Warning: Permanently added '[localhost]:41608' (ECDSA) to the list of known hosts.
2022/09/12 13:27:00 fuzzer started
2022/09/12 13:27:00 dialing manager at localhost:38027
syzkaller login: [ 44.044020] cgroup: Unknown subsys name 'net'
[ 44.127825] cgroup: Unknown subsys name 'rlimit'
2022/09/12 13:27:14 syscalls: 2215
2022/09/12 13:27:14 code coverage: enabled
2022/09/12 13:27:14 comparison tracing: enabled
2022/09/12 13:27:14 extra coverage: enabled
2022/09/12 13:27:14 setuid sandbox: enabled
2022/09/12 13:27:14 namespace sandbox: enabled
2022/09/12 13:27:14 Android sandbox: enabled
2022/09/12 13:27:14 fault injection: enabled
2022/09/12 13:27:14 leak checking: enabled
2022/09/12 13:27:14 net packet injection: enabled
2022/09/12 13:27:14 net device setup: enabled
2022/09/12 13:27:14 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist
2022/09/12 13:27:14 devlink PCI setup: PCI device 0000:00:10.0 is not available
2022/09/12 13:27:14 USB emulation: enabled
2022/09/12 13:27:14 hci packet injection: enabled
2022/09/12 13:27:14 wifi device emulation: failed to parse kernel version (6.0.0-rc5-next-20220912 )
2022/09/12 13:27:14 802.15.4 emulation: enabled
2022/09/12 13:27:14 fetching corpus: 0, signal 0/2000 (executing program)
2022/09/12 13:27:14 fetching corpus: 50, signal 32970/35892 (executing program)
2022/09/12 13:27:14 fetching corpus: 100, signal 51584/55156 (executing program)
2022/09/12 13:27:14 fetching corpus: 150, signal 59278/63556 (executing program)
2022/09/12 13:27:15 fetching corpus: 200, signal 65278/70154 (executing program)
2022/09/12 13:27:15 fetching corpus: 250, signal 71480/76715 (executing program)
2022/09/12 13:27:15 fetching corpus: 300, signal 75917/81531 (executing program)
2022/09/12 13:27:15 fetching corpus: 350, signal 81225/86960 (executing program)
2022/09/12 13:27:15 fetching corpus: 400, signal 84697/90638 (executing program)
2022/09/12 13:27:15 fetching corpus: 450, signal 88939/94857 (executing program)
2022/09/12 13:27:16 fetching corpus: 500, signal 94350/99952 (executing program)
2022/09/12 13:27:16 fetching corpus: 550, signal 97765/103282 (executing program)
2022/09/12 13:27:16 fetching corpus: 600, signal 100421/105837 (executing program)
2022/09/12 13:27:16 fetching corpus: 650, signal 103708/108865 (executing program)
2022/09/12 13:27:16 fetching corpus: 700, signal 108441/112897 (executing program)
2022/09/12 13:27:17 fetching corpus: 750, signal 111316/115322 (executing program)
2022/09/12 13:27:17 fetching corpus: 800, signal 114350/117774 (executing program)
2022/09/12 13:27:17 fetching corpus: 850, signal 115957/119113 (executing program)
2022/09/12 13:27:17 fetching corpus: 900, signal 118620/121174 (executing program)
2022/09/12 13:27:17 fetching corpus: 950, signal 120685/122680 (executing program)
2022/09/12 13:27:17 fetching corpus: 959, signal 121028/123006 (executing program)
2022/09/12 13:27:17 fetching corpus: 959, signal 121028/123081 (executing program)
2022/09/12 13:27:17 fetching corpus: 959, signal 121028/123177 (executing program)
2022/09/12 13:27:17 fetching corpus: 959, signal 121028/123287 (executing program)
2022/09/12 13:27:17 fetching corpus: 959, signal 121028/123375 (executing program)
2022/09/12 13:27:17 fetching corpus: 959, signal 121028/123473 (executing program)
2022/09/12 13:27:17 fetching corpus: 959, signal 121028/123561 (executing program)
2022/09/12 13:27:18 fetching corpus: 959, signal 121028/123656 (executing program)
2022/09/12 13:27:18 fetching corpus: 959, signal 121028/123757 (executing program)
2022/09/12 13:27:18 fetching corpus: 959, signal 121028/123864 (executing program)
2022/09/12 13:27:18 fetching corpus: 959, signal 121028/123955 (executing program)
2022/09/12 13:27:18 fetching corpus: 959, signal 121028/124052 (executing program)
2022/09/12 13:27:18 fetching corpus: 959, signal 121028/124141 (executing program)
2022/09/12 13:27:18 fetching corpus: 959, signal 121028/124217 (executing program)
2022/09/12 13:27:18 fetching corpus: 959, signal 121028/124324 (executing program)
2022/09/12 13:27:18 fetching corpus: 959, signal 121028/124421 (executing program)
2022/09/12 13:27:18 fetching corpus: 959, signal 121028/124516 (executing program)
2022/09/12 13:27:18 fetching corpus: 959, signal 121028/124608 (executing program)
2022/09/12 13:27:18 fetching corpus: 959, signal 121028/124721 (executing program)
2022/09/12 13:27:18 fetching corpus: 959, signal 121028/124808 (executing program)
2022/09/12 13:27:18 fetching corpus: 959, signal 121028/124897 (executing program)
2022/09/12 13:27:18 fetching corpus: 959, signal 121028/124988 (executing program)
2022/09/12 13:27:18 fetching corpus: 959, signal 121028/125082 (executing program)
2022/09/12 13:27:18 fetching corpus: 959, signal 121028/125169 (executing program)
2022/09/12 13:27:18 fetching corpus: 959, signal 121028/125291 (executing program)
2022/09/12 13:27:18 fetching corpus: 959, signal 121028/125395 (executing program)
2022/09/12 13:27:18 fetching corpus: 959, signal 121028/125489 (executing program)
2022/09/12 13:27:18 fetching corpus: 959, signal 121028/125590 (executing program)
2022/09/12 13:27:18 fetching corpus: 959, signal 121028/125685 (executing program)
2022/09/12 13:27:18 fetching corpus: 959, signal 121028/125782 (executing program)
2022/09/12 13:27:18 fetching corpus: 959, signal 121028/125887 (executing program)
2022/09/12 13:27:18 fetching corpus: 959, signal 121028/125984 (executing program)
2022/09/12 13:27:18 fetching corpus: 959, signal 121028/126096 (executing program)
2022/09/12 13:27:18 fetching corpus: 959, signal 121028/126193 (executing program)
2022/09/12 13:27:18 fetching corpus: 959, signal 121028/126283 (executing program)
2022/09/12 13:27:18 fetching corpus: 959, signal 121028/126372 (executing program)
2022/09/12 13:27:18 fetching corpus: 959, signal 121028/126467 (executing program)
2022/09/12 13:27:18 fetching corpus: 959, signal 121028/126577 (executing program)
2022/09/12 13:27:18 fetching corpus: 959, signal 121028/126670 (executing program)
2022/09/12 13:27:18 fetching corpus: 959, signal 121028/126757 (executing program)
2022/09/12 13:27:18 fetching corpus: 959, signal 121028/126853 (executing program)
2022/09/12 13:27:18 fetching corpus: 959, signal 121028/126952 (executing program)
2022/09/12 13:27:18 fetching corpus: 959, signal 121028/126996 (executing program)
2022/09/12 13:27:18 fetching corpus: 959, signal 121028/126996 (executing program)
2022/09/12 13:27:21 starting 8 fuzzer processes
13:27:21 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mq_open(0x0, 0x0, 0x0, 0x0)
13:27:21 executing program 1:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
pwritev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)="c4", 0x1}], 0x1, 0x409e74, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
lsetxattr$security_capability(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, 0x0, 0x0)
sendfile(r1, r1, 0x0, 0x100000)
13:27:21 executing program 2:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
socket$nl_generic(0x10, 0x3, 0x10)
syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff)
sendmsg$ETHTOOL_MSG_EEE_GET(0xffffffffffffffff, 0x0, 0x0)
fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000340))
setsockopt$inet6_IPV6_RTHDRDSTOPTS(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x8)
getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000300))
socket$nl_generic(0x10, 0x3, 0x10)
syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0)
pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty, 0x6}, 0x1c)
sendfile(r0, r0, 0x0, 0x100000)
13:27:21 executing program 3:
io_uring_setup(0x67aa, &(0x7f0000000000)={0x0, 0x7aa6})
syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, 0x0, 0x0)
syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$NL80211_CMD_GET_MESH_CONFIG(r0, &(0x7f0000000440)={&(0x7f0000000380), 0xc, 0x0}, 0x0)
execveat(0xffffffffffffffff, &(0x7f0000000480)='./file0/file0\x00', 0x0, &(0x7f0000000600)=[&(0x7f0000000580)='\x00'], 0x0)
syz_genetlink_get_family_id$nl80211(&(0x7f0000000ac0), r0)
[ 64.431933] audit: type=1400 audit(1662989241.134:6): avc: denied { execmem } for pid=284 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1
13:27:21 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x8000}, 0x4)
syz_emit_ethernet(0xfdef, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaa7700c24d06a70800", @ANYRES32], 0x0)
13:27:21 executing program 5:
r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
fcntl$notify(r0, 0x402, 0x2)
fcntl$notify(r0, 0x402, 0x1d)
13:27:21 executing program 6:
r0 = fsopen(&(0x7f0000000040)='tracefs\x00', 0x0)
fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0)
r1 = fsmount(r0, 0x0, 0x0)
openat(r1, &(0x7f0000000100)='./file1\x00', 0x141040, 0x0)
13:27:21 executing program 7:
syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@mpol={'mpol', 0x3d, {'bind', '', @val={0x3a, [0x30]}}}, 0x22}]})
[ 65.706904] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1
[ 65.709220] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9
[ 65.714415] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9
[ 65.723033] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4
[ 65.728746] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3
[ 65.730843] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2
[ 65.736690] Bluetooth: hci0: HCI_REQ-0x0c1a
[ 65.752792] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1
[ 65.780257] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9
[ 65.783494] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9
[ 65.787631] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4
[ 65.789403] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3
[ 65.792478] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2
[ 65.797859] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1
[ 65.817948] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9
[ 65.820054] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1
[ 65.822296] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1
[ 65.828134] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9
[ 65.829276] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9
[ 65.830589] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9
[ 65.831677] Bluetooth: hci1: HCI_REQ-0x0c1a
[ 65.835099] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4
[ 65.837541] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3
[ 65.839018] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2
[ 65.850209] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9
[ 65.852457] Bluetooth: hci3: HCI_REQ-0x0c1a
[ 65.854659] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9
[ 65.856260] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4
[ 65.863843] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3
[ 65.865300] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2
[ 65.870160] Bluetooth: hci5: HCI_REQ-0x0c1a
[ 65.877869] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4
[ 65.880693] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3
[ 65.881974] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2
[ 65.887895] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1
[ 65.889271] Bluetooth: hci4: HCI_REQ-0x0c1a
[ 65.891935] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9
[ 65.893284] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1
[ 65.897498] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9
[ 65.898531] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9
[ 65.901258] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9
[ 65.907654] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4
[ 65.909770] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4
[ 65.911227] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3
[ 65.917587] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2
[ 65.918700] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3
[ 65.920800] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2
[ 65.932687] Bluetooth: hci7: HCI_REQ-0x0c1a
[ 65.937652] Bluetooth: hci6: HCI_REQ-0x0c1a
[ 67.783844] Bluetooth: hci2: Opcode 0x c03 failed: -110
[ 67.785229] Bluetooth: hci0: command 0x0409 tx timeout
[ 67.848633] Bluetooth: hci1: command 0x0409 tx timeout
[ 67.911468] Bluetooth: hci3: command 0x0409 tx timeout
[ 67.912640] Bluetooth: hci4: command 0x0409 tx timeout
[ 67.913213] Bluetooth: hci5: command 0x0409 tx timeout
[ 67.976466] Bluetooth: hci6: command 0x0409 tx timeout
[ 67.977019] Bluetooth: hci7: command 0x0409 tx timeout
[ 69.831409] Bluetooth: hci0: command 0x041b tx timeout
[ 69.895382] Bluetooth: hci1: command 0x041b tx timeout
[ 69.959423] Bluetooth: hci5: command 0x041b tx timeout
[ 69.960026] Bluetooth: hci4: command 0x041b tx timeout
[ 69.961231] Bluetooth: hci3: command 0x041b tx timeout
[ 70.023423] Bluetooth: hci7: command 0x041b tx timeout
[ 70.024160] Bluetooth: hci6: command 0x041b tx timeout
[ 71.879481] Bluetooth: hci0: command 0x040f tx timeout
[ 71.943360] Bluetooth: hci1: command 0x040f tx timeout
[ 72.007433] Bluetooth: hci3: command 0x040f tx timeout
[ 72.008077] Bluetooth: hci4: command 0x040f tx timeout
[ 72.009584] Bluetooth: hci5: command 0x040f tx timeout
[ 72.071383] Bluetooth: hci6: command 0x040f tx timeout
[ 72.071991] Bluetooth: hci7: command 0x040f tx timeout
[ 72.647402] Bluetooth: hci2: Opcode 0x c03 failed: -110
[ 73.927407] Bluetooth: hci0: command 0x0419 tx timeout
[ 73.991391] Bluetooth: hci1: command 0x0419 tx timeout
[ 74.055411] Bluetooth: hci5: command 0x0419 tx timeout
[ 74.056200] Bluetooth: hci4: command 0x0419 tx timeout
[ 74.058619] Bluetooth: hci3: command 0x0419 tx timeout
[ 74.119446] Bluetooth: hci7: command 0x0419 tx timeout
[ 74.120232] Bluetooth: hci6: command 0x0419 tx timeout
[ 75.053015] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1
[ 75.062303] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9
[ 75.063981] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9
[ 75.069452] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4
[ 75.072749] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3
[ 75.074803] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2
[ 75.081164] Bluetooth: hci2: HCI_REQ-0x0c1a
[ 77.127422] Bluetooth: hci2: command 0x0409 tx timeout
[ 79.175454] Bluetooth: hci2: command 0x041b tx timeout
[ 81.223430] Bluetooth: hci2: command 0x040f tx timeout
[ 83.271448] Bluetooth: hci2: command 0x0419 tx timeout
[ 118.330407] tmpfs: Bad value for 'mpol'
[ 118.331803] tmpfs: Bad value for 'mpol'
13:28:15 executing program 7:
syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@mpol={'mpol', 0x3d, {'bind', '', @val={0x3a, [0x30]}}}, 0x22}]})
[ 118.543711] tmpfs: Bad value for 'mpol'
13:28:15 executing program 7:
syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@mpol={'mpol', 0x3d, {'bind', '', @val={0x3a, [0x30]}}}, 0x22}]})
[ 118.725806] tmpfs: Bad value for 'mpol'
13:28:15 executing program 7:
syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@mpol={'mpol', 0x3d, {'bind', '', @val={0x3a, [0x30]}}}, 0x22}]})
[ 118.976673] tmpfs: Bad value for 'mpol'
13:28:15 executing program 7:
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @empty}, 0x1c)
connect$unix(r1, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e)
13:28:15 executing program 7:
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @empty}, 0x1c)
connect$unix(r1, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e)
13:28:16 executing program 7:
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @empty}, 0x1c)
connect$unix(r1, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e)
13:28:16 executing program 7:
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @empty}, 0x1c)
connect$unix(r1, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e)
[ 119.572580] process 'syz-executor.3' launched '/dev/fd/-1/./file0/file0' with NULL argv: empty string added
13:28:16 executing program 7:
fcntl$getownex(0xffffffffffffffff, 0x10, 0x0)
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0)
openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x131001, 0x0)
ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4)
sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0)
sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x2c}, 0x1, 0x0, 0x0, 0x20010800}, 0x0)
r2 = syz_open_procfs(0xffffffffffffffff, 0x0)
r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x2000, 0x0)
getdents64(r3, 0x0, 0x0)
sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x20008088}, 0x8000)
mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000008, 0x10, 0xffffffffffffffff, 0x21976000)
pivot_root(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00')
sendfile(r0, r3, &(0x7f0000000080)=0x1000, 0x1f00)
pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000)
[ 119.682051] audit: type=1400 audit(1662989296.384:7): avc: denied { open } for pid=3776 comm="syz-executor.7" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1
[ 119.683794] audit: type=1400 audit(1662989296.384:8): avc: denied { kernel } for pid=3776 comm="syz-executor.7" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1
[ 119.688406] ------------[ cut here ]------------
[ 119.688425]
[ 119.688428] ======================================================
[ 119.688432] WARNING: possible circular locking dependency detected
[ 119.688436] 6.0.0-rc5-next-20220912 #1 Not tainted
[ 119.688443] ------------------------------------------------------
[ 119.688447] syz-executor.7/3778 is trying to acquire lock:
[ 119.688453] ffffffff853fa878 ((console_sem).lock){....}-{2:2}, at: down_trylock+0xe/0x70
[ 119.688494]
[ 119.688494] but task is already holding lock:
[ 119.688497] ffff88800d123020 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0
[ 119.688527]
[ 119.688527] which lock already depends on the new lock.
[ 119.688527]
[ 119.688531]
[ 119.688531] the existing dependency chain (in reverse order) is:
[ 119.688534]
[ 119.688534] -> #3 (&ctx->lock){....}-{2:2}:
[ 119.688549] _raw_spin_lock+0x2a/0x40
[ 119.688567] __perf_event_task_sched_out+0x53b/0x18d0
[ 119.688581] __schedule+0xedd/0x2470
[ 119.688592] schedule+0xda/0x1b0
[ 119.688602] futex_wait_queue+0xf5/0x1e0
[ 119.688615] futex_wait+0x28e/0x690
[ 119.688625] do_futex+0x2ff/0x380
[ 119.688635] __x64_sys_futex+0x1c6/0x4d0
[ 119.688646] do_syscall_64+0x3b/0x90
[ 119.688661] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 119.688679]
[ 119.688679] -> #2 (&rq->__lock){-.-.}-{2:2}:
[ 119.688695] _raw_spin_lock_nested+0x30/0x40
[ 119.688711] raw_spin_rq_lock_nested+0x1e/0x30
[ 119.688725] task_fork_fair+0x63/0x4d0
[ 119.688744] sched_cgroup_fork+0x3d0/0x540
[ 119.688760] copy_process+0x3f9e/0x6df0
[ 119.688771] kernel_clone+0xe7/0x890
[ 119.688781] user_mode_thread+0xad/0xf0
[ 119.688793] rest_init+0x24/0x250
[ 119.688811] arch_call_rest_init+0xf/0x14
[ 119.688832] start_kernel+0x4c1/0x4e6
[ 119.688850] secondary_startup_64_no_verify+0xe0/0xeb
[ 119.688866]
[ 119.688866] -> #1 (&p->pi_lock){-.-.}-{2:2}:
[ 119.688881] _raw_spin_lock_irqsave+0x39/0x60
[ 119.688897] try_to_wake_up+0xab/0x1920
[ 119.688912] up+0x75/0xb0
[ 119.688925] __up_console_sem+0x6e/0x80
[ 119.688943] console_unlock+0x46a/0x590
[ 119.688961] vprintk_emit+0x1bd/0x560
[ 119.688979] vprintk+0x84/0xa0
[ 119.688997] _printk+0xba/0xf1
[ 119.689017] kauditd_hold_skb.cold+0x3f/0x4e
[ 119.689032] kauditd_send_queue+0x233/0x290
[ 119.689049] kauditd_thread+0x5da/0x9a0
[ 119.689065] kthread+0x2ed/0x3a0
[ 119.689081] ret_from_fork+0x22/0x30
[ 119.689095]
[ 119.689095] -> #0 ((console_sem).lock){....}-{2:2}:
[ 119.689110] __lock_acquire+0x2a02/0x5e70
[ 119.689129] lock_acquire+0x1a2/0x530
[ 119.689146] _raw_spin_lock_irqsave+0x39/0x60
[ 119.689163] down_trylock+0xe/0x70
[ 119.689177] __down_trylock_console_sem+0x3b/0xd0
[ 119.689195] vprintk_emit+0x16b/0x560
[ 119.689213] vprintk+0x84/0xa0
[ 119.689232] _printk+0xba/0xf1
[ 119.689250] report_bug.cold+0x72/0xab
[ 119.689263] handle_bug+0x3c/0x70
[ 119.689277] exc_invalid_op+0x14/0x50
[ 119.689291] asm_exc_invalid_op+0x16/0x20
[ 119.689309] group_sched_out.part.0+0x2c7/0x460
[ 119.689321] ctx_sched_out+0x8f1/0xc10
[ 119.689332] __perf_event_task_sched_out+0x6d0/0x18d0
[ 119.689345] __schedule+0xedd/0x2470
[ 119.689356] schedule+0xda/0x1b0
[ 119.689365] futex_wait_queue+0xf5/0x1e0
[ 119.689377] futex_wait+0x28e/0x690
[ 119.689388] do_futex+0x2ff/0x380
[ 119.689398] __x64_sys_futex+0x1c6/0x4d0
[ 119.689408] do_syscall_64+0x3b/0x90
[ 119.689423] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 119.689441]
[ 119.689441] other info that might help us debug this:
[ 119.689441]
[ 119.689444] Chain exists of:
[ 119.689444] (console_sem).lock --> &rq->__lock --> &ctx->lock
[ 119.689444]
[ 119.689460] Possible unsafe locking scenario:
[ 119.689460]
[ 119.689463] CPU0 CPU1
[ 119.689465] ---- ----
[ 119.689468] lock(&ctx->lock);
[ 119.689474] lock(&rq->__lock);
[ 119.689481] lock(&ctx->lock);
[ 119.689488] lock((console_sem).lock);
[ 119.689494]
[ 119.689494] *** DEADLOCK ***
[ 119.689494]
[ 119.689496] 2 locks held by syz-executor.7/3778:
[ 119.689504] #0: ffff88806cf37cd8 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x1cf/0x2470
[ 119.689531] #1: ffff88800d123020 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0
[ 119.689562]
[ 119.689562] stack backtrace:
[ 119.689565] CPU: 1 PID: 3778 Comm: syz-executor.7 Not tainted 6.0.0-rc5-next-20220912 #1
[ 119.689579] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
[ 119.689589] Call Trace:
[ 119.689592]
[ 119.689596] dump_stack_lvl+0x8b/0xb3
[ 119.689612] check_noncircular+0x263/0x2e0
[ 119.689630] ? format_decode+0x26c/0xb50
[ 119.689646] ? print_circular_bug+0x450/0x450
[ 119.689666] ? enable_ptr_key_workfn+0x20/0x20
[ 119.689681] ? __lockdep_reset_lock+0x180/0x180
[ 119.689700] ? format_decode+0x26c/0xb50
[ 119.689717] ? alloc_chain_hlocks+0x1ec/0x5a0
[ 119.689737] __lock_acquire+0x2a02/0x5e70
[ 119.689761] ? lockdep_hardirqs_on_prepare+0x410/0x410
[ 119.689786] lock_acquire+0x1a2/0x530
[ 119.689805] ? down_trylock+0xe/0x70
[ 119.689821] ? rcu_read_unlock+0x40/0x40
[ 119.689843] ? find_held_lock+0x2c/0x110
[ 119.689861] ? vprintk+0x84/0xa0
[ 119.689882] _raw_spin_lock_irqsave+0x39/0x60
[ 119.689899] ? down_trylock+0xe/0x70
[ 119.689914] down_trylock+0xe/0x70
[ 119.689929] ? vprintk+0x84/0xa0
[ 119.689948] __down_trylock_console_sem+0x3b/0xd0
[ 119.689968] vprintk_emit+0x16b/0x560
[ 119.689990] vprintk+0x84/0xa0
[ 119.690010] _printk+0xba/0xf1
[ 119.690029] ? record_print_text.cold+0x16/0x16
[ 119.690052] ? hrtimer_try_to_cancel+0x163/0x2c0
[ 119.690067] ? lock_downgrade+0x6d0/0x6d0
[ 119.690087] ? report_bug.cold+0x66/0xab
[ 119.690102] ? group_sched_out.part.0+0x2c7/0x460
[ 119.690115] report_bug.cold+0x72/0xab
[ 119.690131] handle_bug+0x3c/0x70
[ 119.690146] exc_invalid_op+0x14/0x50
[ 119.690162] asm_exc_invalid_op+0x16/0x20
[ 119.690181] RIP: 0010:group_sched_out.part.0+0x2c7/0x460
[ 119.690196] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00
[ 119.690209] RSP: 0018:ffff8880202bf8f8 EFLAGS: 00010006
[ 119.690219] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000
[ 119.690227] RDX: ffff88801bf5b580 RSI: ffffffff81566027 RDI: 0000000000000005
[ 119.690236] RBP: ffff8880184f8000 R08: 0000000000000005 R09: 0000000000000001
[ 119.690244] R10: 0000000000000000 R11: 0000000000000001 R12: ffff88800d123000
[ 119.690252] R13: ffff88806cf3d100 R14: ffffffff8547bfc0 R15: 0000000000000002
[ 119.690264] ? group_sched_out.part.0+0x2c7/0x460
[ 119.690279] ? group_sched_out.part.0+0x2c7/0x460
[ 119.690293] ctx_sched_out+0x8f1/0xc10
[ 119.690307] __perf_event_task_sched_out+0x6d0/0x18d0
[ 119.690324] ? lock_is_held_type+0xd7/0x130
[ 119.690344] ? __perf_cgroup_move+0x160/0x160
[ 119.690357] ? set_next_entity+0x304/0x550
[ 119.690380] ? lock_is_held_type+0xd7/0x130
[ 119.690400] __schedule+0xedd/0x2470
[ 119.690414] ? io_schedule_timeout+0x150/0x150
[ 119.690426] ? futex_wait_setup+0x166/0x230
[ 119.690442] schedule+0xda/0x1b0
[ 119.690454] futex_wait_queue+0xf5/0x1e0
[ 119.690467] futex_wait+0x28e/0x690
[ 119.690481] ? futex_wait_setup+0x230/0x230
[ 119.690496] ? wake_up_q+0x8b/0xf0
[ 119.690510] ? do_raw_spin_unlock+0x4f/0x220
[ 119.690532] ? futex_wake+0x158/0x490
[ 119.690549] ? lock_downgrade+0x6d0/0x6d0
[ 119.690568] ? lock_is_held_type+0xd7/0x130
[ 119.690589] do_futex+0x2ff/0x380
[ 119.690601] ? __ia32_compat_sys_get_robust_list+0x3b0/0x3b0
[ 119.690616] ? ktime_get+0x153/0x1f0
[ 119.690637] __x64_sys_futex+0x1c6/0x4d0
[ 119.690651] ? hrtimer_interrupt+0x5b0/0x770
[ 119.690666] ? __x64_sys_futex_time32+0x480/0x480
[ 119.690680] ? syscall_enter_from_user_mode+0x1d/0x50
[ 119.690700] ? syscall_enter_from_user_mode+0x1d/0x50
[ 119.690722] do_syscall_64+0x3b/0x90
[ 119.690738] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 119.690757] RIP: 0033:0x7f1465ff1b19
[ 119.690766] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 119.690778] RSP: 002b:00007f1463567218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
[ 119.690790] RAX: ffffffffffffffda RBX: 00007f1466104f68 RCX: 00007f1465ff1b19
[ 119.690799] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f1466104f68
[ 119.690807] RBP: 00007f1466104f60 R08: 0000000000000000 R09: 0000000000000000
[ 119.690815] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1466104f6c
[ 119.690823] R13: 00007fffc102c9af R14: 00007f1463567300 R15: 0000000000022000
[ 119.690838]
[ 119.758312] WARNING: CPU: 1 PID: 3778 at kernel/events/core.c:2309 group_sched_out.part.0+0x2c7/0x460
[ 119.759026] Modules linked in:
[ 119.759285] CPU: 1 PID: 3778 Comm: syz-executor.7 Not tainted 6.0.0-rc5-next-20220912 #1
[ 119.759906] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
[ 119.760774] RIP: 0010:group_sched_out.part.0+0x2c7/0x460
[ 119.761190] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00
[ 119.762584] RSP: 0018:ffff8880202bf8f8 EFLAGS: 00010006
[ 119.762994] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000
[ 119.763541] RDX: ffff88801bf5b580 RSI: ffffffff81566027 RDI: 0000000000000005
[ 119.764105] RBP: ffff8880184f8000 R08: 0000000000000005 R09: 0000000000000001
[ 119.764658] R10: 0000000000000000 R11: 0000000000000001 R12: ffff88800d123000
[ 119.765208] R13: ffff88806cf3d100 R14: ffffffff8547bfc0 R15: 0000000000000002
[ 119.765756] FS: 00007f1463567700(0000) GS:ffff88806cf00000(0000) knlGS:0000000000000000
[ 119.766380] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 119.766832] CR2: 00007f46b1287128 CR3: 00000000177e0000 CR4: 0000000000350ee0
[ 119.767382] Call Trace:
[ 119.767589]
[ 119.767769] ctx_sched_out+0x8f1/0xc10
[ 119.768093] __perf_event_task_sched_out+0x6d0/0x18d0
[ 119.768502] ? lock_is_held_type+0xd7/0x130
[ 119.768848] ? __perf_cgroup_move+0x160/0x160
[ 119.769204] ? set_next_entity+0x304/0x550
[ 119.769541] ? lock_is_held_type+0xd7/0x130
[ 119.769889] __schedule+0xedd/0x2470
[ 119.770184] ? io_schedule_timeout+0x150/0x150
[ 119.770546] ? futex_wait_setup+0x166/0x230
[ 119.770885] schedule+0xda/0x1b0
[ 119.771160] futex_wait_queue+0xf5/0x1e0
[ 119.771478] futex_wait+0x28e/0x690
[ 119.771767] ? futex_wait_setup+0x230/0x230
[ 119.772115] ? wake_up_q+0x8b/0xf0
[ 119.772397] ? do_raw_spin_unlock+0x4f/0x220
[ 119.772751] ? futex_wake+0x158/0x490
[ 119.773056] ? lock_downgrade+0x6d0/0x6d0
[ 119.773387] ? lock_is_held_type+0xd7/0x130
[ 119.773730] do_futex+0x2ff/0x380
[ 119.774005] ? __ia32_compat_sys_get_robust_list+0x3b0/0x3b0
[ 119.774457] ? ktime_get+0x153/0x1f0
[ 119.774758] __x64_sys_futex+0x1c6/0x4d0
[ 119.775075] ? hrtimer_interrupt+0x5b0/0x770
[ 119.775418] ? __x64_sys_futex_time32+0x480/0x480
[ 119.775787] ? syscall_enter_from_user_mode+0x1d/0x50
[ 119.776202] ? syscall_enter_from_user_mode+0x1d/0x50
[ 119.776607] do_syscall_64+0x3b/0x90
[ 119.776899] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 119.777305] RIP: 0033:0x7f1465ff1b19
[ 119.777598] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 119.778982] RSP: 002b:00007f1463567218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
[ 119.779563] RAX: ffffffffffffffda RBX: 00007f1466104f68 RCX: 00007f1465ff1b19
[ 119.780107] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f1466104f68
[ 119.780653] RBP: 00007f1466104f60 R08: 0000000000000000 R09: 0000000000000000
[ 119.781196] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1466104f6c
[ 119.781740] R13: 00007fffc102c9af R14: 00007f1463567300 R15: 0000000000022000
[ 119.782288]
[ 119.782471] irq event stamp: 718
[ 119.782726] hardirqs last enabled at (717): [] syscall_enter_from_user_mode+0x1d/0x50
[ 119.783452] hardirqs last disabled at (718): [] __schedule+0x1225/0x2470
[ 119.784087] softirqs last enabled at (550): [] __irq_exit_rcu+0x11b/0x180
[ 119.784739] softirqs last disabled at (289): [] __irq_exit_rcu+0x11b/0x180
[ 119.785397] ---[ end trace 0000000000000000 ]---
[ 120.926504] audit: type=1400 audit(1662989297.629:9): avc: denied { watch_reads } for pid=3876 comm="syz-executor.5" path="/dev/bsg" dev="devtmpfs" ino=113 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=dir permissive=1
13:28:20 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mq_open(0x0, 0x0, 0x0, 0x0)
13:28:20 executing program 2:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
socket$nl_generic(0x10, 0x3, 0x10)
syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff)
sendmsg$ETHTOOL_MSG_EEE_GET(0xffffffffffffffff, 0x0, 0x0)
fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000340))
setsockopt$inet6_IPV6_RTHDRDSTOPTS(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x8)
getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000300))
socket$nl_generic(0x10, 0x3, 0x10)
syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0)
pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty, 0x6}, 0x1c)
sendfile(r0, r0, 0x0, 0x100000)
13:28:20 executing program 3:
io_uring_setup(0x67aa, &(0x7f0000000000)={0x0, 0x7aa6})
syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, 0x0, 0x0)
syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$NL80211_CMD_GET_MESH_CONFIG(r0, &(0x7f0000000440)={&(0x7f0000000380), 0xc, 0x0}, 0x0)
execveat(0xffffffffffffffff, &(0x7f0000000480)='./file0/file0\x00', 0x0, &(0x7f0000000600)=[&(0x7f0000000580)='\x00'], 0x0)
syz_genetlink_get_family_id$nl80211(&(0x7f0000000ac0), r0)
13:28:20 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x8000}, 0x4)
syz_emit_ethernet(0xfdef, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaa7700c24d06a70800", @ANYRES32], 0x0)
13:28:20 executing program 7:
fcntl$getownex(0xffffffffffffffff, 0x10, 0x0)
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0)
openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x131001, 0x0)
ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4)
sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0)
sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x2c}, 0x1, 0x0, 0x0, 0x20010800}, 0x0)
r2 = syz_open_procfs(0xffffffffffffffff, 0x0)
r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x2000, 0x0)
getdents64(r3, 0x0, 0x0)
sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x20008088}, 0x8000)
mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000008, 0x10, 0xffffffffffffffff, 0x21976000)
pivot_root(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00')
sendfile(r0, r3, &(0x7f0000000080)=0x1000, 0x1f00)
pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000)
13:28:20 executing program 1:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
pwritev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)="c4", 0x1}], 0x1, 0x409e74, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
lsetxattr$security_capability(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, 0x0, 0x0)
sendfile(r1, r1, 0x0, 0x100000)
13:28:20 executing program 5:
r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
fcntl$notify(r0, 0x402, 0x2)
fcntl$notify(r0, 0x402, 0x1d)
13:28:20 executing program 6:
r0 = fsopen(&(0x7f0000000040)='tracefs\x00', 0x0)
fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0)
r1 = fsmount(r0, 0x0, 0x0)
openat(r1, &(0x7f0000000100)='./file1\x00', 0x141040, 0x0)
13:28:20 executing program 5:
r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
fcntl$notify(r0, 0x402, 0x2)
fcntl$notify(r0, 0x402, 0x1d)
13:28:20 executing program 6:
r0 = fsopen(&(0x7f0000000040)='tracefs\x00', 0x0)
fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0)
r1 = fsmount(r0, 0x0, 0x0)
openat(r1, &(0x7f0000000100)='./file1\x00', 0x141040, 0x0)
13:28:20 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x8000}, 0x4)
syz_emit_ethernet(0xfdef, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaa7700c24d06a70800", @ANYRES32], 0x0)
13:28:20 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mq_open(0x0, 0x0, 0x0, 0x0)
13:28:20 executing program 5:
r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
fcntl$notify(r0, 0x402, 0x2)
fcntl$notify(r0, 0x402, 0x1d)
13:28:20 executing program 3:
io_uring_setup(0x67aa, &(0x7f0000000000)={0x0, 0x7aa6})
syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, 0x0, 0x0)
syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$NL80211_CMD_GET_MESH_CONFIG(r0, &(0x7f0000000440)={&(0x7f0000000380), 0xc, 0x0}, 0x0)
execveat(0xffffffffffffffff, &(0x7f0000000480)='./file0/file0\x00', 0x0, &(0x7f0000000600)=[&(0x7f0000000580)='\x00'], 0x0)
syz_genetlink_get_family_id$nl80211(&(0x7f0000000ac0), r0)
13:28:20 executing program 1:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
pwritev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)="c4", 0x1}], 0x1, 0x409e74, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
lsetxattr$security_capability(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, 0x0, 0x0)
sendfile(r1, r1, 0x0, 0x100000)
13:28:20 executing program 6:
r0 = fsopen(&(0x7f0000000040)='tracefs\x00', 0x0)
fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0)
r1 = fsmount(r0, 0x0, 0x0)
openat(r1, &(0x7f0000000100)='./file1\x00', 0x141040, 0x0)
13:28:20 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x8000}, 0x4)
syz_emit_ethernet(0xfdef, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaa7700c24d06a70800", @ANYRES32], 0x0)
13:28:20 executing program 2:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
socket$nl_generic(0x10, 0x3, 0x10)
syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff)
sendmsg$ETHTOOL_MSG_EEE_GET(0xffffffffffffffff, 0x0, 0x0)
fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000340))
setsockopt$inet6_IPV6_RTHDRDSTOPTS(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x8)
getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000300))
socket$nl_generic(0x10, 0x3, 0x10)
syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0)
pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty, 0x6}, 0x1c)
sendfile(r0, r0, 0x0, 0x100000)
13:28:20 executing program 7:
fcntl$getownex(0xffffffffffffffff, 0x10, 0x0)
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0)
openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x131001, 0x0)
ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4)
sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0)
sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x2c}, 0x1, 0x0, 0x0, 0x20010800}, 0x0)
r2 = syz_open_procfs(0xffffffffffffffff, 0x0)
r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x2000, 0x0)
getdents64(r3, 0x0, 0x0)
sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x20008088}, 0x8000)
mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000008, 0x10, 0xffffffffffffffff, 0x21976000)
pivot_root(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00')
sendfile(r0, r3, &(0x7f0000000080)=0x1000, 0x1f00)
pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000)
13:28:20 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mq_open(0x0, 0x0, 0x0, 0x0)
[ 124.199394] hrtimer: interrupt took 30908 ns
[ 124.503490] syz-executor.2 (4015) used greatest stack depth: 24312 bytes left
13:28:21 executing program 2:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
socket$nl_generic(0x10, 0x3, 0x10)
syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff)
sendmsg$ETHTOOL_MSG_EEE_GET(0xffffffffffffffff, 0x0, 0x0)
fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000340))
setsockopt$inet6_IPV6_RTHDRDSTOPTS(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x8)
getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000300))
socket$nl_generic(0x10, 0x3, 0x10)
syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0)
pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty, 0x6}, 0x1c)
sendfile(r0, r0, 0x0, 0x100000)
13:28:21 executing program 1:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
pwritev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)="c4", 0x1}], 0x1, 0x409e74, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
lsetxattr$security_capability(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, 0x0, 0x0)
sendfile(r1, r1, 0x0, 0x100000)
13:28:21 executing program 0:
r0 = fsopen(&(0x7f0000000040)='tracefs\x00', 0x0)
fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0)
r1 = fsmount(r0, 0x0, 0x0)
openat(r1, &(0x7f0000000100)='./file1\x00', 0x141040, 0x0)
13:28:21 executing program 5:
r0 = fsopen(&(0x7f0000000040)='tracefs\x00', 0x0)
fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0)
r1 = fsmount(r0, 0x0, 0x0)
openat(r1, &(0x7f0000000100)='./file1\x00', 0x141040, 0x0)
13:28:21 executing program 7:
fcntl$getownex(0xffffffffffffffff, 0x10, 0x0)
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0)
openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x131001, 0x0)
ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4)
sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0)
sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x2c}, 0x1, 0x0, 0x0, 0x20010800}, 0x0)
r2 = syz_open_procfs(0xffffffffffffffff, 0x0)
r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x2000, 0x0)
getdents64(r3, 0x0, 0x0)
sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x20008088}, 0x8000)
mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000008, 0x10, 0xffffffffffffffff, 0x21976000)
pivot_root(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00')
sendfile(r0, r3, &(0x7f0000000080)=0x1000, 0x1f00)
pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000)
13:28:21 executing program 3:
io_uring_setup(0x67aa, &(0x7f0000000000)={0x0, 0x7aa6})
syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, 0x0, 0x0)
syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$NL80211_CMD_GET_MESH_CONFIG(r0, &(0x7f0000000440)={&(0x7f0000000380), 0xc, 0x0}, 0x0)
execveat(0xffffffffffffffff, &(0x7f0000000480)='./file0/file0\x00', 0x0, &(0x7f0000000600)=[&(0x7f0000000580)='\x00'], 0x0)
syz_genetlink_get_family_id$nl80211(&(0x7f0000000ac0), r0)
13:28:21 executing program 6:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
socket$nl_generic(0x10, 0x3, 0x10)
syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff)
sendmsg$ETHTOOL_MSG_EEE_GET(0xffffffffffffffff, 0x0, 0x0)
fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000340))
setsockopt$inet6_IPV6_RTHDRDSTOPTS(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x8)
getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000300))
socket$nl_generic(0x10, 0x3, 0x10)
syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0)
pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty, 0x6}, 0x1c)
sendfile(r0, r0, 0x0, 0x100000)
13:28:21 executing program 4:
r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
fcntl$notify(r0, 0x402, 0x2)
fcntl$notify(r0, 0x402, 0x1d)
13:28:21 executing program 4:
r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
fcntl$notify(r0, 0x402, 0x2)
fcntl$notify(r0, 0x402, 0x1d)
13:28:21 executing program 0:
r0 = fsopen(&(0x7f0000000040)='tracefs\x00', 0x0)
fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0)
r1 = fsmount(r0, 0x0, 0x0)
openat(r1, &(0x7f0000000100)='./file1\x00', 0x141040, 0x0)
13:28:21 executing program 5:
r0 = fsopen(&(0x7f0000000040)='tracefs\x00', 0x0)
fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0)
r1 = fsmount(r0, 0x0, 0x0)
openat(r1, &(0x7f0000000100)='./file1\x00', 0x141040, 0x0)
13:28:21 executing program 3:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
pwritev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)="c4", 0x1}], 0x1, 0x409e74, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
lsetxattr$security_capability(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, 0x0, 0x0)
sendfile(r1, r1, 0x0, 0x100000)
13:28:21 executing program 4:
r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
fcntl$notify(r0, 0x402, 0x2)
fcntl$notify(r0, 0x402, 0x1d)
13:28:21 executing program 5:
r0 = fsopen(&(0x7f0000000040)='tracefs\x00', 0x0)
fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0)
r1 = fsmount(r0, 0x0, 0x0)
openat(r1, &(0x7f0000000100)='./file1\x00', 0x141040, 0x0)
13:28:21 executing program 3:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
pwritev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)="c4", 0x1}], 0x1, 0x409e74, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
lsetxattr$security_capability(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, 0x0, 0x0)
sendfile(r1, r1, 0x0, 0x100000)
13:28:21 executing program 0:
r0 = fsopen(&(0x7f0000000040)='tracefs\x00', 0x0)
fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0)
r1 = fsmount(r0, 0x0, 0x0)
openat(r1, &(0x7f0000000100)='./file1\x00', 0x141040, 0x0)
13:28:21 executing program 6:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
socket$nl_generic(0x10, 0x3, 0x10)
syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff)
sendmsg$ETHTOOL_MSG_EEE_GET(0xffffffffffffffff, 0x0, 0x0)
fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000340))
setsockopt$inet6_IPV6_RTHDRDSTOPTS(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x8)
getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000300))
socket$nl_generic(0x10, 0x3, 0x10)
syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0)
pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty, 0x6}, 0x1c)
sendfile(r0, r0, 0x0, 0x100000)
13:28:21 executing program 1:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
pwritev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)="c4", 0x1}], 0x1, 0x409e74, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
lsetxattr$security_capability(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, 0x0, 0x0)
sendfile(r1, r1, 0x0, 0x100000)
13:28:21 executing program 7:
fcntl$getownex(0xffffffffffffffff, 0x10, 0x0)
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0)
openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x131001, 0x0)
ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4)
sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0)
sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB="2c00000001060109000000000000000000000001050001000700000005000100070000000500010007000000650e0cbb05c9cb60abebf829f34bd2bd1ffe12f9ed2b9d613201c3b2e006ae141937343a9e5dc01c4afab8f764d2a8e80c952de73753b2ee24326a49dbec080bd945a8c4c1ba18b40baa4b7bf5a21b0551738577877a5b0a9367c82bcac5967cae2609441fca870aba7f774d8bd407fca11ff22fd6f6160167254df7886d035bed589f904b4a1f0746cafa15447a9d1cf66b51a7a5f87afb2e94f9f9f0c6d67ccd3b53c2889e210df7c992fddae6a1a95e6daae6ac07afca9199401fa3c04ca1dd524b1d66cd3efa351ab2ebb23867fd9535d280f01b6d9ad239299853339a82cfef"], 0x2c}, 0x1, 0x0, 0x0, 0x20010800}, 0x0)
r2 = syz_open_procfs(0xffffffffffffffff, 0x0)
r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x2000, 0x0)
getdents64(r3, 0x0, 0x0)
sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x20008088}, 0x8000)
mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000008, 0x10, 0xffffffffffffffff, 0x21976000)
pivot_root(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00')
sendfile(r0, r3, &(0x7f0000000080)=0x1000, 0x1f00)
pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000)
13:28:21 executing program 5:
fcntl$getownex(0xffffffffffffffff, 0x10, 0x0)
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0)
openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x131001, 0x0)
ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4)
sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0)
sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x2c}, 0x1, 0x0, 0x0, 0x20010800}, 0x0)
r2 = syz_open_procfs(0xffffffffffffffff, 0x0)
r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x2000, 0x0)
getdents64(r3, 0x0, 0x0)
sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x20008088}, 0x8000)
mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000008, 0x10, 0xffffffffffffffff, 0x21976000)
pivot_root(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00')
sendfile(r0, r3, &(0x7f0000000080)=0x1000, 0x1f00)
pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000)
13:28:21 executing program 4:
fcntl$getownex(0xffffffffffffffff, 0x10, 0x0)
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0)
openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x131001, 0x0)
ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4)
sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0)
sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x2c}, 0x1, 0x0, 0x0, 0x20010800}, 0x0)
r2 = syz_open_procfs(0xffffffffffffffff, 0x0)
r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x2000, 0x0)
getdents64(r3, 0x0, 0x0)
sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x20008088}, 0x8000)
mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000008, 0x10, 0xffffffffffffffff, 0x21976000)
pivot_root(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00')
sendfile(r0, r3, &(0x7f0000000080)=0x1000, 0x1f00)
pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000)
13:28:21 executing program 2:
fcntl$getownex(0xffffffffffffffff, 0x10, 0x0)
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0)
openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x131001, 0x0)
ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4)
sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0)
sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x2c}, 0x1, 0x0, 0x0, 0x20010800}, 0x0)
r2 = syz_open_procfs(0xffffffffffffffff, 0x0)
r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x2000, 0x0)
getdents64(r3, 0x0, 0x0)
sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x20008088}, 0x8000)
mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000008, 0x10, 0xffffffffffffffff, 0x21976000)
pivot_root(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00')
sendfile(r0, r3, &(0x7f0000000080)=0x1000, 0x1f00)
pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000)
13:28:21 executing program 0:
fcntl$getownex(0xffffffffffffffff, 0x10, 0x0)
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0)
openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x131001, 0x0)
ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4)
sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0)
sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x2c}, 0x1, 0x0, 0x0, 0x20010800}, 0x0)
r2 = syz_open_procfs(0xffffffffffffffff, 0x0)
r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x2000, 0x0)
getdents64(r3, 0x0, 0x0)
sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x20008088}, 0x8000)
mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000008, 0x10, 0xffffffffffffffff, 0x21976000)
pivot_root(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00')
sendfile(r0, r3, &(0x7f0000000080)=0x1000, 0x1f00)
pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000)
13:28:21 executing program 1:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
pwritev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)="c4", 0x1}], 0x1, 0x409e74, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
lsetxattr$security_capability(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, 0x0, 0x0)
sendfile(r1, r1, 0x0, 0x100000)
13:28:21 executing program 3:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
pwritev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)="c4", 0x1}], 0x1, 0x409e74, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
lsetxattr$security_capability(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, 0x0, 0x0)
sendfile(r1, r1, 0x0, 0x100000)
13:28:22 executing program 7:
fcntl$getownex(0xffffffffffffffff, 0x10, 0x0)
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0)
openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x131001, 0x0)
ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4)
sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0)
sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x2c}, 0x1, 0x0, 0x0, 0x20010800}, 0x0)
r2 = syz_open_procfs(0xffffffffffffffff, 0x0)
r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x2000, 0x0)
getdents64(r3, 0x0, 0x0)
sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x20008088}, 0x8000)
mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000008, 0x10, 0xffffffffffffffff, 0x21976000)
pivot_root(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00')
sendfile(r0, r3, &(0x7f0000000080)=0x1000, 0x1f00)
pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000)
13:28:22 executing program 0:
fcntl$getownex(0xffffffffffffffff, 0x10, 0x0)
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0)
openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x131001, 0x0)
ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4)
sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0)
sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB="2c00000001060109000000000000000000000001050001000700000005000100070000000500010007000000650e0cbb05c9cb60abebf829f34bd2bd1ffe12f9ed2b9d613201c3b2e006ae141937343a9e5dc01c4afab8f764d2a8e80c952de73753b2ee24326a49dbec080bd945a8c4c1ba18b40baa4b7bf5a21b0551738577877a5b0a9367c82bcac5967cae2609441fca870aba7f774d8bd407fca11ff22fd6f6160167254df7886d035bed589f904b4a1f0746cafa15447a9d1cf66b51a7a5f87afb2e94f9f9f0c6d67ccd3b53c2889e210df7c992fddae6a1a95e6daae6ac07afca9199401fa3c04ca1dd524b1d66cd3efa351ab2ebb23867fd9535d280f01b6d9ad239299853339a82cfef"], 0x2c}, 0x1, 0x0, 0x0, 0x20010800}, 0x0)
r2 = syz_open_procfs(0xffffffffffffffff, 0x0)
r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x2000, 0x0)
getdents64(r3, 0x0, 0x0)
sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x20008088}, 0x8000)
mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000008, 0x10, 0xffffffffffffffff, 0x21976000)
pivot_root(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00')
sendfile(r0, r3, &(0x7f0000000080)=0x1000, 0x1f00)
pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000)
13:28:22 executing program 6:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
socket$nl_generic(0x10, 0x3, 0x10)
syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff)
sendmsg$ETHTOOL_MSG_EEE_GET(0xffffffffffffffff, 0x0, 0x0)
fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000340))
setsockopt$inet6_IPV6_RTHDRDSTOPTS(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x8)
getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000300))
socket$nl_generic(0x10, 0x3, 0x10)
syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0)
pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty, 0x6}, 0x1c)
sendfile(r0, r0, 0x0, 0x100000)
13:28:22 executing program 5:
fcntl$getownex(0xffffffffffffffff, 0x10, 0x0)
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0)
openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x131001, 0x0)
ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4)
sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0)
sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x2c}, 0x1, 0x0, 0x0, 0x20010800}, 0x0)
r2 = syz_open_procfs(0xffffffffffffffff, 0x0)
r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x2000, 0x0)
getdents64(r3, 0x0, 0x0)
sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x20008088}, 0x8000)
mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000008, 0x10, 0xffffffffffffffff, 0x21976000)
pivot_root(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00')
sendfile(r0, r3, &(0x7f0000000080)=0x1000, 0x1f00)
pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000)
13:28:22 executing program 4:
fcntl$getownex(0xffffffffffffffff, 0x10, 0x0)
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0)
openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x131001, 0x0)
ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4)
sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0)
sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB="2c00000001060109000000000000000000000001050001000700000005000100070000000500010007000000650e0cbb05c9cb60abebf829f34bd2bd1ffe12f9ed2b9d613201c3b2e006ae141937343a9e5dc01c4afab8f764d2a8e80c952de73753b2ee24326a49dbec080bd945a8c4c1ba18b40baa4b7bf5a21b0551738577877a5b0a9367c82bcac5967cae2609441fca870aba7f774d8bd407fca11ff22fd6f6160167254df7886d035bed589f904b4a1f0746cafa15447a9d1cf66b51a7a5f87afb2e94f9f9f0c6d67ccd3b53c2889e210df7c992fddae6a1a95e6daae6ac07afca9199401fa3c04ca1dd524b1d66cd3efa351ab2ebb23867fd9535d280f01b6d9ad239299853339a82cfef"], 0x2c}, 0x1, 0x0, 0x0, 0x20010800}, 0x0)
r2 = syz_open_procfs(0xffffffffffffffff, 0x0)
r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x2000, 0x0)
getdents64(r3, 0x0, 0x0)
sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x20008088}, 0x8000)
mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000008, 0x10, 0xffffffffffffffff, 0x21976000)
pivot_root(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00')
sendfile(r0, r3, &(0x7f0000000080)=0x1000, 0x1f00)
pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000)
13:28:22 executing program 2:
fcntl$getownex(0xffffffffffffffff, 0x10, 0x0)
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0)
openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x131001, 0x0)
ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4)
sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0)
sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x2c}, 0x1, 0x0, 0x0, 0x20010800}, 0x0)
r2 = syz_open_procfs(0xffffffffffffffff, 0x0)
r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x2000, 0x0)
getdents64(r3, 0x0, 0x0)
sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x20008088}, 0x8000)
mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000008, 0x10, 0xffffffffffffffff, 0x21976000)
pivot_root(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00')
sendfile(r0, r3, &(0x7f0000000080)=0x1000, 0x1f00)
pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000)
13:28:22 executing program 1:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0)
pwritev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)="c4", 0x1}], 0x1, 0x409e74, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0)
lsetxattr$security_capability(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0, 0x0, 0x0)
sendfile(r1, r1, 0x0, 0x100000)
13:28:22 executing program 3:
r0 = socket$netlink(0x10, 0x3, 0x10)
sendmsg$netlink(r0, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)={0x20, 0x1d, 0x1, 0x0, 0x0, "", [@typed={0x4, 0x0, 0x0, 0x0, @binary}, @nested={0xc, 0xc, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}]}, 0x20}], 0x1}, 0x0)
[ 126.167083] netlink: 'syz-executor.3': attribute type 12 has an invalid length.
13:28:22 executing program 3:
r0 = socket$netlink(0x10, 0x3, 0x10)
sendmsg$netlink(r0, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)={0x20, 0x1d, 0x1, 0x0, 0x0, "", [@typed={0x4, 0x0, 0x0, 0x0, @binary}, @nested={0xc, 0xc, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}]}, 0x20}], 0x1}, 0x0)
[ 126.274281] netlink: 'syz-executor.3': attribute type 12 has an invalid length.
13:28:23 executing program 3:
r0 = socket$netlink(0x10, 0x3, 0x10)
sendmsg$netlink(r0, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)={0x20, 0x1d, 0x1, 0x0, 0x0, "", [@typed={0x4, 0x0, 0x0, 0x0, @binary}, @nested={0xc, 0xc, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}]}, 0x20}], 0x1}, 0x0)
13:28:23 executing program 7:
fcntl$getownex(0xffffffffffffffff, 0x10, 0x0)
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0)
openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x131001, 0x0)
ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4)
sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0)
sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x2c}, 0x1, 0x0, 0x0, 0x20010800}, 0x0)
r2 = syz_open_procfs(0xffffffffffffffff, 0x0)
r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x2000, 0x0)
getdents64(r3, 0x0, 0x0)
sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x20008088}, 0x8000)
mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000008, 0x10, 0xffffffffffffffff, 0x21976000)
pivot_root(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00')
sendfile(r0, r3, &(0x7f0000000080)=0x1000, 0x1f00)
pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000)
13:28:23 executing program 0:
fcntl$getownex(0xffffffffffffffff, 0x10, 0x0)
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0)
openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x131001, 0x0)
ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4)
sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0)
sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x2c}, 0x1, 0x0, 0x0, 0x20010800}, 0x0)
r2 = syz_open_procfs(0xffffffffffffffff, 0x0)
r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x2000, 0x0)
getdents64(r3, 0x0, 0x0)
sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x20008088}, 0x8000)
mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000008, 0x10, 0xffffffffffffffff, 0x21976000)
pivot_root(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00')
sendfile(r0, r3, &(0x7f0000000080)=0x1000, 0x1f00)
pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000)
[ 126.379308] netlink: 'syz-executor.3': attribute type 12 has an invalid length.
13:28:23 executing program 3:
r0 = socket$netlink(0x10, 0x3, 0x10)
sendmsg$netlink(r0, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)={0x20, 0x1d, 0x1, 0x0, 0x0, "", [@typed={0x4, 0x0, 0x0, 0x0, @binary}, @nested={0xc, 0xc, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}]}, 0x20}], 0x1}, 0x0)
[ 126.520024] netlink: 'syz-executor.3': attribute type 12 has an invalid length.
13:28:23 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x9)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
io_setup(0xb, &(0x7f0000000140)=0x0)
r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0)
io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000003c0)="1b7a1666851945cd80a5a2ac0000000000000000b2122fbfdce63a77a865f0778bd425e749feed51f1439746599f0422a9d32dcef6b20d00ce737d913518a188cb9ad737a3f10ee2333baed5899c00ab0d1cce9ff265d634b3b2996ff3a5a91a9283b3b8cbfac984eccdb937f1d200bf96b5b75d5da9e818e348b4", 0x7b, 0x8, 0x0, 0x2}])
r2 = eventfd2(0x7, 0x0)
sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400)
r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00')
close(r1)
openat(r1, &(0x7f0000000480)='./file2\x00', 0x101042, 0x19b)
write(0xffffffffffffffff, 0x0, 0x0)
socket$nl_generic(0x10, 0x3, 0x10)
ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff)
openat(0xffffffffffffffff, 0x0, 0x82040, 0xa)
syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'})
socket$packet(0x11, 0x3, 0x300)
ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000300)={0x7, 0x5})
read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth1_to_team\x00'})
13:28:23 executing program 3:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@remote, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@dev, 0x0, 0x3c}, 0x0, @in6=@mcast1}}, 0xe8)
sendmmsg$inet6(r0, &(0x7f0000001b80)=[{{&(0x7f0000000000)={0x2, 0x4e20, 0x0, @mcast2}, 0x1c, 0x0}}], 0x1, 0x0)
13:28:23 executing program 3:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@remote, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@dev, 0x0, 0x3c}, 0x0, @in6=@mcast1}}, 0xe8)
sendmmsg$inet6(r0, &(0x7f0000001b80)=[{{&(0x7f0000000000)={0x2, 0x4e20, 0x0, @mcast2}, 0x1c, 0x0}}], 0x1, 0x0)
13:28:23 executing program 3:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@remote, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@dev, 0x0, 0x3c}, 0x0, @in6=@mcast1}}, 0xe8)
sendmmsg$inet6(r0, &(0x7f0000001b80)=[{{&(0x7f0000000000)={0x2, 0x4e20, 0x0, @mcast2}, 0x1c, 0x0}}], 0x1, 0x0)
13:28:23 executing program 3:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@remote, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@dev, 0x0, 0x3c}, 0x0, @in6=@mcast1}}, 0xe8)
sendmmsg$inet6(r0, &(0x7f0000001b80)=[{{&(0x7f0000000000)={0x2, 0x4e20, 0x0, @mcast2}, 0x1c, 0x0}}], 0x1, 0x0)
13:28:23 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x9)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
io_setup(0xb, &(0x7f0000000140)=0x0)
r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0)
io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000003c0)="1b7a1666851945cd80a5a2ac0000000000000000b2122fbfdce63a77a865f0778bd425e749feed51f1439746599f0422a9d32dcef6b20d00ce737d913518a188cb9ad737a3f10ee2333baed5899c00ab0d1cce9ff265d634b3b2996ff3a5a91a9283b3b8cbfac984eccdb937f1d200bf96b5b75d5da9e818e348b4", 0x7b, 0x8, 0x0, 0x2}])
r2 = eventfd2(0x7, 0x0)
sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400)
r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00')
close(r1)
openat(r1, &(0x7f0000000480)='./file2\x00', 0x101042, 0x19b)
write(0xffffffffffffffff, 0x0, 0x0)
socket$nl_generic(0x10, 0x3, 0x10)
ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff)
openat(0xffffffffffffffff, 0x0, 0x82040, 0xa)
syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'})
socket$packet(0x11, 0x3, 0x300)
ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000300)={0x7, 0x5})
read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth1_to_team\x00'})
13:28:24 executing program 5:
fcntl$getownex(0xffffffffffffffff, 0x10, 0x0)
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0)
openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x131001, 0x0)
ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4)
sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0)
sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB="2c00000001060109000000000000000000000001050001000700000005000100070000000500010007000000650e0cbb05c9cb60abebf829f34bd2bd1ffe12f9ed2b9d613201c3b2e006ae141937343a9e5dc01c4afab8f764d2a8e80c952de73753b2ee24326a49dbec080bd945a8c4c1ba18b40baa4b7bf5a21b0551738577877a5b0a9367c82bcac5967cae2609441fca870aba7f774d8bd407fca11ff22fd6f6160167254df7886d035bed589f904b4a1f0746cafa15447a9d1cf66b51a7a5f87afb2e94f9f9f0c6d67ccd3b53c2889e210df7c992fddae6a1a95e6daae6ac07afca9199401fa3c04ca1dd524b1d66cd3efa351ab2ebb23867fd9535d280f01b6d9ad239299853339a82cfef"], 0x2c}, 0x1, 0x0, 0x0, 0x20010800}, 0x0)
r2 = syz_open_procfs(0xffffffffffffffff, 0x0)
r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x2000, 0x0)
getdents64(r3, 0x0, 0x0)
sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x20008088}, 0x8000)
mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000008, 0x10, 0xffffffffffffffff, 0x21976000)
pivot_root(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00')
sendfile(r0, r3, &(0x7f0000000080)=0x1000, 0x1f00)
pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000)
13:28:24 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x9)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
io_setup(0xb, &(0x7f0000000140)=0x0)
r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0)
io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000003c0)="1b7a1666851945cd80a5a2ac0000000000000000b2122fbfdce63a77a865f0778bd425e749feed51f1439746599f0422a9d32dcef6b20d00ce737d913518a188cb9ad737a3f10ee2333baed5899c00ab0d1cce9ff265d634b3b2996ff3a5a91a9283b3b8cbfac984eccdb937f1d200bf96b5b75d5da9e818e348b4", 0x7b, 0x8, 0x0, 0x2}])
r2 = eventfd2(0x7, 0x0)
sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400)
r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00')
close(r1)
openat(r1, &(0x7f0000000480)='./file2\x00', 0x101042, 0x19b)
write(0xffffffffffffffff, 0x0, 0x0)
socket$nl_generic(0x10, 0x3, 0x10)
ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff)
openat(0xffffffffffffffff, 0x0, 0x82040, 0xa)
syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'})
socket$packet(0x11, 0x3, 0x300)
ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000300)={0x7, 0x5})
read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth1_to_team\x00'})
13:28:24 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x9)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
io_setup(0xb, &(0x7f0000000140)=0x0)
r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0)
io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000003c0)="1b7a1666851945cd80a5a2ac0000000000000000b2122fbfdce63a77a865f0778bd425e749feed51f1439746599f0422a9d32dcef6b20d00ce737d913518a188cb9ad737a3f10ee2333baed5899c00ab0d1cce9ff265d634b3b2996ff3a5a91a9283b3b8cbfac984eccdb937f1d200bf96b5b75d5da9e818e348b4", 0x7b, 0x8, 0x0, 0x2}])
r2 = eventfd2(0x7, 0x0)
sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400)
r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00')
close(r1)
openat(r1, &(0x7f0000000480)='./file2\x00', 0x101042, 0x19b)
write(0xffffffffffffffff, 0x0, 0x0)
socket$nl_generic(0x10, 0x3, 0x10)
ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff)
openat(0xffffffffffffffff, 0x0, 0x82040, 0xa)
syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'})
socket$packet(0x11, 0x3, 0x300)
ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000300)={0x7, 0x5})
read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth1_to_team\x00'})
13:28:24 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x9)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
io_setup(0xb, &(0x7f0000000140)=0x0)
r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0)
io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000003c0)="1b7a1666851945cd80a5a2ac0000000000000000b2122fbfdce63a77a865f0778bd425e749feed51f1439746599f0422a9d32dcef6b20d00ce737d913518a188cb9ad737a3f10ee2333baed5899c00ab0d1cce9ff265d634b3b2996ff3a5a91a9283b3b8cbfac984eccdb937f1d200bf96b5b75d5da9e818e348b4", 0x7b, 0x8, 0x0, 0x2}])
r2 = eventfd2(0x7, 0x0)
sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400)
r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00')
close(r1)
openat(r1, &(0x7f0000000480)='./file2\x00', 0x101042, 0x19b)
write(0xffffffffffffffff, 0x0, 0x0)
socket$nl_generic(0x10, 0x3, 0x10)
ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff)
openat(0xffffffffffffffff, 0x0, 0x82040, 0xa)
syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'})
socket$packet(0x11, 0x3, 0x300)
ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000300)={0x7, 0x5})
read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth1_to_team\x00'})
13:28:24 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x9)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
io_setup(0xb, &(0x7f0000000140)=0x0)
r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0)
io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000003c0)="1b7a1666851945cd80a5a2ac0000000000000000b2122fbfdce63a77a865f0778bd425e749feed51f1439746599f0422a9d32dcef6b20d00ce737d913518a188cb9ad737a3f10ee2333baed5899c00ab0d1cce9ff265d634b3b2996ff3a5a91a9283b3b8cbfac984eccdb937f1d200bf96b5b75d5da9e818e348b4", 0x7b, 0x8, 0x0, 0x2}])
r2 = eventfd2(0x7, 0x0)
sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400)
r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00')
close(r1)
openat(r1, &(0x7f0000000480)='./file2\x00', 0x101042, 0x19b)
write(0xffffffffffffffff, 0x0, 0x0)
socket$nl_generic(0x10, 0x3, 0x10)
ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff)
openat(0xffffffffffffffff, 0x0, 0x82040, 0xa)
syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'})
socket$packet(0x11, 0x3, 0x300)
ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000300)={0x7, 0x5})
read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth1_to_team\x00'})
13:28:24 executing program 6:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x9)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
io_setup(0xb, &(0x7f0000000140)=0x0)
r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0)
io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000003c0)="1b7a1666851945cd80a5a2ac0000000000000000b2122fbfdce63a77a865f0778bd425e749feed51f1439746599f0422a9d32dcef6b20d00ce737d913518a188cb9ad737a3f10ee2333baed5899c00ab0d1cce9ff265d634b3b2996ff3a5a91a9283b3b8cbfac984eccdb937f1d200bf96b5b75d5da9e818e348b4", 0x7b, 0x8, 0x0, 0x2}])
r2 = eventfd2(0x7, 0x0)
sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400)
r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00')
close(r1)
openat(r1, &(0x7f0000000480)='./file2\x00', 0x101042, 0x19b)
write(0xffffffffffffffff, 0x0, 0x0)
socket$nl_generic(0x10, 0x3, 0x10)
ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff)
openat(0xffffffffffffffff, 0x0, 0x82040, 0xa)
syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'})
socket$packet(0x11, 0x3, 0x300)
ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000300)={0x7, 0x5})
read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth1_to_team\x00'})
13:28:24 executing program 2:
fcntl$getownex(0xffffffffffffffff, 0x10, 0x0)
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0)
openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x131001, 0x0)
ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4)
sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0)
sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x2c}, 0x1, 0x0, 0x0, 0x20010800}, 0x0)
r2 = syz_open_procfs(0xffffffffffffffff, 0x0)
r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x2000, 0x0)
getdents64(r3, 0x0, 0x0)
sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x20008088}, 0x8000)
mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000008, 0x10, 0xffffffffffffffff, 0x21976000)
pivot_root(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00')
sendfile(r0, r3, &(0x7f0000000080)=0x1000, 0x1f00)
pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000)
13:28:24 executing program 4:
fcntl$getownex(0xffffffffffffffff, 0x10, 0x0)
r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0)
openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x131001, 0x0)
ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4)
sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0)
sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x2c}, 0x1, 0x0, 0x0, 0x20010800}, 0x0)
r2 = syz_open_procfs(0xffffffffffffffff, 0x0)
r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x2000, 0x0)
getdents64(r3, 0x0, 0x0)
sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x20008088}, 0x8000)
mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000008, 0x10, 0xffffffffffffffff, 0x21976000)
pivot_root(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00')
sendfile(r0, r3, &(0x7f0000000080)=0x1000, 0x1f00)
pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000)
13:28:25 executing program 6:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x9)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
io_setup(0xb, &(0x7f0000000140)=0x0)
r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0)
io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000003c0)="1b7a1666851945cd80a5a2ac0000000000000000b2122fbfdce63a77a865f0778bd425e749feed51f1439746599f0422a9d32dcef6b20d00ce737d913518a188cb9ad737a3f10ee2333baed5899c00ab0d1cce9ff265d634b3b2996ff3a5a91a9283b3b8cbfac984eccdb937f1d200bf96b5b75d5da9e818e348b4", 0x7b, 0x8, 0x0, 0x2}])
r2 = eventfd2(0x7, 0x0)
sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400)
r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00')
close(r1)
openat(r1, &(0x7f0000000480)='./file2\x00', 0x101042, 0x19b)
write(0xffffffffffffffff, 0x0, 0x0)
socket$nl_generic(0x10, 0x3, 0x10)
ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff)
openat(0xffffffffffffffff, 0x0, 0x82040, 0xa)
syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'})
socket$packet(0x11, 0x3, 0x300)
ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000300)={0x7, 0x5})
read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth1_to_team\x00'})
13:28:25 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x9)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
io_setup(0xb, &(0x7f0000000140)=0x0)
r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0)
io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000003c0)="1b7a1666851945cd80a5a2ac0000000000000000b2122fbfdce63a77a865f0778bd425e749feed51f1439746599f0422a9d32dcef6b20d00ce737d913518a188cb9ad737a3f10ee2333baed5899c00ab0d1cce9ff265d634b3b2996ff3a5a91a9283b3b8cbfac984eccdb937f1d200bf96b5b75d5da9e818e348b4", 0x7b, 0x8, 0x0, 0x2}])
r2 = eventfd2(0x7, 0x0)
sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400)
r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00')
close(r1)
openat(r1, &(0x7f0000000480)='./file2\x00', 0x101042, 0x19b)
write(0xffffffffffffffff, 0x0, 0x0)
socket$nl_generic(0x10, 0x3, 0x10)
ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff)
openat(0xffffffffffffffff, 0x0, 0x82040, 0xa)
syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'})
socket$packet(0x11, 0x3, 0x300)
ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000300)={0x7, 0x5})
read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth1_to_team\x00'})
13:28:25 executing program 4:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x9)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
io_setup(0xb, &(0x7f0000000140)=0x0)
r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0)
io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000003c0)="1b7a1666851945cd80a5a2ac0000000000000000b2122fbfdce63a77a865f0778bd425e749feed51f1439746599f0422a9d32dcef6b20d00ce737d913518a188cb9ad737a3f10ee2333baed5899c00ab0d1cce9ff265d634b3b2996ff3a5a91a9283b3b8cbfac984eccdb937f1d200bf96b5b75d5da9e818e348b4", 0x7b, 0x8, 0x0, 0x2}])
r2 = eventfd2(0x7, 0x0)
sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400)
r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00')
close(r1)
openat(r1, &(0x7f0000000480)='./file2\x00', 0x101042, 0x19b)
write(0xffffffffffffffff, 0x0, 0x0)
socket$nl_generic(0x10, 0x3, 0x10)
ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff)
openat(0xffffffffffffffff, 0x0, 0x82040, 0xa)
syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'})
socket$packet(0x11, 0x3, 0x300)
ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000300)={0x7, 0x5})
read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth1_to_team\x00'})
13:28:25 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x9)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
io_setup(0xb, &(0x7f0000000140)=0x0)
r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0)
io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000003c0)="1b7a1666851945cd80a5a2ac0000000000000000b2122fbfdce63a77a865f0778bd425e749feed51f1439746599f0422a9d32dcef6b20d00ce737d913518a188cb9ad737a3f10ee2333baed5899c00ab0d1cce9ff265d634b3b2996ff3a5a91a9283b3b8cbfac984eccdb937f1d200bf96b5b75d5da9e818e348b4", 0x7b, 0x8, 0x0, 0x2}])
r2 = eventfd2(0x7, 0x0)
sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400)
r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00')
close(r1)
openat(r1, &(0x7f0000000480)='./file2\x00', 0x101042, 0x19b)
write(0xffffffffffffffff, 0x0, 0x0)
socket$nl_generic(0x10, 0x3, 0x10)
ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff)
openat(0xffffffffffffffff, 0x0, 0x82040, 0xa)
syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'})
socket$packet(0x11, 0x3, 0x300)
ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000300)={0x7, 0x5})
read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth1_to_team\x00'})
13:28:25 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x9)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
io_setup(0xb, &(0x7f0000000140)=0x0)
r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0)
io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000003c0)="1b7a1666851945cd80a5a2ac0000000000000000b2122fbfdce63a77a865f0778bd425e749feed51f1439746599f0422a9d32dcef6b20d00ce737d913518a188cb9ad737a3f10ee2333baed5899c00ab0d1cce9ff265d634b3b2996ff3a5a91a9283b3b8cbfac984eccdb937f1d200bf96b5b75d5da9e818e348b4", 0x7b, 0x8, 0x0, 0x2}])
r2 = eventfd2(0x7, 0x0)
sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400)
r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00')
close(r1)
openat(r1, &(0x7f0000000480)='./file2\x00', 0x101042, 0x19b)
write(0xffffffffffffffff, 0x0, 0x0)
socket$nl_generic(0x10, 0x3, 0x10)
ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff)
openat(0xffffffffffffffff, 0x0, 0x82040, 0xa)
syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'})
socket$packet(0x11, 0x3, 0x300)
ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000300)={0x7, 0x5})
read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth1_to_team\x00'})
13:28:25 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x9)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
io_setup(0xb, &(0x7f0000000140)=0x0)
r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0)
io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000003c0)="1b7a1666851945cd80a5a2ac0000000000000000b2122fbfdce63a77a865f0778bd425e749feed51f1439746599f0422a9d32dcef6b20d00ce737d913518a188cb9ad737a3f10ee2333baed5899c00ab0d1cce9ff265d634b3b2996ff3a5a91a9283b3b8cbfac984eccdb937f1d200bf96b5b75d5da9e818e348b4", 0x7b, 0x8, 0x0, 0x2}])
r2 = eventfd2(0x7, 0x0)
sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400)
r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00')
close(r1)
openat(r1, &(0x7f0000000480)='./file2\x00', 0x101042, 0x19b)
write(0xffffffffffffffff, 0x0, 0x0)
socket$nl_generic(0x10, 0x3, 0x10)
ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff)
openat(0xffffffffffffffff, 0x0, 0x82040, 0xa)
syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'})
socket$packet(0x11, 0x3, 0x300)
ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000300)={0x7, 0x5})
read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth1_to_team\x00'})
13:28:25 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x9)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
io_setup(0xb, &(0x7f0000000140)=0x0)
r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0)
io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000003c0)="1b7a1666851945cd80a5a2ac0000000000000000b2122fbfdce63a77a865f0778bd425e749feed51f1439746599f0422a9d32dcef6b20d00ce737d913518a188cb9ad737a3f10ee2333baed5899c00ab0d1cce9ff265d634b3b2996ff3a5a91a9283b3b8cbfac984eccdb937f1d200bf96b5b75d5da9e818e348b4", 0x7b, 0x8, 0x0, 0x2}])
r2 = eventfd2(0x7, 0x0)
sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400)
r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00')
close(r1)
openat(r1, &(0x7f0000000480)='./file2\x00', 0x101042, 0x19b)
write(0xffffffffffffffff, 0x0, 0x0)
socket$nl_generic(0x10, 0x3, 0x10)
ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff)
openat(0xffffffffffffffff, 0x0, 0x82040, 0xa)
syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'})
socket$packet(0x11, 0x3, 0x300)
ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000300)={0x7, 0x5})
read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth1_to_team\x00'})
13:28:25 executing program 5:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x9)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
io_setup(0xb, &(0x7f0000000140)=0x0)
r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0)
io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000003c0)="1b7a1666851945cd80a5a2ac0000000000000000b2122fbfdce63a77a865f0778bd425e749feed51f1439746599f0422a9d32dcef6b20d00ce737d913518a188cb9ad737a3f10ee2333baed5899c00ab0d1cce9ff265d634b3b2996ff3a5a91a9283b3b8cbfac984eccdb937f1d200bf96b5b75d5da9e818e348b4", 0x7b, 0x8, 0x0, 0x2}])
r2 = eventfd2(0x7, 0x0)
sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400)
r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00')
close(r1)
openat(r1, &(0x7f0000000480)='./file2\x00', 0x101042, 0x19b)
write(0xffffffffffffffff, 0x0, 0x0)
socket$nl_generic(0x10, 0x3, 0x10)
ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff)
openat(0xffffffffffffffff, 0x0, 0x82040, 0xa)
syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'})
socket$packet(0x11, 0x3, 0x300)
ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000300)={0x7, 0x5})
read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth1_to_team\x00'})
13:28:25 executing program 5:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x9)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
io_setup(0xb, &(0x7f0000000140)=0x0)
r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0)
io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000003c0)="1b7a1666851945cd80a5a2ac0000000000000000b2122fbfdce63a77a865f0778bd425e749feed51f1439746599f0422a9d32dcef6b20d00ce737d913518a188cb9ad737a3f10ee2333baed5899c00ab0d1cce9ff265d634b3b2996ff3a5a91a9283b3b8cbfac984eccdb937f1d200bf96b5b75d5da9e818e348b4", 0x7b, 0x8, 0x0, 0x2}])
r2 = eventfd2(0x7, 0x0)
sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400)
r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00')
close(r1)
openat(r1, &(0x7f0000000480)='./file2\x00', 0x101042, 0x19b)
write(0xffffffffffffffff, 0x0, 0x0)
socket$nl_generic(0x10, 0x3, 0x10)
ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff)
openat(0xffffffffffffffff, 0x0, 0x82040, 0xa)
syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'})
socket$packet(0x11, 0x3, 0x300)
ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000300)={0x7, 0x5})
read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth1_to_team\x00'})
13:28:25 executing program 4:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x9)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
io_setup(0xb, &(0x7f0000000140)=0x0)
r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0)
io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000003c0)="1b7a1666851945cd80a5a2ac0000000000000000b2122fbfdce63a77a865f0778bd425e749feed51f1439746599f0422a9d32dcef6b20d00ce737d913518a188cb9ad737a3f10ee2333baed5899c00ab0d1cce9ff265d634b3b2996ff3a5a91a9283b3b8cbfac984eccdb937f1d200bf96b5b75d5da9e818e348b4", 0x7b, 0x8, 0x0, 0x2}])
r2 = eventfd2(0x7, 0x0)
sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400)
r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00')
close(r1)
openat(r1, &(0x7f0000000480)='./file2\x00', 0x101042, 0x19b)
write(0xffffffffffffffff, 0x0, 0x0)
socket$nl_generic(0x10, 0x3, 0x10)
ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff)
openat(0xffffffffffffffff, 0x0, 0x82040, 0xa)
syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'})
socket$packet(0x11, 0x3, 0x300)
ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000300)={0x7, 0x5})
read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth1_to_team\x00'})
13:28:25 executing program 6:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x9)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
io_setup(0xb, &(0x7f0000000140)=0x0)
r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0)
io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000003c0)="1b7a1666851945cd80a5a2ac0000000000000000b2122fbfdce63a77a865f0778bd425e749feed51f1439746599f0422a9d32dcef6b20d00ce737d913518a188cb9ad737a3f10ee2333baed5899c00ab0d1cce9ff265d634b3b2996ff3a5a91a9283b3b8cbfac984eccdb937f1d200bf96b5b75d5da9e818e348b4", 0x7b, 0x8, 0x0, 0x2}])
r2 = eventfd2(0x7, 0x0)
sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400)
r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00')
close(r1)
openat(r1, &(0x7f0000000480)='./file2\x00', 0x101042, 0x19b)
write(0xffffffffffffffff, 0x0, 0x0)
socket$nl_generic(0x10, 0x3, 0x10)
ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff)
openat(0xffffffffffffffff, 0x0, 0x82040, 0xa)
syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'})
socket$packet(0x11, 0x3, 0x300)
ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000300)={0x7, 0x5})
read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth1_to_team\x00'})
13:28:25 executing program 7:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x9)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
io_setup(0xb, &(0x7f0000000140)=0x0)
r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0)
io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000003c0)="1b7a1666851945cd80a5a2ac0000000000000000b2122fbfdce63a77a865f0778bd425e749feed51f1439746599f0422a9d32dcef6b20d00ce737d913518a188cb9ad737a3f10ee2333baed5899c00ab0d1cce9ff265d634b3b2996ff3a5a91a9283b3b8cbfac984eccdb937f1d200bf96b5b75d5da9e818e348b4", 0x7b, 0x8, 0x0, 0x2}])
r2 = eventfd2(0x7, 0x0)
sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400)
r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00')
close(r1)
openat(r1, &(0x7f0000000480)='./file2\x00', 0x101042, 0x19b)
write(0xffffffffffffffff, 0x0, 0x0)
socket$nl_generic(0x10, 0x3, 0x10)
ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff)
openat(0xffffffffffffffff, 0x0, 0x82040, 0xa)
syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'})
socket$packet(0x11, 0x3, 0x300)
ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000300)={0x7, 0x5})
read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth1_to_team\x00'})
13:28:25 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x9)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
io_setup(0xb, &(0x7f0000000140)=0x0)
r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0)
io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000003c0)="1b7a1666851945cd80a5a2ac0000000000000000b2122fbfdce63a77a865f0778bd425e749feed51f1439746599f0422a9d32dcef6b20d00ce737d913518a188cb9ad737a3f10ee2333baed5899c00ab0d1cce9ff265d634b3b2996ff3a5a91a9283b3b8cbfac984eccdb937f1d200bf96b5b75d5da9e818e348b4", 0x7b, 0x8, 0x0, 0x2}])
r2 = eventfd2(0x7, 0x0)
sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400)
r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00')
close(r1)
openat(r1, &(0x7f0000000480)='./file2\x00', 0x101042, 0x19b)
write(0xffffffffffffffff, 0x0, 0x0)
socket$nl_generic(0x10, 0x3, 0x10)
ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff)
openat(0xffffffffffffffff, 0x0, 0x82040, 0xa)
syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'})
socket$packet(0x11, 0x3, 0x300)
ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000300)={0x7, 0x5})
read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth1_to_team\x00'})
13:28:25 executing program 2:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x9)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
io_setup(0xb, &(0x7f0000000140)=0x0)
r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0)
io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000003c0)="1b7a1666851945cd80a5a2ac0000000000000000b2122fbfdce63a77a865f0778bd425e749feed51f1439746599f0422a9d32dcef6b20d00ce737d913518a188cb9ad737a3f10ee2333baed5899c00ab0d1cce9ff265d634b3b2996ff3a5a91a9283b3b8cbfac984eccdb937f1d200bf96b5b75d5da9e818e348b4", 0x7b, 0x8, 0x0, 0x2}])
r2 = eventfd2(0x7, 0x0)
sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400)
r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00')
close(r1)
openat(r1, &(0x7f0000000480)='./file2\x00', 0x101042, 0x19b)
write(0xffffffffffffffff, 0x0, 0x0)
socket$nl_generic(0x10, 0x3, 0x10)
ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff)
openat(0xffffffffffffffff, 0x0, 0x82040, 0xa)
syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'})
socket$packet(0x11, 0x3, 0x300)
ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000300)={0x7, 0x5})
read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth1_to_team\x00'})
[ 129.030921] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_OK cmd_age=0s
[ 129.032216] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current]
[ 129.033137] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present
[ 129.034008] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 00 00 00 00 08 00
[ 129.034994] I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 3 prio class 2
13:28:25 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x9)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
io_setup(0xb, &(0x7f0000000140)=0x0)
r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0)
io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000003c0)="1b7a1666851945cd80a5a2ac0000000000000000b2122fbfdce63a77a865f0778bd425e749feed51f1439746599f0422a9d32dcef6b20d00ce737d913518a188cb9ad737a3f10ee2333baed5899c00ab0d1cce9ff265d634b3b2996ff3a5a91a9283b3b8cbfac984eccdb937f1d200bf96b5b75d5da9e818e348b4", 0x7b, 0x8, 0x0, 0x2}])
r2 = eventfd2(0x7, 0x0)
sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400)
r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00')
close(r1)
openat(r1, &(0x7f0000000480)='./file2\x00', 0x101042, 0x19b)
write(0xffffffffffffffff, 0x0, 0x0)
socket$nl_generic(0x10, 0x3, 0x10)
ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff)
openat(0xffffffffffffffff, 0x0, 0x82040, 0xa)
syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'})
socket$packet(0x11, 0x3, 0x300)
ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000300)={0x7, 0x5})
read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth1_to_team\x00'})
13:28:25 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x9)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
io_setup(0xb, &(0x7f0000000140)=0x0)
r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0)
io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000003c0)="1b7a1666851945cd80a5a2ac0000000000000000b2122fbfdce63a77a865f0778bd425e749feed51f1439746599f0422a9d32dcef6b20d00ce737d913518a188cb9ad737a3f10ee2333baed5899c00ab0d1cce9ff265d634b3b2996ff3a5a91a9283b3b8cbfac984eccdb937f1d200bf96b5b75d5da9e818e348b4", 0x7b, 0x8, 0x0, 0x2}])
r2 = eventfd2(0x7, 0x0)
sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400)
r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00')
close(r1)
openat(r1, &(0x7f0000000480)='./file2\x00', 0x101042, 0x19b)
write(0xffffffffffffffff, 0x0, 0x0)
socket$nl_generic(0x10, 0x3, 0x10)
ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff)
openat(0xffffffffffffffff, 0x0, 0x82040, 0xa)
syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'})
socket$packet(0x11, 0x3, 0x300)
ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000300)={0x7, 0x5})
read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth1_to_team\x00'})
[ 129.342661] sr 1:0:0:0: [sr0] tag#0 unaligned transfer
[ 129.343417] I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2
[ 129.344495] Buffer I/O error on dev sr0, logical block 0, async page read
[ 129.354425] sr 1:0:0:0: [sr0] tag#0 unaligned transfer
[ 129.355113] I/O error, dev sr0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2
[ 129.356128] Buffer I/O error on dev sr0, logical block 1, async page read
13:28:26 executing program 4:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x9)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
io_setup(0xb, &(0x7f0000000140)=0x0)
r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0)
io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000003c0)="1b7a1666851945cd80a5a2ac0000000000000000b2122fbfdce63a77a865f0778bd425e749feed51f1439746599f0422a9d32dcef6b20d00ce737d913518a188cb9ad737a3f10ee2333baed5899c00ab0d1cce9ff265d634b3b2996ff3a5a91a9283b3b8cbfac984eccdb937f1d200bf96b5b75d5da9e818e348b4", 0x7b, 0x8, 0x0, 0x2}])
r2 = eventfd2(0x7, 0x0)
sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400)
r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00')
close(r1)
openat(r1, &(0x7f0000000480)='./file2\x00', 0x101042, 0x19b)
write(0xffffffffffffffff, 0x0, 0x0)
socket$nl_generic(0x10, 0x3, 0x10)
ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff)
openat(0xffffffffffffffff, 0x0, 0x82040, 0xa)
syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'})
socket$packet(0x11, 0x3, 0x300)
ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000300)={0x7, 0x5})
read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth1_to_team\x00'})
[ 129.554996] sr 1:0:0:0: [sr0] tag#0 unaligned transfer
[ 129.555719] I/O error, dev sr0, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2
[ 129.556670] Buffer I/O error on dev sr0, logical block 2, async page read
[ 129.634583] sr 1:0:0:0: [sr0] tag#0 unaligned transfer
[ 129.635230] I/O error, dev sr0, sector 3 op 0x0:(READ) flags 0x0 phys_seg 5 prio class 2
[ 129.636154] Buffer I/O error on dev sr0, logical block 3, async page read
[ 129.636930] Buffer I/O error on dev sr0, logical block 4, async page read
[ 129.637701] Buffer I/O error on dev sr0, logical block 5, async page read
[ 129.638459] Buffer I/O error on dev sr0, logical block 6, async page read
[ 129.639205] Buffer I/O error on dev sr0, logical block 7, async page read
[ 129.641219] sr 1:0:0:0: [sr0] tag#0 unaligned transfer
[ 129.641835] I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2
[ 129.642734] Buffer I/O error on dev sr0, logical block 0, async page read
[ 129.644330] sr 1:0:0:0: [sr0] tag#0 unaligned transfer
[ 129.644952] I/O error, dev sr0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2
[ 129.645839] Buffer I/O error on dev sr0, logical block 1, async page read
[ 129.648102] sr 1:0:0:0: [sr0] tag#0 unaligned transfer
[ 129.648731] I/O error, dev sr0, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2
[ 129.650211] sr 1:0:0:0: [sr0] tag#0 unaligned transfer
[ 129.650834] I/O error, dev sr0, sector 3 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2
[ 129.652226] sr 1:0:0:0: [sr0] tag#0 unaligned transfer
[ 129.652857] I/O error, dev sr0, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2
[ 129.654297] sr 1:0:0:0: [sr0] tag#0 unaligned transfer
[ 129.655415] sr 1:0:0:0: [sr0] tag#0 unaligned transfer
[ 129.656543] sr 1:0:0:0: [sr0] tag#0 unaligned transfer
VM DIAGNOSIS:
13:28:16 Registers:
info registers vcpu 0
RAX=0000000000000000 RBX=ffff88806cf3d420 RCX=0000000000000000 RDX=ffff88801b961ac0
RSI=ffffffff813bccdb RDI=0000000000000005 RBP=0000000000000003 RSP=ffff88803da6f960
R8 =0000000000000005 R9 =0000000000000000 R10=0000000000000001 R11=0000000000000001
R12=ffffed100d9e7a85 R13=ffff88806cf3d428 R14=0000000000000001 R15=dffffc0000000000
RIP=ffffffff813bccdd RFL=00000293 [--S-A-C] CPL=0 II=0 A20=1 SMM=0 HLT=0
ES =0000 0000000000000000 00000000 00000000
CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA]
SS =0000 0000000000000000 00000000 00000000
DS =0000 0000000000000000 00000000 00000000
FS =0000 0000555555c14400 00000000 00000000
GS =0000 ffff88806ce00000 00000000 00000000
LDT=0000 fffffe0000000000 00000000 00000000
TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy
GDT= fffffe0000001000 0000007f
IDT= fffffe0000000000 00000fff
CR0=80050033 CR2=00007f14660fc4e0 CR3=00000000177e0000 CR4=00350ef0
DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000
DR6=00000000ffff0ff0 DR7=0000000000000400
EFER=0000000000000d01
FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80
FPR0=0000000000000000 0000 FPR1=0000000000000000 0000
FPR2=0000000000000000 0000 FPR3=0000000000000000 0000
FPR4=0000000000000000 0000 FPR5=0000000000000000 0000
FPR6=0000000000000000 0000 FPR7=0000000000000000 0000
YMM00=0000000000000000 0000000000000000 ff00000000000000 0000000000000000
YMM01=0000000000000000 0000000000000000 0100ff0000000000 0000000000000000
YMM02=0000000000000000 0000000000000000 7463656a6e695f31 313230385f7a7973
YMM03=0000000000000000 0000000000000000 00007f14660d87c8 00007f14660d87c0
YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffff00000000
YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245
YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040
YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000
info registers vcpu 1
RAX=0000000000000030 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8
RSI=ffffffff822b1e41 RDI=ffffffff8763fae0 RBP=ffffffff8763faa0 RSP=ffff8880202bf348
R8 =0000000000000001 R9 =000000000000000a R10=0000000000000030 R11=0000000000000001
R12=0000000000000030 R13=ffffffff8763faa0 R14=0000000000000010 R15=ffffffff822b1e30
RIP=ffffffff822b1e99 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0
ES =0000 0000000000000000 00000000 00000000
CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA]
SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA]
DS =0000 0000000000000000 00000000 00000000
FS =0000 00007f1463567700 00000000 00000000
GS =0000 ffff88806cf00000 00000000 00000000
LDT=0000 fffffe0000000000 00000000 00000000
TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy
GDT= fffffe0000048000 0000007f
IDT= fffffe0000000000 00000fff
CR0=80050033 CR2=00007f46b1287128 CR3=00000000177e0000 CR4=00350ee0
DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000
DR6=00000000ffff0ff0 DR7=0000000000000400
EFER=0000000000000d01
FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80
FPR0=0000000000000000 0000 FPR1=0000000000000000 0000
FPR2=0000000000000000 0000 FPR3=0000000000000000 0000
FPR4=0000000000000000 0000 FPR5=0000000000000000 0000
FPR6=0000000000000000 0000 FPR7=0000000000000000 0000
YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM01=0000000000000000 0000000000000000 00007f14660d87c0 00007f14660d87c8
YMM02=0000000000000000 0000000000000000 00007f14660d87e0 00007f14660d87c0
YMM03=0000000000000000 0000000000000000 00007f14660d87c8 00007f14660d87c0
YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffff00000000
YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245
YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040
YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000
YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000