YMM02=0000000000000000 0000000000000000 00322e6f732e6c64 62696c2f756e672d YMM03=0000000000000000 0000000000000000 78756e696c2d3436 5f3638782f62696c YMM04=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000