Warning: Permanently added '[localhost]:41608' (ECDSA) to the list of known hosts. 2022/09/12 13:27:00 fuzzer started 2022/09/12 13:27:00 dialing manager at localhost:38027 syzkaller login: [ 44.044020] cgroup: Unknown subsys name 'net' [ 44.127825] cgroup: Unknown subsys name 'rlimit' 2022/09/12 13:27:14 syscalls: 2215 2022/09/12 13:27:14 code coverage: enabled 2022/09/12 13:27:14 comparison tracing: enabled 2022/09/12 13:27:14 extra coverage: enabled 2022/09/12 13:27:14 setuid sandbox: enabled 2022/09/12 13:27:14 namespace sandbox: enabled 2022/09/12 13:27:14 Android sandbox: enabled 2022/09/12 13:27:14 fault injection: enabled 2022/09/12 13:27:14 leak checking: enabled 2022/09/12 13:27:14 net packet injection: enabled 2022/09/12 13:27:14 net device setup: enabled 2022/09/12 13:27:14 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/09/12 13:27:14 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/09/12 13:27:14 USB emulation: enabled 2022/09/12 13:27:14 hci packet injection: enabled 2022/09/12 13:27:14 wifi device emulation: failed to parse kernel version (6.0.0-rc5-next-20220912) 2022/09/12 13:27:14 802.15.4 emulation: enabled 2022/09/12 13:27:14 fetching corpus: 0, signal 0/2000 (executing program) 2022/09/12 13:27:14 fetching corpus: 50, signal 32970/35892 (executing program) 2022/09/12 13:27:14 fetching corpus: 100, signal 51584/55156 (executing program) 2022/09/12 13:27:14 fetching corpus: 150, signal 59278/63556 (executing program) 2022/09/12 13:27:15 fetching corpus: 200, signal 65278/70154 (executing program) 2022/09/12 13:27:15 fetching corpus: 250, signal 71480/76715 (executing program) 2022/09/12 13:27:15 fetching corpus: 300, signal 75917/81531 (executing program) 2022/09/12 13:27:15 fetching corpus: 350, signal 81225/86960 (executing program) 2022/09/12 13:27:15 fetching corpus: 400, signal 84697/90638 (executing program) 2022/09/12 13:27:15 fetching corpus: 450, signal 88939/94857 (executing program) 2022/09/12 13:27:16 fetching corpus: 500, signal 94350/99952 (executing program) 2022/09/12 13:27:16 fetching corpus: 550, signal 97765/103282 (executing program) 2022/09/12 13:27:16 fetching corpus: 600, signal 100421/105837 (executing program) 2022/09/12 13:27:16 fetching corpus: 650, signal 103708/108865 (executing program) 2022/09/12 13:27:16 fetching corpus: 700, signal 108441/112897 (executing program) 2022/09/12 13:27:17 fetching corpus: 750, signal 111316/115322 (executing program) 2022/09/12 13:27:17 fetching corpus: 800, signal 114350/117774 (executing program) 2022/09/12 13:27:17 fetching corpus: 850, signal 115957/119113 (executing program) 2022/09/12 13:27:17 fetching corpus: 900, signal 118620/121174 (executing program) 2022/09/12 13:27:17 fetching corpus: 950, signal 120685/122680 (executing program) 2022/09/12 13:27:17 fetching corpus: 959, signal 121028/123006 (executing program) 2022/09/12 13:27:17 fetching corpus: 959, signal 121028/123081 (executing program) 2022/09/12 13:27:17 fetching corpus: 959, signal 121028/123177 (executing program) 2022/09/12 13:27:17 fetching corpus: 959, signal 121028/123287 (executing program) 2022/09/12 13:27:17 fetching corpus: 959, signal 121028/123375 (executing program) 2022/09/12 13:27:17 fetching corpus: 959, signal 121028/123473 (executing program) 2022/09/12 13:27:17 fetching corpus: 959, signal 121028/123561 (executing program) 2022/09/12 13:27:18 fetching corpus: 959, signal 121028/123656 (executing program) 2022/09/12 13:27:18 fetching corpus: 959, signal 121028/123757 (executing program) 2022/09/12 13:27:18 fetching corpus: 959, signal 121028/123864 (executing program) 2022/09/12 13:27:18 fetching corpus: 959, signal 121028/123955 (executing program) 2022/09/12 13:27:18 fetching corpus: 959, signal 121028/124052 (executing program) 2022/09/12 13:27:18 fetching corpus: 959, signal 121028/124141 (executing program) 2022/09/12 13:27:18 fetching corpus: 959, signal 121028/124217 (executing program) 2022/09/12 13:27:18 fetching corpus: 959, signal 121028/124324 (executing program) 2022/09/12 13:27:18 fetching corpus: 959, signal 121028/124421 (executing program) 2022/09/12 13:27:18 fetching corpus: 959, signal 121028/124516 (executing program) 2022/09/12 13:27:18 fetching corpus: 959, signal 121028/124608 (executing program) 2022/09/12 13:27:18 fetching corpus: 959, signal 121028/124721 (executing program) 2022/09/12 13:27:18 fetching corpus: 959, signal 121028/124808 (executing program) 2022/09/12 13:27:18 fetching corpus: 959, signal 121028/124897 (executing program) 2022/09/12 13:27:18 fetching corpus: 959, signal 121028/124988 (executing program) 2022/09/12 13:27:18 fetching corpus: 959, signal 121028/125082 (executing program) 2022/09/12 13:27:18 fetching corpus: 959, signal 121028/125169 (executing program) 2022/09/12 13:27:18 fetching corpus: 959, signal 121028/125291 (executing program) 2022/09/12 13:27:18 fetching corpus: 959, signal 121028/125395 (executing program) 2022/09/12 13:27:18 fetching corpus: 959, signal 121028/125489 (executing program) 2022/09/12 13:27:18 fetching corpus: 959, signal 121028/125590 (executing program) 2022/09/12 13:27:18 fetching corpus: 959, signal 121028/125685 (executing program) 2022/09/12 13:27:18 fetching corpus: 959, signal 121028/125782 (executing program) 2022/09/12 13:27:18 fetching corpus: 959, signal 121028/125887 (executing program) 2022/09/12 13:27:18 fetching corpus: 959, signal 121028/125984 (executing program) 2022/09/12 13:27:18 fetching corpus: 959, signal 121028/126096 (executing program) 2022/09/12 13:27:18 fetching corpus: 959, signal 121028/126193 (executing program) 2022/09/12 13:27:18 fetching corpus: 959, signal 121028/126283 (executing program) 2022/09/12 13:27:18 fetching corpus: 959, signal 121028/126372 (executing program) 2022/09/12 13:27:18 fetching corpus: 959, signal 121028/126467 (executing program) 2022/09/12 13:27:18 fetching corpus: 959, signal 121028/126577 (executing program) 2022/09/12 13:27:18 fetching corpus: 959, signal 121028/126670 (executing program) 2022/09/12 13:27:18 fetching corpus: 959, signal 121028/126757 (executing program) 2022/09/12 13:27:18 fetching corpus: 959, signal 121028/126853 (executing program) 2022/09/12 13:27:18 fetching corpus: 959, signal 121028/126952 (executing program) 2022/09/12 13:27:18 fetching corpus: 959, signal 121028/126996 (executing program) 2022/09/12 13:27:18 fetching corpus: 959, signal 121028/126996 (executing program) 2022/09/12 13:27:21 starting 8 fuzzer processes 13:27:21 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(0x0, 0x0, 0x0, 0x0) 13:27:21 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)="c4", 0x1}], 0x1, 0x409e74, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) lsetxattr$security_capability(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, 0x0, 0x0) sendfile(r1, r1, 0x0, 0x100000) 13:27:21 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_GET(0xffffffffffffffff, 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000340)) setsockopt$inet6_IPV6_RTHDRDSTOPTS(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x8) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000300)) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty, 0x6}, 0x1c) sendfile(r0, r0, 0x0, 0x100000) 13:27:21 executing program 3: io_uring_setup(0x67aa, &(0x7f0000000000)={0x0, 0x7aa6}) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_MESH_CONFIG(r0, &(0x7f0000000440)={&(0x7f0000000380), 0xc, 0x0}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000480)='./file0/file0\x00', 0x0, &(0x7f0000000600)=[&(0x7f0000000580)='\x00'], 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000ac0), r0) [ 64.431933] audit: type=1400 audit(1662989241.134:6): avc: denied { execmem } for pid=284 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 13:27:21 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x8000}, 0x4) syz_emit_ethernet(0xfdef, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaa7700c24d06a70800", @ANYRES32], 0x0) 13:27:21 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fcntl$notify(r0, 0x402, 0x2) fcntl$notify(r0, 0x402, 0x1d) 13:27:21 executing program 6: r0 = fsopen(&(0x7f0000000040)='tracefs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) openat(r1, &(0x7f0000000100)='./file1\x00', 0x141040, 0x0) 13:27:21 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@mpol={'mpol', 0x3d, {'bind', '', @val={0x3a, [0x30]}}}, 0x22}]}) [ 65.706904] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 65.709220] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 65.714415] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 65.723033] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 65.728746] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 65.730843] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 65.736690] Bluetooth: hci0: HCI_REQ-0x0c1a [ 65.752792] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 65.780257] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 65.783494] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 65.787631] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 65.789403] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 65.792478] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 65.797859] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 65.817948] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 65.820054] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 65.822296] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 65.828134] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 65.829276] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 65.830589] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 65.831677] Bluetooth: hci1: HCI_REQ-0x0c1a [ 65.835099] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 65.837541] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 65.839018] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 65.850209] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 65.852457] Bluetooth: hci3: HCI_REQ-0x0c1a [ 65.854659] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 65.856260] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 65.863843] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 65.865300] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 65.870160] Bluetooth: hci5: HCI_REQ-0x0c1a [ 65.877869] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 65.880693] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 65.881974] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 65.887895] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 65.889271] Bluetooth: hci4: HCI_REQ-0x0c1a [ 65.891935] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 65.893284] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 65.897498] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 65.898531] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 65.901258] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 65.907654] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 65.909770] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 65.911227] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 65.917587] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 65.918700] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 65.920800] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 65.932687] Bluetooth: hci7: HCI_REQ-0x0c1a [ 65.937652] Bluetooth: hci6: HCI_REQ-0x0c1a [ 67.783844] Bluetooth: hci2: Opcode 0x c03 failed: -110 [ 67.785229] Bluetooth: hci0: command 0x0409 tx timeout [ 67.848633] Bluetooth: hci1: command 0x0409 tx timeout [ 67.911468] Bluetooth: hci3: command 0x0409 tx timeout [ 67.912640] Bluetooth: hci4: command 0x0409 tx timeout [ 67.913213] Bluetooth: hci5: command 0x0409 tx timeout [ 67.976466] Bluetooth: hci6: command 0x0409 tx timeout [ 67.977019] Bluetooth: hci7: command 0x0409 tx timeout [ 69.831409] Bluetooth: hci0: command 0x041b tx timeout [ 69.895382] Bluetooth: hci1: command 0x041b tx timeout [ 69.959423] Bluetooth: hci5: command 0x041b tx timeout [ 69.960026] Bluetooth: hci4: command 0x041b tx timeout [ 69.961231] Bluetooth: hci3: command 0x041b tx timeout [ 70.023423] Bluetooth: hci7: command 0x041b tx timeout [ 70.024160] Bluetooth: hci6: command 0x041b tx timeout [ 71.879481] Bluetooth: hci0: command 0x040f tx timeout [ 71.943360] Bluetooth: hci1: command 0x040f tx timeout [ 72.007433] Bluetooth: hci3: command 0x040f tx timeout [ 72.008077] Bluetooth: hci4: command 0x040f tx timeout [ 72.009584] Bluetooth: hci5: command 0x040f tx timeout [ 72.071383] Bluetooth: hci6: command 0x040f tx timeout [ 72.071991] Bluetooth: hci7: command 0x040f tx timeout [ 72.647402] Bluetooth: hci2: Opcode 0x c03 failed: -110 [ 73.927407] Bluetooth: hci0: command 0x0419 tx timeout [ 73.991391] Bluetooth: hci1: command 0x0419 tx timeout [ 74.055411] Bluetooth: hci5: command 0x0419 tx timeout [ 74.056200] Bluetooth: hci4: command 0x0419 tx timeout [ 74.058619] Bluetooth: hci3: command 0x0419 tx timeout [ 74.119446] Bluetooth: hci7: command 0x0419 tx timeout [ 74.120232] Bluetooth: hci6: command 0x0419 tx timeout [ 75.053015] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 75.062303] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 75.063981] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 75.069452] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 75.072749] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 75.074803] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 75.081164] Bluetooth: hci2: HCI_REQ-0x0c1a [ 77.127422] Bluetooth: hci2: command 0x0409 tx timeout [ 79.175454] Bluetooth: hci2: command 0x041b tx timeout [ 81.223430] Bluetooth: hci2: command 0x040f tx timeout [ 83.271448] Bluetooth: hci2: command 0x0419 tx timeout [ 118.330407] tmpfs: Bad value for 'mpol' [ 118.331803] tmpfs: Bad value for 'mpol' 13:28:15 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@mpol={'mpol', 0x3d, {'bind', '', @val={0x3a, [0x30]}}}, 0x22}]}) [ 118.543711] tmpfs: Bad value for 'mpol' 13:28:15 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@mpol={'mpol', 0x3d, {'bind', '', @val={0x3a, [0x30]}}}, 0x22}]}) [ 118.725806] tmpfs: Bad value for 'mpol' 13:28:15 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@mpol={'mpol', 0x3d, {'bind', '', @val={0x3a, [0x30]}}}, 0x22}]}) [ 118.976673] tmpfs: Bad value for 'mpol' 13:28:15 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$unix(r1, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) 13:28:15 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$unix(r1, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) 13:28:16 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$unix(r1, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) 13:28:16 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$unix(r1, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) [ 119.572580] process 'syz-executor.3' launched '/dev/fd/-1/./file0/file0' with NULL argv: empty string added 13:28:16 executing program 7: fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x131001, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x2c}, 0x1, 0x0, 0x0, 0x20010800}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x2000, 0x0) getdents64(r3, 0x0, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x20008088}, 0x8000) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000008, 0x10, 0xffffffffffffffff, 0x21976000) pivot_root(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00') sendfile(r0, r3, &(0x7f0000000080)=0x1000, 0x1f00) pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000) [ 119.682051] audit: type=1400 audit(1662989296.384:7): avc: denied { open } for pid=3776 comm="syz-executor.7" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 119.683794] audit: type=1400 audit(1662989296.384:8): avc: denied { kernel } for pid=3776 comm="syz-executor.7" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 119.688406] ------------[ cut here ]------------ [ 119.688425] [ 119.688428] ====================================================== [ 119.688432] WARNING: possible circular locking dependency detected [ 119.688436] 6.0.0-rc5-next-20220912 #1 Not tainted [ 119.688443] ------------------------------------------------------ [ 119.688447] syz-executor.7/3778 is trying to acquire lock: [ 119.688453] ffffffff853fa878 ((console_sem).lock){....}-{2:2}, at: down_trylock+0xe/0x70 [ 119.688494] [ 119.688494] but task is already holding lock: [ 119.688497] ffff88800d123020 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 119.688527] [ 119.688527] which lock already depends on the new lock. [ 119.688527] [ 119.688531] [ 119.688531] the existing dependency chain (in reverse order) is: [ 119.688534] [ 119.688534] -> #3 (&ctx->lock){....}-{2:2}: [ 119.688549] _raw_spin_lock+0x2a/0x40 [ 119.688567] __perf_event_task_sched_out+0x53b/0x18d0 [ 119.688581] __schedule+0xedd/0x2470 [ 119.688592] schedule+0xda/0x1b0 [ 119.688602] futex_wait_queue+0xf5/0x1e0 [ 119.688615] futex_wait+0x28e/0x690 [ 119.688625] do_futex+0x2ff/0x380 [ 119.688635] __x64_sys_futex+0x1c6/0x4d0 [ 119.688646] do_syscall_64+0x3b/0x90 [ 119.688661] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 119.688679] [ 119.688679] -> #2 (&rq->__lock){-.-.}-{2:2}: [ 119.688695] _raw_spin_lock_nested+0x30/0x40 [ 119.688711] raw_spin_rq_lock_nested+0x1e/0x30 [ 119.688725] task_fork_fair+0x63/0x4d0 [ 119.688744] sched_cgroup_fork+0x3d0/0x540 [ 119.688760] copy_process+0x3f9e/0x6df0 [ 119.688771] kernel_clone+0xe7/0x890 [ 119.688781] user_mode_thread+0xad/0xf0 [ 119.688793] rest_init+0x24/0x250 [ 119.688811] arch_call_rest_init+0xf/0x14 [ 119.688832] start_kernel+0x4c1/0x4e6 [ 119.688850] secondary_startup_64_no_verify+0xe0/0xeb [ 119.688866] [ 119.688866] -> #1 (&p->pi_lock){-.-.}-{2:2}: [ 119.688881] _raw_spin_lock_irqsave+0x39/0x60 [ 119.688897] try_to_wake_up+0xab/0x1920 [ 119.688912] up+0x75/0xb0 [ 119.688925] __up_console_sem+0x6e/0x80 [ 119.688943] console_unlock+0x46a/0x590 [ 119.688961] vprintk_emit+0x1bd/0x560 [ 119.688979] vprintk+0x84/0xa0 [ 119.688997] _printk+0xba/0xf1 [ 119.689017] kauditd_hold_skb.cold+0x3f/0x4e [ 119.689032] kauditd_send_queue+0x233/0x290 [ 119.689049] kauditd_thread+0x5da/0x9a0 [ 119.689065] kthread+0x2ed/0x3a0 [ 119.689081] ret_from_fork+0x22/0x30 [ 119.689095] [ 119.689095] -> #0 ((console_sem).lock){....}-{2:2}: [ 119.689110] __lock_acquire+0x2a02/0x5e70 [ 119.689129] lock_acquire+0x1a2/0x530 [ 119.689146] _raw_spin_lock_irqsave+0x39/0x60 [ 119.689163] down_trylock+0xe/0x70 [ 119.689177] __down_trylock_console_sem+0x3b/0xd0 [ 119.689195] vprintk_emit+0x16b/0x560 [ 119.689213] vprintk+0x84/0xa0 [ 119.689232] _printk+0xba/0xf1 [ 119.689250] report_bug.cold+0x72/0xab [ 119.689263] handle_bug+0x3c/0x70 [ 119.689277] exc_invalid_op+0x14/0x50 [ 119.689291] asm_exc_invalid_op+0x16/0x20 [ 119.689309] group_sched_out.part.0+0x2c7/0x460 [ 119.689321] ctx_sched_out+0x8f1/0xc10 [ 119.689332] __perf_event_task_sched_out+0x6d0/0x18d0 [ 119.689345] __schedule+0xedd/0x2470 [ 119.689356] schedule+0xda/0x1b0 [ 119.689365] futex_wait_queue+0xf5/0x1e0 [ 119.689377] futex_wait+0x28e/0x690 [ 119.689388] do_futex+0x2ff/0x380 [ 119.689398] __x64_sys_futex+0x1c6/0x4d0 [ 119.689408] do_syscall_64+0x3b/0x90 [ 119.689423] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 119.689441] [ 119.689441] other info that might help us debug this: [ 119.689441] [ 119.689444] Chain exists of: [ 119.689444] (console_sem).lock --> &rq->__lock --> &ctx->lock [ 119.689444] [ 119.689460] Possible unsafe locking scenario: [ 119.689460] [ 119.689463] CPU0 CPU1 [ 119.689465] ---- ---- [ 119.689468] lock(&ctx->lock); [ 119.689474] lock(&rq->__lock); [ 119.689481] lock(&ctx->lock); [ 119.689488] lock((console_sem).lock); [ 119.689494] [ 119.689494] *** DEADLOCK *** [ 119.689494] [ 119.689496] 2 locks held by syz-executor.7/3778: [ 119.689504] #0: ffff88806cf37cd8 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x1cf/0x2470 [ 119.689531] #1: ffff88800d123020 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 119.689562] [ 119.689562] stack backtrace: [ 119.689565] CPU: 1 PID: 3778 Comm: syz-executor.7 Not tainted 6.0.0-rc5-next-20220912 #1 [ 119.689579] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 119.689589] Call Trace: [ 119.689592] [ 119.689596] dump_stack_lvl+0x8b/0xb3 [ 119.689612] check_noncircular+0x263/0x2e0 [ 119.689630] ? format_decode+0x26c/0xb50 [ 119.689646] ? print_circular_bug+0x450/0x450 [ 119.689666] ? enable_ptr_key_workfn+0x20/0x20 [ 119.689681] ? __lockdep_reset_lock+0x180/0x180 [ 119.689700] ? format_decode+0x26c/0xb50 [ 119.689717] ? alloc_chain_hlocks+0x1ec/0x5a0 [ 119.689737] __lock_acquire+0x2a02/0x5e70 [ 119.689761] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 119.689786] lock_acquire+0x1a2/0x530 [ 119.689805] ? down_trylock+0xe/0x70 [ 119.689821] ? rcu_read_unlock+0x40/0x40 [ 119.689843] ? find_held_lock+0x2c/0x110 [ 119.689861] ? vprintk+0x84/0xa0 [ 119.689882] _raw_spin_lock_irqsave+0x39/0x60 [ 119.689899] ? down_trylock+0xe/0x70 [ 119.689914] down_trylock+0xe/0x70 [ 119.689929] ? vprintk+0x84/0xa0 [ 119.689948] __down_trylock_console_sem+0x3b/0xd0 [ 119.689968] vprintk_emit+0x16b/0x560 [ 119.689990] vprintk+0x84/0xa0 [ 119.690010] _printk+0xba/0xf1 [ 119.690029] ? record_print_text.cold+0x16/0x16 [ 119.690052] ? hrtimer_try_to_cancel+0x163/0x2c0 [ 119.690067] ? lock_downgrade+0x6d0/0x6d0 [ 119.690087] ? report_bug.cold+0x66/0xab [ 119.690102] ? group_sched_out.part.0+0x2c7/0x460 [ 119.690115] report_bug.cold+0x72/0xab [ 119.690131] handle_bug+0x3c/0x70 [ 119.690146] exc_invalid_op+0x14/0x50 [ 119.690162] asm_exc_invalid_op+0x16/0x20 [ 119.690181] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 119.690196] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 119.690209] RSP: 0018:ffff8880202bf8f8 EFLAGS: 00010006 [ 119.690219] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 119.690227] RDX: ffff88801bf5b580 RSI: ffffffff81566027 RDI: 0000000000000005 [ 119.690236] RBP: ffff8880184f8000 R08: 0000000000000005 R09: 0000000000000001 [ 119.690244] R10: 0000000000000000 R11: 0000000000000001 R12: ffff88800d123000 [ 119.690252] R13: ffff88806cf3d100 R14: ffffffff8547bfc0 R15: 0000000000000002 [ 119.690264] ? group_sched_out.part.0+0x2c7/0x460 [ 119.690279] ? group_sched_out.part.0+0x2c7/0x460 [ 119.690293] ctx_sched_out+0x8f1/0xc10 [ 119.690307] __perf_event_task_sched_out+0x6d0/0x18d0 [ 119.690324] ? lock_is_held_type+0xd7/0x130 [ 119.690344] ? __perf_cgroup_move+0x160/0x160 [ 119.690357] ? set_next_entity+0x304/0x550 [ 119.690380] ? lock_is_held_type+0xd7/0x130 [ 119.690400] __schedule+0xedd/0x2470 [ 119.690414] ? io_schedule_timeout+0x150/0x150 [ 119.690426] ? futex_wait_setup+0x166/0x230 [ 119.690442] schedule+0xda/0x1b0 [ 119.690454] futex_wait_queue+0xf5/0x1e0 [ 119.690467] futex_wait+0x28e/0x690 [ 119.690481] ? futex_wait_setup+0x230/0x230 [ 119.690496] ? wake_up_q+0x8b/0xf0 [ 119.690510] ? do_raw_spin_unlock+0x4f/0x220 [ 119.690532] ? futex_wake+0x158/0x490 [ 119.690549] ? lock_downgrade+0x6d0/0x6d0 [ 119.690568] ? lock_is_held_type+0xd7/0x130 [ 119.690589] do_futex+0x2ff/0x380 [ 119.690601] ? __ia32_compat_sys_get_robust_list+0x3b0/0x3b0 [ 119.690616] ? ktime_get+0x153/0x1f0 [ 119.690637] __x64_sys_futex+0x1c6/0x4d0 [ 119.690651] ? hrtimer_interrupt+0x5b0/0x770 [ 119.690666] ? __x64_sys_futex_time32+0x480/0x480 [ 119.690680] ? syscall_enter_from_user_mode+0x1d/0x50 [ 119.690700] ? syscall_enter_from_user_mode+0x1d/0x50 [ 119.690722] do_syscall_64+0x3b/0x90 [ 119.690738] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 119.690757] RIP: 0033:0x7f1465ff1b19 [ 119.690766] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 119.690778] RSP: 002b:00007f1463567218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 119.690790] RAX: ffffffffffffffda RBX: 00007f1466104f68 RCX: 00007f1465ff1b19 [ 119.690799] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f1466104f68 [ 119.690807] RBP: 00007f1466104f60 R08: 0000000000000000 R09: 0000000000000000 [ 119.690815] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1466104f6c [ 119.690823] R13: 00007fffc102c9af R14: 00007f1463567300 R15: 0000000000022000 [ 119.690838] [ 119.758312] WARNING: CPU: 1 PID: 3778 at kernel/events/core.c:2309 group_sched_out.part.0+0x2c7/0x460 [ 119.759026] Modules linked in: [ 119.759285] CPU: 1 PID: 3778 Comm: syz-executor.7 Not tainted 6.0.0-rc5-next-20220912 #1 [ 119.759906] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 119.760774] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 119.761190] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 119.762584] RSP: 0018:ffff8880202bf8f8 EFLAGS: 00010006 [ 119.762994] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 119.763541] RDX: ffff88801bf5b580 RSI: ffffffff81566027 RDI: 0000000000000005 [ 119.764105] RBP: ffff8880184f8000 R08: 0000000000000005 R09: 0000000000000001 [ 119.764658] R10: 0000000000000000 R11: 0000000000000001 R12: ffff88800d123000 [ 119.765208] R13: ffff88806cf3d100 R14: ffffffff8547bfc0 R15: 0000000000000002 [ 119.765756] FS: 00007f1463567700(0000) GS:ffff88806cf00000(0000) knlGS:0000000000000000 [ 119.766380] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 119.766832] CR2: 00007f46b1287128 CR3: 00000000177e0000 CR4: 0000000000350ee0 [ 119.767382] Call Trace: [ 119.767589] [ 119.767769] ctx_sched_out+0x8f1/0xc10 [ 119.768093] __perf_event_task_sched_out+0x6d0/0x18d0 [ 119.768502] ? lock_is_held_type+0xd7/0x130 [ 119.768848] ? __perf_cgroup_move+0x160/0x160 [ 119.769204] ? set_next_entity+0x304/0x550 [ 119.769541] ? lock_is_held_type+0xd7/0x130 [ 119.769889] __schedule+0xedd/0x2470 [ 119.770184] ? io_schedule_timeout+0x150/0x150 [ 119.770546] ? futex_wait_setup+0x166/0x230 [ 119.770885] schedule+0xda/0x1b0 [ 119.771160] futex_wait_queue+0xf5/0x1e0 [ 119.771478] futex_wait+0x28e/0x690 [ 119.771767] ? futex_wait_setup+0x230/0x230 [ 119.772115] ? wake_up_q+0x8b/0xf0 [ 119.772397] ? do_raw_spin_unlock+0x4f/0x220 [ 119.772751] ? futex_wake+0x158/0x490 [ 119.773056] ? lock_downgrade+0x6d0/0x6d0 [ 119.773387] ? lock_is_held_type+0xd7/0x130 [ 119.773730] do_futex+0x2ff/0x380 [ 119.774005] ? __ia32_compat_sys_get_robust_list+0x3b0/0x3b0 [ 119.774457] ? ktime_get+0x153/0x1f0 [ 119.774758] __x64_sys_futex+0x1c6/0x4d0 [ 119.775075] ? hrtimer_interrupt+0x5b0/0x770 [ 119.775418] ? __x64_sys_futex_time32+0x480/0x480 [ 119.775787] ? syscall_enter_from_user_mode+0x1d/0x50 [ 119.776202] ? syscall_enter_from_user_mode+0x1d/0x50 [ 119.776607] do_syscall_64+0x3b/0x90 [ 119.776899] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 119.777305] RIP: 0033:0x7f1465ff1b19 [ 119.777598] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 119.778982] RSP: 002b:00007f1463567218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 119.779563] RAX: ffffffffffffffda RBX: 00007f1466104f68 RCX: 00007f1465ff1b19 [ 119.780107] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f1466104f68 [ 119.780653] RBP: 00007f1466104f60 R08: 0000000000000000 R09: 0000000000000000 [ 119.781196] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1466104f6c [ 119.781740] R13: 00007fffc102c9af R14: 00007f1463567300 R15: 0000000000022000 [ 119.782288] [ 119.782471] irq event stamp: 718 [ 119.782726] hardirqs last enabled at (717): [] syscall_enter_from_user_mode+0x1d/0x50 [ 119.783452] hardirqs last disabled at (718): [] __schedule+0x1225/0x2470 [ 119.784087] softirqs last enabled at (550): [] __irq_exit_rcu+0x11b/0x180 [ 119.784739] softirqs last disabled at (289): [] __irq_exit_rcu+0x11b/0x180 [ 119.785397] ---[ end trace 0000000000000000 ]--- [ 120.926504] audit: type=1400 audit(1662989297.629:9): avc: denied { watch_reads } for pid=3876 comm="syz-executor.5" path="/dev/bsg" dev="devtmpfs" ino=113 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=dir permissive=1 13:28:20 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(0x0, 0x0, 0x0, 0x0) 13:28:20 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_GET(0xffffffffffffffff, 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000340)) setsockopt$inet6_IPV6_RTHDRDSTOPTS(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x8) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000300)) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty, 0x6}, 0x1c) sendfile(r0, r0, 0x0, 0x100000) 13:28:20 executing program 3: io_uring_setup(0x67aa, &(0x7f0000000000)={0x0, 0x7aa6}) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_MESH_CONFIG(r0, &(0x7f0000000440)={&(0x7f0000000380), 0xc, 0x0}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000480)='./file0/file0\x00', 0x0, &(0x7f0000000600)=[&(0x7f0000000580)='\x00'], 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000ac0), r0) 13:28:20 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x8000}, 0x4) syz_emit_ethernet(0xfdef, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaa7700c24d06a70800", @ANYRES32], 0x0) 13:28:20 executing program 7: fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x131001, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB="2c00000001060109000000000000000000000001050001000700000005000100070000000500010007000000650e0cbb05c9cb60abebf829f34bd2bd1ffe12f9ed2b9d613201c3b2e006ae141937343a9e5dc01c4afab8f764d2a8e80c952de73753b2ee24326a49dbec080bd945a8c4c1ba18b40baa4b7bf5a21b0551738577877a5b0a9367c82bcac5967cae2609441fca870aba7f774d8bd407fca11ff22fd6f6160167254df7886d035bed589f904b4a1f0746cafa15447a9d1cf66b51a7a5f87afb2e94f9f9f0c6d67ccd3b53c2889e210df7c992fddae6a1a95e6daae6ac07afca9199401fa3c04ca1dd524b1d66cd3efa351ab2ebb23867fd9535d280f01b6d9ad239299853339a82cfef"], 0x2c}, 0x1, 0x0, 0x0, 0x20010800}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x2000, 0x0) getdents64(r3, 0x0, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x20008088}, 0x8000) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000008, 0x10, 0xffffffffffffffff, 0x21976000) pivot_root(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00') sendfile(r0, r3, &(0x7f0000000080)=0x1000, 0x1f00) pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000) 13:28:20 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)="c4", 0x1}], 0x1, 0x409e74, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) lsetxattr$security_capability(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, 0x0, 0x0) sendfile(r1, r1, 0x0, 0x100000) 13:28:20 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fcntl$notify(r0, 0x402, 0x2) fcntl$notify(r0, 0x402, 0x1d) 13:28:20 executing program 6: r0 = fsopen(&(0x7f0000000040)='tracefs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) openat(r1, &(0x7f0000000100)='./file1\x00', 0x141040, 0x0) 13:28:20 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fcntl$notify(r0, 0x402, 0x2) fcntl$notify(r0, 0x402, 0x1d) 13:28:20 executing program 6: r0 = fsopen(&(0x7f0000000040)='tracefs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) openat(r1, &(0x7f0000000100)='./file1\x00', 0x141040, 0x0) 13:28:20 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x8000}, 0x4) syz_emit_ethernet(0xfdef, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaa7700c24d06a70800", @ANYRES32], 0x0) 13:28:20 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(0x0, 0x0, 0x0, 0x0) 13:28:20 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fcntl$notify(r0, 0x402, 0x2) fcntl$notify(r0, 0x402, 0x1d) 13:28:20 executing program 3: io_uring_setup(0x67aa, &(0x7f0000000000)={0x0, 0x7aa6}) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_MESH_CONFIG(r0, &(0x7f0000000440)={&(0x7f0000000380), 0xc, 0x0}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000480)='./file0/file0\x00', 0x0, &(0x7f0000000600)=[&(0x7f0000000580)='\x00'], 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000ac0), r0) 13:28:20 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)="c4", 0x1}], 0x1, 0x409e74, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) lsetxattr$security_capability(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, 0x0, 0x0) sendfile(r1, r1, 0x0, 0x100000) 13:28:20 executing program 6: r0 = fsopen(&(0x7f0000000040)='tracefs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) openat(r1, &(0x7f0000000100)='./file1\x00', 0x141040, 0x0) 13:28:20 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x8000}, 0x4) syz_emit_ethernet(0xfdef, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaa7700c24d06a70800", @ANYRES32], 0x0) 13:28:20 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_GET(0xffffffffffffffff, 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000340)) setsockopt$inet6_IPV6_RTHDRDSTOPTS(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x8) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000300)) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty, 0x6}, 0x1c) sendfile(r0, r0, 0x0, 0x100000) 13:28:20 executing program 7: fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x131001, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x2c}, 0x1, 0x0, 0x0, 0x20010800}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x2000, 0x0) getdents64(r3, 0x0, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x20008088}, 0x8000) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000008, 0x10, 0xffffffffffffffff, 0x21976000) pivot_root(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00') sendfile(r0, r3, &(0x7f0000000080)=0x1000, 0x1f00) pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000) 13:28:20 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(0x0, 0x0, 0x0, 0x0) [ 124.199394] hrtimer: interrupt took 30908 ns [ 124.503490] syz-executor.2 (4015) used greatest stack depth: 24312 bytes left 13:28:21 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_GET(0xffffffffffffffff, 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000340)) setsockopt$inet6_IPV6_RTHDRDSTOPTS(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x8) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000300)) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty, 0x6}, 0x1c) sendfile(r0, r0, 0x0, 0x100000) 13:28:21 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)="c4", 0x1}], 0x1, 0x409e74, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) lsetxattr$security_capability(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, 0x0, 0x0) sendfile(r1, r1, 0x0, 0x100000) 13:28:21 executing program 0: r0 = fsopen(&(0x7f0000000040)='tracefs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) openat(r1, &(0x7f0000000100)='./file1\x00', 0x141040, 0x0) 13:28:21 executing program 5: r0 = fsopen(&(0x7f0000000040)='tracefs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) openat(r1, &(0x7f0000000100)='./file1\x00', 0x141040, 0x0) 13:28:21 executing program 7: fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x131001, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x2c}, 0x1, 0x0, 0x0, 0x20010800}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x2000, 0x0) getdents64(r3, 0x0, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x20008088}, 0x8000) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000008, 0x10, 0xffffffffffffffff, 0x21976000) pivot_root(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00') sendfile(r0, r3, &(0x7f0000000080)=0x1000, 0x1f00) pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000) 13:28:21 executing program 3: io_uring_setup(0x67aa, &(0x7f0000000000)={0x0, 0x7aa6}) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_MESH_CONFIG(r0, &(0x7f0000000440)={&(0x7f0000000380), 0xc, 0x0}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000480)='./file0/file0\x00', 0x0, &(0x7f0000000600)=[&(0x7f0000000580)='\x00'], 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000ac0), r0) 13:28:21 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_GET(0xffffffffffffffff, 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000340)) setsockopt$inet6_IPV6_RTHDRDSTOPTS(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x8) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000300)) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty, 0x6}, 0x1c) sendfile(r0, r0, 0x0, 0x100000) 13:28:21 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fcntl$notify(r0, 0x402, 0x2) fcntl$notify(r0, 0x402, 0x1d) 13:28:21 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fcntl$notify(r0, 0x402, 0x2) fcntl$notify(r0, 0x402, 0x1d) 13:28:21 executing program 0: r0 = fsopen(&(0x7f0000000040)='tracefs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) openat(r1, &(0x7f0000000100)='./file1\x00', 0x141040, 0x0) 13:28:21 executing program 5: r0 = fsopen(&(0x7f0000000040)='tracefs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) openat(r1, &(0x7f0000000100)='./file1\x00', 0x141040, 0x0) 13:28:21 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)="c4", 0x1}], 0x1, 0x409e74, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) lsetxattr$security_capability(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, 0x0, 0x0) sendfile(r1, r1, 0x0, 0x100000) 13:28:21 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fcntl$notify(r0, 0x402, 0x2) fcntl$notify(r0, 0x402, 0x1d) 13:28:21 executing program 5: r0 = fsopen(&(0x7f0000000040)='tracefs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) openat(r1, &(0x7f0000000100)='./file1\x00', 0x141040, 0x0) 13:28:21 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)="c4", 0x1}], 0x1, 0x409e74, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) lsetxattr$security_capability(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, 0x0, 0x0) sendfile(r1, r1, 0x0, 0x100000) 13:28:21 executing program 0: r0 = fsopen(&(0x7f0000000040)='tracefs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) openat(r1, &(0x7f0000000100)='./file1\x00', 0x141040, 0x0) 13:28:21 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_GET(0xffffffffffffffff, 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000340)) setsockopt$inet6_IPV6_RTHDRDSTOPTS(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x8) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000300)) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty, 0x6}, 0x1c) sendfile(r0, r0, 0x0, 0x100000) 13:28:21 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)="c4", 0x1}], 0x1, 0x409e74, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) lsetxattr$security_capability(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, 0x0, 0x0) sendfile(r1, r1, 0x0, 0x100000) 13:28:21 executing program 7: fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x131001, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x2c}, 0x1, 0x0, 0x0, 0x20010800}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x2000, 0x0) getdents64(r3, 0x0, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x20008088}, 0x8000) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000008, 0x10, 0xffffffffffffffff, 0x21976000) pivot_root(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00') sendfile(r0, r3, &(0x7f0000000080)=0x1000, 0x1f00) pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000) 13:28:21 executing program 5: fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x131001, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x2c}, 0x1, 0x0, 0x0, 0x20010800}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x2000, 0x0) getdents64(r3, 0x0, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x20008088}, 0x8000) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000008, 0x10, 0xffffffffffffffff, 0x21976000) pivot_root(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00') sendfile(r0, r3, &(0x7f0000000080)=0x1000, 0x1f00) pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000) 13:28:21 executing program 4: fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x131001, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x2c}, 0x1, 0x0, 0x0, 0x20010800}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x2000, 0x0) getdents64(r3, 0x0, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x20008088}, 0x8000) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000008, 0x10, 0xffffffffffffffff, 0x21976000) pivot_root(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00') sendfile(r0, r3, &(0x7f0000000080)=0x1000, 0x1f00) pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000) 13:28:21 executing program 2: fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x131001, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x2c}, 0x1, 0x0, 0x0, 0x20010800}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x2000, 0x0) getdents64(r3, 0x0, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x20008088}, 0x8000) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000008, 0x10, 0xffffffffffffffff, 0x21976000) pivot_root(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00') sendfile(r0, r3, &(0x7f0000000080)=0x1000, 0x1f00) pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000) 13:28:21 executing program 0: fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x131001, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB="2c00000001060109000000000000000000000001050001000700000005000100070000000500010007000000650e0cbb05c9cb60abebf829f34bd2bd1ffe12f9ed2b9d613201c3b2e006ae141937343a9e5dc01c4afab8f764d2a8e80c952de73753b2ee24326a49dbec080bd945a8c4c1ba18b40baa4b7bf5a21b0551738577877a5b0a9367c82bcac5967cae2609441fca870aba7f774d8bd407fca11ff22fd6f6160167254df7886d035bed589f904b4a1f0746cafa15447a9d1cf66b51a7a5f87afb2e94f9f9f0c6d67ccd3b53c2889e210df7c992fddae6a1a95e6daae6ac07afca9199401fa3c04ca1dd524b1d66cd3efa351ab2ebb23867fd9535d280f01b6d9ad239299853339a82cfef"], 0x2c}, 0x1, 0x0, 0x0, 0x20010800}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x2000, 0x0) getdents64(r3, 0x0, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x20008088}, 0x8000) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000008, 0x10, 0xffffffffffffffff, 0x21976000) pivot_root(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00') sendfile(r0, r3, &(0x7f0000000080)=0x1000, 0x1f00) pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000) 13:28:21 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)="c4", 0x1}], 0x1, 0x409e74, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) lsetxattr$security_capability(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, 0x0, 0x0) sendfile(r1, r1, 0x0, 0x100000) 13:28:21 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)="c4", 0x1}], 0x1, 0x409e74, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) lsetxattr$security_capability(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, 0x0, 0x0) sendfile(r1, r1, 0x0, 0x100000) 13:28:22 executing program 7: fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x131001, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x2c}, 0x1, 0x0, 0x0, 0x20010800}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x2000, 0x0) getdents64(r3, 0x0, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x20008088}, 0x8000) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000008, 0x10, 0xffffffffffffffff, 0x21976000) pivot_root(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00') sendfile(r0, r3, &(0x7f0000000080)=0x1000, 0x1f00) pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000) 13:28:22 executing program 0: fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x131001, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x2c}, 0x1, 0x0, 0x0, 0x20010800}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x2000, 0x0) getdents64(r3, 0x0, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x20008088}, 0x8000) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000008, 0x10, 0xffffffffffffffff, 0x21976000) pivot_root(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00') sendfile(r0, r3, &(0x7f0000000080)=0x1000, 0x1f00) pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000) 13:28:22 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_GET(0xffffffffffffffff, 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000340)) setsockopt$inet6_IPV6_RTHDRDSTOPTS(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x8) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000300)) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty, 0x6}, 0x1c) sendfile(r0, r0, 0x0, 0x100000) 13:28:22 executing program 5: fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x131001, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x2c}, 0x1, 0x0, 0x0, 0x20010800}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x2000, 0x0) getdents64(r3, 0x0, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x20008088}, 0x8000) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000008, 0x10, 0xffffffffffffffff, 0x21976000) pivot_root(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00') sendfile(r0, r3, &(0x7f0000000080)=0x1000, 0x1f00) pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000) 13:28:22 executing program 4: fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x131001, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x2c}, 0x1, 0x0, 0x0, 0x20010800}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x2000, 0x0) getdents64(r3, 0x0, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x20008088}, 0x8000) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000008, 0x10, 0xffffffffffffffff, 0x21976000) pivot_root(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00') sendfile(r0, r3, &(0x7f0000000080)=0x1000, 0x1f00) pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000) 13:28:22 executing program 2: fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x131001, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x2c}, 0x1, 0x0, 0x0, 0x20010800}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x2000, 0x0) getdents64(r3, 0x0, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x20008088}, 0x8000) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000008, 0x10, 0xffffffffffffffff, 0x21976000) pivot_root(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00') sendfile(r0, r3, &(0x7f0000000080)=0x1000, 0x1f00) pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000) 13:28:22 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)="c4", 0x1}], 0x1, 0x409e74, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) lsetxattr$security_capability(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, 0x0, 0x0) sendfile(r1, r1, 0x0, 0x100000) 13:28:22 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)={0x20, 0x1d, 0x1, 0x0, 0x0, "", [@typed={0x4, 0x0, 0x0, 0x0, @binary}, @nested={0xc, 0xc, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}]}, 0x20}], 0x1}, 0x0) [ 126.167083] netlink: 'syz-executor.3': attribute type 12 has an invalid length. 13:28:22 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)={0x20, 0x1d, 0x1, 0x0, 0x0, "", [@typed={0x4, 0x0, 0x0, 0x0, @binary}, @nested={0xc, 0xc, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}]}, 0x20}], 0x1}, 0x0) [ 126.274281] netlink: 'syz-executor.3': attribute type 12 has an invalid length. 13:28:23 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)={0x20, 0x1d, 0x1, 0x0, 0x0, "", [@typed={0x4, 0x0, 0x0, 0x0, @binary}, @nested={0xc, 0xc, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}]}, 0x20}], 0x1}, 0x0) 13:28:23 executing program 7: fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x131001, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x2c}, 0x1, 0x0, 0x0, 0x20010800}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x2000, 0x0) getdents64(r3, 0x0, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x20008088}, 0x8000) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000008, 0x10, 0xffffffffffffffff, 0x21976000) pivot_root(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00') sendfile(r0, r3, &(0x7f0000000080)=0x1000, 0x1f00) pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000) 13:28:23 executing program 0: fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x131001, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x2c}, 0x1, 0x0, 0x0, 0x20010800}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x2000, 0x0) getdents64(r3, 0x0, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x20008088}, 0x8000) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000008, 0x10, 0xffffffffffffffff, 0x21976000) pivot_root(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00') sendfile(r0, r3, &(0x7f0000000080)=0x1000, 0x1f00) pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000) [ 126.379308] netlink: 'syz-executor.3': attribute type 12 has an invalid length. 13:28:23 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)={0x20, 0x1d, 0x1, 0x0, 0x0, "", [@typed={0x4, 0x0, 0x0, 0x0, @binary}, @nested={0xc, 0xc, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}]}, 0x20}], 0x1}, 0x0) [ 126.520024] netlink: 'syz-executor.3': attribute type 12 has an invalid length. 13:28:23 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0xb, &(0x7f0000000140)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000003c0)="1b7a1666851945cd80a5a2ac0000000000000000b2122fbfdce63a77a865f0778bd425e749feed51f1439746599f0422a9d32dcef6b20d00ce737d913518a188cb9ad737a3f10ee2333baed5899c00ab0d1cce9ff265d634b3b2996ff3a5a91a9283b3b8cbfac984eccdb937f1d200bf96b5b75d5da9e818e348b4", 0x7b, 0x8, 0x0, 0x2}]) r2 = eventfd2(0x7, 0x0) sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00') close(r1) openat(r1, &(0x7f0000000480)='./file2\x00', 0x101042, 0x19b) write(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x82040, 0xa) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000300)={0x7, 0x5}) read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth1_to_team\x00'}) 13:28:23 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@remote, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@dev, 0x0, 0x3c}, 0x0, @in6=@mcast1}}, 0xe8) sendmmsg$inet6(r0, &(0x7f0000001b80)=[{{&(0x7f0000000000)={0x2, 0x4e20, 0x0, @mcast2}, 0x1c, 0x0}}], 0x1, 0x0) 13:28:23 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@remote, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@dev, 0x0, 0x3c}, 0x0, @in6=@mcast1}}, 0xe8) sendmmsg$inet6(r0, &(0x7f0000001b80)=[{{&(0x7f0000000000)={0x2, 0x4e20, 0x0, @mcast2}, 0x1c, 0x0}}], 0x1, 0x0) 13:28:23 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@remote, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@dev, 0x0, 0x3c}, 0x0, @in6=@mcast1}}, 0xe8) sendmmsg$inet6(r0, &(0x7f0000001b80)=[{{&(0x7f0000000000)={0x2, 0x4e20, 0x0, @mcast2}, 0x1c, 0x0}}], 0x1, 0x0) 13:28:23 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@remote, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@dev, 0x0, 0x3c}, 0x0, @in6=@mcast1}}, 0xe8) sendmmsg$inet6(r0, &(0x7f0000001b80)=[{{&(0x7f0000000000)={0x2, 0x4e20, 0x0, @mcast2}, 0x1c, 0x0}}], 0x1, 0x0) 13:28:23 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0xb, &(0x7f0000000140)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000003c0)="1b7a1666851945cd80a5a2ac0000000000000000b2122fbfdce63a77a865f0778bd425e749feed51f1439746599f0422a9d32dcef6b20d00ce737d913518a188cb9ad737a3f10ee2333baed5899c00ab0d1cce9ff265d634b3b2996ff3a5a91a9283b3b8cbfac984eccdb937f1d200bf96b5b75d5da9e818e348b4", 0x7b, 0x8, 0x0, 0x2}]) r2 = eventfd2(0x7, 0x0) sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00') close(r1) openat(r1, &(0x7f0000000480)='./file2\x00', 0x101042, 0x19b) write(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x82040, 0xa) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000300)={0x7, 0x5}) read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth1_to_team\x00'}) 13:28:24 executing program 5: fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x131001, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB="2c00000001060109000000000000000000000001050001000700000005000100070000000500010007000000650e0cbb05c9cb60abebf829f34bd2bd1ffe12f9ed2b9d613201c3b2e006ae141937343a9e5dc01c4afab8f764d2a8e80c952de73753b2ee24326a49dbec080bd945a8c4c1ba18b40baa4b7bf5a21b0551738577877a5b0a9367c82bcac5967cae2609441fca870aba7f774d8bd407fca11ff22fd6f6160167254df7886d035bed589f904b4a1f0746cafa15447a9d1cf66b51a7a5f87afb2e94f9f9f0c6d67ccd3b53c2889e210df7c992fddae6a1a95e6daae6ac07afca9199401fa3c04ca1dd524b1d66cd3efa351ab2ebb23867fd9535d280f01b6d9ad239299853339a82cfef"], 0x2c}, 0x1, 0x0, 0x0, 0x20010800}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x2000, 0x0) getdents64(r3, 0x0, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x20008088}, 0x8000) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000008, 0x10, 0xffffffffffffffff, 0x21976000) pivot_root(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00') sendfile(r0, r3, &(0x7f0000000080)=0x1000, 0x1f00) pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000) 13:28:24 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0xb, &(0x7f0000000140)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000003c0)="1b7a1666851945cd80a5a2ac0000000000000000b2122fbfdce63a77a865f0778bd425e749feed51f1439746599f0422a9d32dcef6b20d00ce737d913518a188cb9ad737a3f10ee2333baed5899c00ab0d1cce9ff265d634b3b2996ff3a5a91a9283b3b8cbfac984eccdb937f1d200bf96b5b75d5da9e818e348b4", 0x7b, 0x8, 0x0, 0x2}]) r2 = eventfd2(0x7, 0x0) sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00') close(r1) openat(r1, &(0x7f0000000480)='./file2\x00', 0x101042, 0x19b) write(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x82040, 0xa) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000300)={0x7, 0x5}) read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth1_to_team\x00'}) 13:28:24 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0xb, &(0x7f0000000140)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000003c0)="1b7a1666851945cd80a5a2ac0000000000000000b2122fbfdce63a77a865f0778bd425e749feed51f1439746599f0422a9d32dcef6b20d00ce737d913518a188cb9ad737a3f10ee2333baed5899c00ab0d1cce9ff265d634b3b2996ff3a5a91a9283b3b8cbfac984eccdb937f1d200bf96b5b75d5da9e818e348b4", 0x7b, 0x8, 0x0, 0x2}]) r2 = eventfd2(0x7, 0x0) sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00') close(r1) openat(r1, &(0x7f0000000480)='./file2\x00', 0x101042, 0x19b) write(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x82040, 0xa) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000300)={0x7, 0x5}) read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth1_to_team\x00'}) 13:28:24 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0xb, &(0x7f0000000140)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000003c0)="1b7a1666851945cd80a5a2ac0000000000000000b2122fbfdce63a77a865f0778bd425e749feed51f1439746599f0422a9d32dcef6b20d00ce737d913518a188cb9ad737a3f10ee2333baed5899c00ab0d1cce9ff265d634b3b2996ff3a5a91a9283b3b8cbfac984eccdb937f1d200bf96b5b75d5da9e818e348b4", 0x7b, 0x8, 0x0, 0x2}]) r2 = eventfd2(0x7, 0x0) sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00') close(r1) openat(r1, &(0x7f0000000480)='./file2\x00', 0x101042, 0x19b) write(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x82040, 0xa) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000300)={0x7, 0x5}) read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth1_to_team\x00'}) 13:28:24 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0xb, &(0x7f0000000140)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000003c0)="1b7a1666851945cd80a5a2ac0000000000000000b2122fbfdce63a77a865f0778bd425e749feed51f1439746599f0422a9d32dcef6b20d00ce737d913518a188cb9ad737a3f10ee2333baed5899c00ab0d1cce9ff265d634b3b2996ff3a5a91a9283b3b8cbfac984eccdb937f1d200bf96b5b75d5da9e818e348b4", 0x7b, 0x8, 0x0, 0x2}]) r2 = eventfd2(0x7, 0x0) sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00') close(r1) openat(r1, &(0x7f0000000480)='./file2\x00', 0x101042, 0x19b) write(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x82040, 0xa) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000300)={0x7, 0x5}) read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth1_to_team\x00'}) 13:28:24 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0xb, &(0x7f0000000140)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000003c0)="1b7a1666851945cd80a5a2ac0000000000000000b2122fbfdce63a77a865f0778bd425e749feed51f1439746599f0422a9d32dcef6b20d00ce737d913518a188cb9ad737a3f10ee2333baed5899c00ab0d1cce9ff265d634b3b2996ff3a5a91a9283b3b8cbfac984eccdb937f1d200bf96b5b75d5da9e818e348b4", 0x7b, 0x8, 0x0, 0x2}]) r2 = eventfd2(0x7, 0x0) sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00') close(r1) openat(r1, &(0x7f0000000480)='./file2\x00', 0x101042, 0x19b) write(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x82040, 0xa) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000300)={0x7, 0x5}) read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth1_to_team\x00'}) 13:28:24 executing program 2: fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x131001, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x2c}, 0x1, 0x0, 0x0, 0x20010800}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x2000, 0x0) getdents64(r3, 0x0, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x20008088}, 0x8000) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000008, 0x10, 0xffffffffffffffff, 0x21976000) pivot_root(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00') sendfile(r0, r3, &(0x7f0000000080)=0x1000, 0x1f00) pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000) 13:28:24 executing program 4: fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x131001, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x2c}, 0x1, 0x0, 0x0, 0x20010800}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x2000, 0x0) getdents64(r3, 0x0, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x20008088}, 0x8000) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000008, 0x10, 0xffffffffffffffff, 0x21976000) pivot_root(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00') sendfile(r0, r3, &(0x7f0000000080)=0x1000, 0x1f00) pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000) 13:28:25 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0xb, &(0x7f0000000140)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000003c0)="1b7a1666851945cd80a5a2ac0000000000000000b2122fbfdce63a77a865f0778bd425e749feed51f1439746599f0422a9d32dcef6b20d00ce737d913518a188cb9ad737a3f10ee2333baed5899c00ab0d1cce9ff265d634b3b2996ff3a5a91a9283b3b8cbfac984eccdb937f1d200bf96b5b75d5da9e818e348b4", 0x7b, 0x8, 0x0, 0x2}]) r2 = eventfd2(0x7, 0x0) sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00') close(r1) openat(r1, &(0x7f0000000480)='./file2\x00', 0x101042, 0x19b) write(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x82040, 0xa) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000300)={0x7, 0x5}) read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth1_to_team\x00'}) 13:28:25 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0xb, &(0x7f0000000140)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000003c0)="1b7a1666851945cd80a5a2ac0000000000000000b2122fbfdce63a77a865f0778bd425e749feed51f1439746599f0422a9d32dcef6b20d00ce737d913518a188cb9ad737a3f10ee2333baed5899c00ab0d1cce9ff265d634b3b2996ff3a5a91a9283b3b8cbfac984eccdb937f1d200bf96b5b75d5da9e818e348b4", 0x7b, 0x8, 0x0, 0x2}]) r2 = eventfd2(0x7, 0x0) sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00') close(r1) openat(r1, &(0x7f0000000480)='./file2\x00', 0x101042, 0x19b) write(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x82040, 0xa) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000300)={0x7, 0x5}) read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth1_to_team\x00'}) 13:28:25 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0xb, &(0x7f0000000140)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000003c0)="1b7a1666851945cd80a5a2ac0000000000000000b2122fbfdce63a77a865f0778bd425e749feed51f1439746599f0422a9d32dcef6b20d00ce737d913518a188cb9ad737a3f10ee2333baed5899c00ab0d1cce9ff265d634b3b2996ff3a5a91a9283b3b8cbfac984eccdb937f1d200bf96b5b75d5da9e818e348b4", 0x7b, 0x8, 0x0, 0x2}]) r2 = eventfd2(0x7, 0x0) sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00') close(r1) openat(r1, &(0x7f0000000480)='./file2\x00', 0x101042, 0x19b) write(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x82040, 0xa) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000300)={0x7, 0x5}) read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth1_to_team\x00'}) 13:28:25 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0xb, &(0x7f0000000140)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000003c0)="1b7a1666851945cd80a5a2ac0000000000000000b2122fbfdce63a77a865f0778bd425e749feed51f1439746599f0422a9d32dcef6b20d00ce737d913518a188cb9ad737a3f10ee2333baed5899c00ab0d1cce9ff265d634b3b2996ff3a5a91a9283b3b8cbfac984eccdb937f1d200bf96b5b75d5da9e818e348b4", 0x7b, 0x8, 0x0, 0x2}]) r2 = eventfd2(0x7, 0x0) sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00') close(r1) openat(r1, &(0x7f0000000480)='./file2\x00', 0x101042, 0x19b) write(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x82040, 0xa) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000300)={0x7, 0x5}) read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth1_to_team\x00'}) 13:28:25 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0xb, &(0x7f0000000140)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000003c0)="1b7a1666851945cd80a5a2ac0000000000000000b2122fbfdce63a77a865f0778bd425e749feed51f1439746599f0422a9d32dcef6b20d00ce737d913518a188cb9ad737a3f10ee2333baed5899c00ab0d1cce9ff265d634b3b2996ff3a5a91a9283b3b8cbfac984eccdb937f1d200bf96b5b75d5da9e818e348b4", 0x7b, 0x8, 0x0, 0x2}]) r2 = eventfd2(0x7, 0x0) sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00') close(r1) openat(r1, &(0x7f0000000480)='./file2\x00', 0x101042, 0x19b) write(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x82040, 0xa) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000300)={0x7, 0x5}) read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth1_to_team\x00'}) 13:28:25 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0xb, &(0x7f0000000140)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000003c0)="1b7a1666851945cd80a5a2ac0000000000000000b2122fbfdce63a77a865f0778bd425e749feed51f1439746599f0422a9d32dcef6b20d00ce737d913518a188cb9ad737a3f10ee2333baed5899c00ab0d1cce9ff265d634b3b2996ff3a5a91a9283b3b8cbfac984eccdb937f1d200bf96b5b75d5da9e818e348b4", 0x7b, 0x8, 0x0, 0x2}]) r2 = eventfd2(0x7, 0x0) sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00') close(r1) openat(r1, &(0x7f0000000480)='./file2\x00', 0x101042, 0x19b) write(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x82040, 0xa) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000300)={0x7, 0x5}) read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth1_to_team\x00'}) 13:28:25 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0xb, &(0x7f0000000140)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000003c0)="1b7a1666851945cd80a5a2ac0000000000000000b2122fbfdce63a77a865f0778bd425e749feed51f1439746599f0422a9d32dcef6b20d00ce737d913518a188cb9ad737a3f10ee2333baed5899c00ab0d1cce9ff265d634b3b2996ff3a5a91a9283b3b8cbfac984eccdb937f1d200bf96b5b75d5da9e818e348b4", 0x7b, 0x8, 0x0, 0x2}]) r2 = eventfd2(0x7, 0x0) sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00') close(r1) openat(r1, &(0x7f0000000480)='./file2\x00', 0x101042, 0x19b) write(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x82040, 0xa) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000300)={0x7, 0x5}) read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth1_to_team\x00'}) 13:28:25 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0xb, &(0x7f0000000140)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000003c0)="1b7a1666851945cd80a5a2ac0000000000000000b2122fbfdce63a77a865f0778bd425e749feed51f1439746599f0422a9d32dcef6b20d00ce737d913518a188cb9ad737a3f10ee2333baed5899c00ab0d1cce9ff265d634b3b2996ff3a5a91a9283b3b8cbfac984eccdb937f1d200bf96b5b75d5da9e818e348b4", 0x7b, 0x8, 0x0, 0x2}]) r2 = eventfd2(0x7, 0x0) sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00') close(r1) openat(r1, &(0x7f0000000480)='./file2\x00', 0x101042, 0x19b) write(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x82040, 0xa) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000300)={0x7, 0x5}) read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth1_to_team\x00'}) 13:28:25 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0xb, &(0x7f0000000140)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000003c0)="1b7a1666851945cd80a5a2ac0000000000000000b2122fbfdce63a77a865f0778bd425e749feed51f1439746599f0422a9d32dcef6b20d00ce737d913518a188cb9ad737a3f10ee2333baed5899c00ab0d1cce9ff265d634b3b2996ff3a5a91a9283b3b8cbfac984eccdb937f1d200bf96b5b75d5da9e818e348b4", 0x7b, 0x8, 0x0, 0x2}]) r2 = eventfd2(0x7, 0x0) sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00') close(r1) openat(r1, &(0x7f0000000480)='./file2\x00', 0x101042, 0x19b) write(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x82040, 0xa) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000300)={0x7, 0x5}) read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth1_to_team\x00'}) 13:28:25 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0xb, &(0x7f0000000140)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000003c0)="1b7a1666851945cd80a5a2ac0000000000000000b2122fbfdce63a77a865f0778bd425e749feed51f1439746599f0422a9d32dcef6b20d00ce737d913518a188cb9ad737a3f10ee2333baed5899c00ab0d1cce9ff265d634b3b2996ff3a5a91a9283b3b8cbfac984eccdb937f1d200bf96b5b75d5da9e818e348b4", 0x7b, 0x8, 0x0, 0x2}]) r2 = eventfd2(0x7, 0x0) sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00') close(r1) openat(r1, &(0x7f0000000480)='./file2\x00', 0x101042, 0x19b) write(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x82040, 0xa) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000300)={0x7, 0x5}) read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth1_to_team\x00'}) 13:28:25 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0xb, &(0x7f0000000140)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000003c0)="1b7a1666851945cd80a5a2ac0000000000000000b2122fbfdce63a77a865f0778bd425e749feed51f1439746599f0422a9d32dcef6b20d00ce737d913518a188cb9ad737a3f10ee2333baed5899c00ab0d1cce9ff265d634b3b2996ff3a5a91a9283b3b8cbfac984eccdb937f1d200bf96b5b75d5da9e818e348b4", 0x7b, 0x8, 0x0, 0x2}]) r2 = eventfd2(0x7, 0x0) sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00') close(r1) openat(r1, &(0x7f0000000480)='./file2\x00', 0x101042, 0x19b) write(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x82040, 0xa) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000300)={0x7, 0x5}) read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth1_to_team\x00'}) 13:28:25 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0xb, &(0x7f0000000140)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000003c0)="1b7a1666851945cd80a5a2ac0000000000000000b2122fbfdce63a77a865f0778bd425e749feed51f1439746599f0422a9d32dcef6b20d00ce737d913518a188cb9ad737a3f10ee2333baed5899c00ab0d1cce9ff265d634b3b2996ff3a5a91a9283b3b8cbfac984eccdb937f1d200bf96b5b75d5da9e818e348b4", 0x7b, 0x8, 0x0, 0x2}]) r2 = eventfd2(0x7, 0x0) sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00') close(r1) openat(r1, &(0x7f0000000480)='./file2\x00', 0x101042, 0x19b) write(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x82040, 0xa) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000300)={0x7, 0x5}) read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth1_to_team\x00'}) 13:28:25 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0xb, &(0x7f0000000140)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000003c0)="1b7a1666851945cd80a5a2ac0000000000000000b2122fbfdce63a77a865f0778bd425e749feed51f1439746599f0422a9d32dcef6b20d00ce737d913518a188cb9ad737a3f10ee2333baed5899c00ab0d1cce9ff265d634b3b2996ff3a5a91a9283b3b8cbfac984eccdb937f1d200bf96b5b75d5da9e818e348b4", 0x7b, 0x8, 0x0, 0x2}]) r2 = eventfd2(0x7, 0x0) sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00') close(r1) openat(r1, &(0x7f0000000480)='./file2\x00', 0x101042, 0x19b) write(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x82040, 0xa) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000300)={0x7, 0x5}) read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth1_to_team\x00'}) 13:28:25 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0xb, &(0x7f0000000140)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000003c0)="1b7a1666851945cd80a5a2ac0000000000000000b2122fbfdce63a77a865f0778bd425e749feed51f1439746599f0422a9d32dcef6b20d00ce737d913518a188cb9ad737a3f10ee2333baed5899c00ab0d1cce9ff265d634b3b2996ff3a5a91a9283b3b8cbfac984eccdb937f1d200bf96b5b75d5da9e818e348b4", 0x7b, 0x8, 0x0, 0x2}]) r2 = eventfd2(0x7, 0x0) sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00') close(r1) openat(r1, &(0x7f0000000480)='./file2\x00', 0x101042, 0x19b) write(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x82040, 0xa) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000300)={0x7, 0x5}) read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth1_to_team\x00'}) [ 129.030921] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_OK cmd_age=0s [ 129.032216] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 129.033137] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 129.034008] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 00 00 00 00 08 00 [ 129.034994] I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 3 prio class 2 13:28:25 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0xb, &(0x7f0000000140)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000003c0)="1b7a1666851945cd80a5a2ac0000000000000000b2122fbfdce63a77a865f0778bd425e749feed51f1439746599f0422a9d32dcef6b20d00ce737d913518a188cb9ad737a3f10ee2333baed5899c00ab0d1cce9ff265d634b3b2996ff3a5a91a9283b3b8cbfac984eccdb937f1d200bf96b5b75d5da9e818e348b4", 0x7b, 0x8, 0x0, 0x2}]) r2 = eventfd2(0x7, 0x0) sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00') close(r1) openat(r1, &(0x7f0000000480)='./file2\x00', 0x101042, 0x19b) write(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x82040, 0xa) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000300)={0x7, 0x5}) read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth1_to_team\x00'}) 13:28:25 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0xb, &(0x7f0000000140)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000003c0)="1b7a1666851945cd80a5a2ac0000000000000000b2122fbfdce63a77a865f0778bd425e749feed51f1439746599f0422a9d32dcef6b20d00ce737d913518a188cb9ad737a3f10ee2333baed5899c00ab0d1cce9ff265d634b3b2996ff3a5a91a9283b3b8cbfac984eccdb937f1d200bf96b5b75d5da9e818e348b4", 0x7b, 0x8, 0x0, 0x2}]) r2 = eventfd2(0x7, 0x0) sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00') close(r1) openat(r1, &(0x7f0000000480)='./file2\x00', 0x101042, 0x19b) write(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x82040, 0xa) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000300)={0x7, 0x5}) read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth1_to_team\x00'}) [ 129.342661] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 129.343417] I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 129.344495] Buffer I/O error on dev sr0, logical block 0, async page read [ 129.354425] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 129.355113] I/O error, dev sr0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 129.356128] Buffer I/O error on dev sr0, logical block 1, async page read 13:28:26 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0xb, &(0x7f0000000140)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000003c0)="1b7a1666851945cd80a5a2ac0000000000000000b2122fbfdce63a77a865f0778bd425e749feed51f1439746599f0422a9d32dcef6b20d00ce737d913518a188cb9ad737a3f10ee2333baed5899c00ab0d1cce9ff265d634b3b2996ff3a5a91a9283b3b8cbfac984eccdb937f1d200bf96b5b75d5da9e818e348b4", 0x7b, 0x8, 0x0, 0x2}]) r2 = eventfd2(0x7, 0x0) sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00') close(r1) openat(r1, &(0x7f0000000480)='./file2\x00', 0x101042, 0x19b) write(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x82040, 0xa) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000300)={0x7, 0x5}) read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth1_to_team\x00'}) [ 129.554996] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 129.555719] I/O error, dev sr0, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 129.556670] Buffer I/O error on dev sr0, logical block 2, async page read [ 129.634583] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 129.635230] I/O error, dev sr0, sector 3 op 0x0:(READ) flags 0x0 phys_seg 5 prio class 2 [ 129.636154] Buffer I/O error on dev sr0, logical block 3, async page read [ 129.636930] Buffer I/O error on dev sr0, logical block 4, async page read [ 129.637701] Buffer I/O error on dev sr0, logical block 5, async page read [ 129.638459] Buffer I/O error on dev sr0, logical block 6, async page read [ 129.639205] Buffer I/O error on dev sr0, logical block 7, async page read [ 129.641219] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 129.641835] I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 129.642734] Buffer I/O error on dev sr0, logical block 0, async page read [ 129.644330] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 129.644952] I/O error, dev sr0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 129.645839] Buffer I/O error on dev sr0, logical block 1, async page read [ 129.648102] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 129.648731] I/O error, dev sr0, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 129.650211] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 129.650834] I/O error, dev sr0, sector 3 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 129.652226] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 129.652857] I/O error, dev sr0, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 129.654297] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 129.655415] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 129.656543] sr 1:0:0:0: [sr0] tag#0 unaligned transfer VM DIAGNOSIS: 13:28:16 Registers: info registers vcpu 0 RAX=0000000000000000 RBX=ffff88806cf3d420 RCX=0000000000000000 RDX=ffff88801b961ac0 RSI=ffffffff813bccdb RDI=0000000000000005 RBP=0000000000000003 RSP=ffff88803da6f960 R8 =0000000000000005 R9 =0000000000000000 R10=0000000000000001 R11=0000000000000001 R12=ffffed100d9e7a85 R13=ffff88806cf3d428 R14=0000000000000001 R15=dffffc0000000000 RIP=ffffffff813bccdd RFL=00000293 [--S-A-C] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0000 0000000000000000 00000000 00000000 DS =0000 0000000000000000 00000000 00000000 FS =0000 0000555555c14400 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f14660fc4e0 CR3=00000000177e0000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 ff00000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 0100ff0000000000 0000000000000000 YMM02=0000000000000000 0000000000000000 7463656a6e695f31 313230385f7a7973 YMM03=0000000000000000 0000000000000000 00007f14660d87c8 00007f14660d87c0 YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffff00000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=0000000000000030 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff822b1e41 RDI=ffffffff8763fae0 RBP=ffffffff8763faa0 RSP=ffff8880202bf348 R8 =0000000000000001 R9 =000000000000000a R10=0000000000000030 R11=0000000000000001 R12=0000000000000030 R13=ffffffff8763faa0 R14=0000000000000010 R15=ffffffff822b1e30 RIP=ffffffff822b1e99 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f1463567700 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f46b1287128 CR3=00000000177e0000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 00007f14660d87c0 00007f14660d87c8 YMM02=0000000000000000 0000000000000000 00007f14660d87e0 00007f14660d87c0 YMM03=0000000000000000 0000000000000000 00007f14660d87c8 00007f14660d87c0 YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffff00000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000