Warning: Permanently added '[localhost]:42027' (ECDSA) to the list of known hosts. 2022/10/04 14:17:55 fuzzer started 2022/10/04 14:17:56 dialing manager at localhost:46847 syzkaller login: [ 41.314521] cgroup: Unknown subsys name 'net' [ 41.427557] cgroup: Unknown subsys name 'rlimit' 2022/10/04 14:18:09 syscalls: 2215 2022/10/04 14:18:09 code coverage: enabled 2022/10/04 14:18:09 comparison tracing: enabled 2022/10/04 14:18:09 extra coverage: enabled 2022/10/04 14:18:09 setuid sandbox: enabled 2022/10/04 14:18:09 namespace sandbox: enabled 2022/10/04 14:18:09 Android sandbox: enabled 2022/10/04 14:18:09 fault injection: enabled 2022/10/04 14:18:09 leak checking: enabled 2022/10/04 14:18:09 net packet injection: enabled 2022/10/04 14:18:09 net device setup: enabled 2022/10/04 14:18:09 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/10/04 14:18:09 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/10/04 14:18:09 USB emulation: enabled 2022/10/04 14:18:09 hci packet injection: enabled 2022/10/04 14:18:09 wifi device emulation: failed to parse kernel version (6.0.0-next-20221004) 2022/10/04 14:18:09 802.15.4 emulation: enabled 2022/10/04 14:18:09 fetching corpus: 0, signal 0/2000 (executing program) 2022/10/04 14:18:09 fetching corpus: 50, signal 23172/26272 (executing program) 2022/10/04 14:18:09 fetching corpus: 100, signal 34004/38071 (executing program) 2022/10/04 14:18:09 fetching corpus: 150, signal 42014/46844 (executing program) 2022/10/04 14:18:09 fetching corpus: 200, signal 51615/56889 (executing program) 2022/10/04 14:18:10 fetching corpus: 250, signal 56051/61884 (executing program) 2022/10/04 14:18:10 fetching corpus: 300, signal 59693/66066 (executing program) 2022/10/04 14:18:10 fetching corpus: 350, signal 67183/73302 (executing program) 2022/10/04 14:18:10 fetching corpus: 400, signal 71577/77726 (executing program) 2022/10/04 14:18:10 fetching corpus: 450, signal 73778/80206 (executing program) 2022/10/04 14:18:10 fetching corpus: 500, signal 75958/82553 (executing program) 2022/10/04 14:18:10 fetching corpus: 550, signal 80664/86829 (executing program) 2022/10/04 14:18:11 fetching corpus: 600, signal 83841/89750 (executing program) 2022/10/04 14:18:11 fetching corpus: 650, signal 85681/91592 (executing program) 2022/10/04 14:18:11 fetching corpus: 700, signal 87662/93403 (executing program) 2022/10/04 14:18:11 fetching corpus: 750, signal 90040/95485 (executing program) 2022/10/04 14:18:11 fetching corpus: 800, signal 91915/97086 (executing program) 2022/10/04 14:18:11 fetching corpus: 850, signal 94189/99124 (executing program) 2022/10/04 14:18:11 fetching corpus: 900, signal 96720/101053 (executing program) 2022/10/04 14:18:12 fetching corpus: 950, signal 97895/102017 (executing program) 2022/10/04 14:18:12 fetching corpus: 1000, signal 99366/103138 (executing program) 2022/10/04 14:18:12 fetching corpus: 1050, signal 100376/103910 (executing program) 2022/10/04 14:18:12 fetching corpus: 1100, signal 102484/105296 (executing program) 2022/10/04 14:18:12 fetching corpus: 1150, signal 103920/106214 (executing program) 2022/10/04 14:18:12 fetching corpus: 1200, signal 106273/107551 (executing program) 2022/10/04 14:18:12 fetching corpus: 1203, signal 106286/107607 (executing program) 2022/10/04 14:18:12 fetching corpus: 1203, signal 106286/107638 (executing program) 2022/10/04 14:18:12 fetching corpus: 1203, signal 106286/107682 (executing program) 2022/10/04 14:18:12 fetching corpus: 1203, signal 106286/107730 (executing program) 2022/10/04 14:18:12 fetching corpus: 1203, signal 106286/107788 (executing program) 2022/10/04 14:18:12 fetching corpus: 1203, signal 106286/107842 (executing program) 2022/10/04 14:18:12 fetching corpus: 1203, signal 106286/107888 (executing program) 2022/10/04 14:18:12 fetching corpus: 1203, signal 106286/107953 (executing program) 2022/10/04 14:18:12 fetching corpus: 1203, signal 106286/107997 (executing program) 2022/10/04 14:18:12 fetching corpus: 1203, signal 106286/108056 (executing program) 2022/10/04 14:18:12 fetching corpus: 1203, signal 106286/108115 (executing program) 2022/10/04 14:18:12 fetching corpus: 1203, signal 106286/108172 (executing program) 2022/10/04 14:18:12 fetching corpus: 1203, signal 106286/108224 (executing program) 2022/10/04 14:18:12 fetching corpus: 1203, signal 106286/108272 (executing program) 2022/10/04 14:18:12 fetching corpus: 1203, signal 106286/108322 (executing program) 2022/10/04 14:18:12 fetching corpus: 1203, signal 106286/108376 (executing program) 2022/10/04 14:18:12 fetching corpus: 1203, signal 106286/108428 (executing program) 2022/10/04 14:18:12 fetching corpus: 1203, signal 106286/108483 (executing program) 2022/10/04 14:18:12 fetching corpus: 1203, signal 106286/108530 (executing program) 2022/10/04 14:18:12 fetching corpus: 1203, signal 106286/108581 (executing program) 2022/10/04 14:18:12 fetching corpus: 1203, signal 106286/108632 (executing program) 2022/10/04 14:18:12 fetching corpus: 1203, signal 106286/108695 (executing program) 2022/10/04 14:18:12 fetching corpus: 1203, signal 106286/108728 (executing program) 2022/10/04 14:18:13 fetching corpus: 1203, signal 106286/108782 (executing program) 2022/10/04 14:18:13 fetching corpus: 1203, signal 106286/108830 (executing program) 2022/10/04 14:18:13 fetching corpus: 1203, signal 106286/108875 (executing program) 2022/10/04 14:18:13 fetching corpus: 1203, signal 106286/108917 (executing program) 2022/10/04 14:18:13 fetching corpus: 1203, signal 106286/108963 (executing program) 2022/10/04 14:18:13 fetching corpus: 1203, signal 106286/108965 (executing program) 2022/10/04 14:18:13 fetching corpus: 1203, signal 106286/108965 (executing program) 2022/10/04 14:18:15 starting 8 fuzzer processes 14:18:15 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x49, &(0x7f0000000000)={@dev}, 0x14) 14:18:15 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, 0x0) 14:18:15 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000440)) 14:18:15 executing program 3: socketpair(0x2, 0xa, 0x1, &(0x7f00000005c0)) [ 60.754919] audit: type=1400 audit(1664893095.845:6): avc: denied { execmem } for pid=287 comm="syz-executor.1" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 14:18:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="140000001a00010212c91ef13440ca500a"], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:18:15 executing program 5: futex(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0, 0x0) 14:18:15 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000004c0)={@private1, @empty, @empty, 0x0, 0x0, 0x8001}) 14:18:15 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) lsetxattr(&(0x7f0000000340)='./file1\x00', &(0x7f00000003c0)=@random={'security.', '/dev/ptp0\x00'}, &(0x7f0000000400)='/dev/ptp0\x00', 0xa, 0x0) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x800, 0x0) readv(r1, &(0x7f0000000300)=[{&(0x7f0000000140)=""/147, 0x93}, {&(0x7f0000000200)=""/116, 0x74}], 0x2) syz_open_dev$tty20(0xc, 0x4, 0x1) socket$nl_netfilter(0x10, 0x3, 0xc) [ 62.176332] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 62.178925] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 62.181152] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 62.182489] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 62.183759] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 62.185677] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 62.186950] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 62.188061] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 62.189106] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 62.190375] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 62.191475] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 62.192543] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 62.193623] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 62.197381] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 62.201052] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 62.202406] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 62.204129] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 62.208351] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 62.209619] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 62.216425] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 62.227230] Bluetooth: hci4: HCI_REQ-0x0c1a [ 62.228776] Bluetooth: hci1: HCI_REQ-0x0c1a [ 62.231265] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 62.232690] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 62.238838] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 62.240396] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 62.242351] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 62.243882] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 62.249043] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 62.253324] Bluetooth: hci0: HCI_REQ-0x0c1a [ 62.254153] Bluetooth: hci3: HCI_REQ-0x0c1a [ 62.266841] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 62.267388] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 62.269859] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 62.272811] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 62.276185] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 62.276479] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 62.278126] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 62.278780] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 62.280937] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 62.282890] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 62.286724] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 62.287905] Bluetooth: hci5: HCI_REQ-0x0c1a [ 62.292504] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 62.299440] Bluetooth: hci2: HCI_REQ-0x0c1a [ 62.301157] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 62.303771] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 62.305071] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 62.309064] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 62.310937] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 62.312476] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 62.317404] Bluetooth: hci6: HCI_REQ-0x0c1a [ 62.323038] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 62.330061] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 62.351414] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 62.355710] Bluetooth: hci7: HCI_REQ-0x0c1a [ 64.249395] Bluetooth: hci1: command 0x0409 tx timeout [ 64.250496] Bluetooth: hci4: command 0x0409 tx timeout [ 64.312658] Bluetooth: hci2: command 0x0409 tx timeout [ 64.313570] Bluetooth: hci5: command 0x0409 tx timeout [ 64.314478] Bluetooth: hci3: command 0x0409 tx timeout [ 64.315367] Bluetooth: hci0: command 0x0409 tx timeout [ 64.376323] Bluetooth: hci6: command 0x0409 tx timeout [ 64.377542] Bluetooth: hci7: command 0x0409 tx timeout [ 66.296453] Bluetooth: hci4: command 0x041b tx timeout [ 66.297018] Bluetooth: hci1: command 0x041b tx timeout [ 66.360297] Bluetooth: hci0: command 0x041b tx timeout [ 66.360813] Bluetooth: hci3: command 0x041b tx timeout [ 66.361635] Bluetooth: hci5: command 0x041b tx timeout [ 66.362130] Bluetooth: hci2: command 0x041b tx timeout [ 66.425278] Bluetooth: hci7: command 0x041b tx timeout [ 66.425766] Bluetooth: hci6: command 0x041b tx timeout [ 68.344776] Bluetooth: hci1: command 0x040f tx timeout [ 68.345278] Bluetooth: hci4: command 0x040f tx timeout [ 68.409273] Bluetooth: hci2: command 0x040f tx timeout [ 68.409709] Bluetooth: hci5: command 0x040f tx timeout [ 68.410096] Bluetooth: hci3: command 0x040f tx timeout [ 68.410526] Bluetooth: hci0: command 0x040f tx timeout [ 68.473274] Bluetooth: hci6: command 0x040f tx timeout [ 68.473736] Bluetooth: hci7: command 0x040f tx timeout [ 70.393314] Bluetooth: hci4: command 0x0419 tx timeout [ 70.393794] Bluetooth: hci1: command 0x0419 tx timeout [ 70.457289] Bluetooth: hci0: command 0x0419 tx timeout [ 70.457734] Bluetooth: hci3: command 0x0419 tx timeout [ 70.458132] Bluetooth: hci5: command 0x0419 tx timeout [ 70.458621] Bluetooth: hci2: command 0x0419 tx timeout [ 70.521302] Bluetooth: hci7: command 0x0419 tx timeout [ 70.521757] Bluetooth: hci6: command 0x0419 tx timeout [ 123.923115] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 123.932556] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 123.935160] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 123.940459] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 123.942147] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 123.943979] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 123.948916] Bluetooth: hci0: HCI_REQ-0x0c1a [ 124.035968] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 124.039116] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 124.041148] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 124.045839] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 124.050551] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 124.053591] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 124.057983] Bluetooth: hci1: HCI_REQ-0x0c1a [ 124.118366] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 124.122555] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 124.124878] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 124.126043] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 124.128124] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 124.129491] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 124.130542] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 124.132400] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 124.134639] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 124.139558] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 124.141001] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 124.142307] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 124.145933] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 124.147379] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 124.148550] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 124.149567] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 124.150673] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 124.154690] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 124.196690] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 124.198427] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 124.200156] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 124.203555] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 124.213534] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 124.222091] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 124.247817] Bluetooth: hci6: HCI_REQ-0x0c1a [ 124.263112] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 124.275453] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 124.277403] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 124.284140] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 124.286145] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 124.290615] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 124.295763] Bluetooth: hci3: HCI_REQ-0x0c1a [ 124.296572] Bluetooth: hci5: HCI_REQ-0x0c1a [ 124.341349] Bluetooth: hci2: HCI_REQ-0x0c1a [ 124.344968] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 124.348147] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 124.350404] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 124.353295] Bluetooth: hci4: HCI_REQ-0x0c1a [ 124.361605] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 124.364291] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 124.366127] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 124.448318] Bluetooth: hci7: HCI_REQ-0x0c1a [ 126.008311] Bluetooth: hci0: command 0x0409 tx timeout [ 126.072270] Bluetooth: hci1: command 0x0409 tx timeout [ 126.264274] Bluetooth: hci6: command 0x0409 tx timeout [ 126.328298] Bluetooth: hci3: command 0x0409 tx timeout [ 126.328822] Bluetooth: hci5: command 0x0409 tx timeout [ 126.456275] Bluetooth: hci2: command 0x0409 tx timeout [ 126.456859] Bluetooth: hci4: command 0x0409 tx timeout [ 126.520292] Bluetooth: hci7: command 0x0409 tx timeout [ 128.056269] Bluetooth: hci0: command 0x041b tx timeout [ 128.120296] Bluetooth: hci1: command 0x041b tx timeout [ 128.312309] Bluetooth: hci6: command 0x041b tx timeout [ 128.376285] Bluetooth: hci5: command 0x041b tx timeout [ 128.376979] Bluetooth: hci3: command 0x041b tx timeout [ 128.504554] Bluetooth: hci4: command 0x041b tx timeout [ 128.505786] Bluetooth: hci2: command 0x041b tx timeout [ 128.568276] Bluetooth: hci7: command 0x041b tx timeout [ 130.105265] Bluetooth: hci0: command 0x040f tx timeout [ 130.169325] Bluetooth: hci1: command 0x040f tx timeout [ 130.361314] Bluetooth: hci6: command 0x040f tx timeout [ 130.424270] Bluetooth: hci3: command 0x040f tx timeout [ 130.424699] Bluetooth: hci5: command 0x040f tx timeout [ 130.553364] Bluetooth: hci2: command 0x040f tx timeout [ 130.553796] Bluetooth: hci4: command 0x040f tx timeout [ 130.617297] Bluetooth: hci7: command 0x040f tx timeout [ 132.152242] Bluetooth: hci0: command 0x0419 tx timeout [ 132.216309] Bluetooth: hci1: command 0x0419 tx timeout [ 132.408940] Bluetooth: hci6: command 0x0419 tx timeout [ 132.473286] Bluetooth: hci5: command 0x0419 tx timeout [ 132.473858] Bluetooth: hci3: command 0x0419 tx timeout [ 132.601276] Bluetooth: hci4: command 0x0419 tx timeout [ 132.601711] Bluetooth: hci2: command 0x0419 tx timeout [ 132.665250] Bluetooth: hci7: command 0x0419 tx timeout [ 174.696502] syz-executor.3 uses obsolete (PF_INET,SOCK_PACKET) 14:20:09 executing program 3: socketpair(0x2, 0xa, 0x1, &(0x7f00000005c0)) 14:20:09 executing program 3: socketpair(0x2, 0xa, 0x1, &(0x7f00000005c0)) 14:20:10 executing program 3: socketpair(0x2, 0xa, 0x1, &(0x7f00000005c0)) 14:20:10 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_mtu(r0, 0x29, 0x46, 0x0, 0x0) 14:20:10 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_mtu(r0, 0x29, 0x46, 0x0, 0x0) 14:20:10 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_mtu(r0, 0x29, 0x46, 0x0, 0x0) 14:20:10 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_mtu(r0, 0x29, 0x46, 0x0, 0x0) 14:20:10 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1036e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000100)={0x69}) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) [ 177.694855] audit: type=1400 audit(1664893212.785:7): avc: denied { open } for pid=7487 comm="syz-executor.7" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 177.696803] audit: type=1400 audit(1664893212.785:8): avc: denied { kernel } for pid=7487 comm="syz-executor.7" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 177.702213] hrtimer: interrupt took 29285 ns [ 177.706565] ------------[ cut here ]------------ [ 177.706597] [ 177.706602] ====================================================== [ 177.706607] WARNING: possible circular locking dependency detected [ 177.706614] 6.0.0-next-20221004 #1 Not tainted [ 177.706625] ------------------------------------------------------ [ 177.706630] syz-executor.7/7488 is trying to acquire lock: [ 177.706641] ffffffff853faaf8 ((console_sem).lock){-...}-{2:2}, at: down_trylock+0xe/0x70 [ 177.706706] [ 177.706706] but task is already holding lock: [ 177.706711] ffff88800d29f420 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 177.706757] [ 177.706757] which lock already depends on the new lock. [ 177.706757] [ 177.706762] [ 177.706762] the existing dependency chain (in reverse order) is: [ 177.706768] [ 177.706768] -> #3 (&ctx->lock){....}-{2:2}: [ 177.706793] _raw_spin_lock+0x2a/0x40 [ 177.706814] __perf_event_task_sched_out+0x53b/0x18d0 [ 177.706835] __schedule+0xedd/0x2470 [ 177.706861] preempt_schedule_common+0x45/0xc0 [ 177.706889] __cond_resched+0x17/0x30 [ 177.706916] __mutex_lock+0xa3/0x14d0 [ 177.706944] __do_sys_perf_event_open+0x1eec/0x32c0 [ 177.706965] do_syscall_64+0x3b/0x90 [ 177.706997] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 177.707021] [ 177.707021] -> #2 (&rq->__lock){-.-.}-{2:2}: [ 177.707046] _raw_spin_lock_nested+0x30/0x40 [ 177.707066] raw_spin_rq_lock_nested+0x1e/0x30 [ 177.707090] task_fork_fair+0x63/0x4d0 [ 177.707120] sched_cgroup_fork+0x3d0/0x540 [ 177.707145] copy_process+0x4183/0x6e20 [ 177.707164] kernel_clone+0xe7/0x890 [ 177.707181] user_mode_thread+0xad/0xf0 [ 177.707200] rest_init+0x24/0x250 [ 177.707222] arch_call_rest_init+0xf/0x14 [ 177.707255] start_kernel+0x4c6/0x4eb [ 177.707285] secondary_startup_64_no_verify+0xe0/0xeb [ 177.707310] [ 177.707310] -> #1 (&p->pi_lock){-.-.}-{2:2}: [ 177.707335] _raw_spin_lock_irqsave+0x39/0x60 [ 177.707355] try_to_wake_up+0xab/0x1930 [ 177.707379] up+0x75/0xb0 [ 177.707406] __up_console_sem+0x6e/0x80 [ 177.707434] console_unlock+0x46a/0x590 [ 177.707463] vt_ioctl+0x2822/0x2ca0 [ 177.707484] tty_ioctl+0x785/0x16b0 [ 177.707504] __x64_sys_ioctl+0x19a/0x210 [ 177.707528] do_syscall_64+0x3b/0x90 [ 177.707559] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 177.707584] [ 177.707584] -> #0 ((console_sem).lock){-...}-{2:2}: [ 177.707608] __lock_acquire+0x2a02/0x5e70 [ 177.707639] lock_acquire+0x1a2/0x530 [ 177.707667] _raw_spin_lock_irqsave+0x39/0x60 [ 177.707688] down_trylock+0xe/0x70 [ 177.707716] __down_trylock_console_sem+0x3b/0xd0 [ 177.707746] vprintk_emit+0x16b/0x560 [ 177.707778] vprintk+0x84/0xa0 [ 177.707809] _printk+0xba/0xf1 [ 177.707830] report_bug.cold+0x72/0xab [ 177.707861] handle_bug+0x3c/0x70 [ 177.707877] exc_invalid_op+0x14/0x50 [ 177.707894] asm_exc_invalid_op+0x16/0x20 [ 177.707917] group_sched_out.part.0+0x2c7/0x460 [ 177.707949] ctx_sched_out+0x8f1/0xc10 [ 177.707979] __perf_event_task_sched_out+0x6d0/0x18d0 [ 177.708000] __schedule+0xedd/0x2470 [ 177.708026] preempt_schedule_common+0x45/0xc0 [ 177.708054] __cond_resched+0x17/0x30 [ 177.708080] __mutex_lock+0xa3/0x14d0 [ 177.708108] __do_sys_perf_event_open+0x1eec/0x32c0 [ 177.708129] do_syscall_64+0x3b/0x90 [ 177.708161] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 177.708185] [ 177.708185] other info that might help us debug this: [ 177.708185] [ 177.708190] Chain exists of: [ 177.708190] (console_sem).lock --> &rq->__lock --> &ctx->lock [ 177.708190] [ 177.708216] Possible unsafe locking scenario: [ 177.708216] [ 177.708220] CPU0 CPU1 [ 177.708224] ---- ---- [ 177.708228] lock(&ctx->lock); [ 177.708238] lock(&rq->__lock); [ 177.708249] lock(&ctx->lock); [ 177.708260] lock((console_sem).lock); [ 177.708271] [ 177.708271] *** DEADLOCK *** [ 177.708271] [ 177.708274] 2 locks held by syz-executor.7/7488: [ 177.708286] #0: ffff88806ce37e98 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x1cf/0x2470 [ 177.708341] #1: ffff88800d29f420 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 177.708389] [ 177.708389] stack backtrace: [ 177.708394] CPU: 0 PID: 7488 Comm: syz-executor.7 Not tainted 6.0.0-next-20221004 #1 [ 177.708427] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 177.708441] Call Trace: [ 177.708446] [ 177.708453] dump_stack_lvl+0x8b/0xb3 [ 177.708487] check_noncircular+0x263/0x2e0 [ 177.708518] ? format_decode+0x26c/0xb50 [ 177.708548] ? print_circular_bug+0x450/0x450 [ 177.708579] ? simple_strtoul+0x30/0x30 [ 177.708607] ? __lockdep_reset_lock+0x180/0x180 [ 177.708638] ? format_decode+0x26c/0xb50 [ 177.708671] ? alloc_chain_hlocks+0x1ec/0x5a0 [ 177.708703] __lock_acquire+0x2a02/0x5e70 [ 177.708743] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 177.708784] lock_acquire+0x1a2/0x530 [ 177.708815] ? down_trylock+0xe/0x70 [ 177.708848] ? lock_release+0x750/0x750 [ 177.708882] ? find_held_lock+0x2c/0x110 [ 177.708913] ? vprintk+0x84/0xa0 [ 177.708945] _raw_spin_lock_irqsave+0x39/0x60 [ 177.708967] ? down_trylock+0xe/0x70 [ 177.708998] down_trylock+0xe/0x70 [ 177.709029] ? vprintk+0x84/0xa0 [ 177.709060] __down_trylock_console_sem+0x3b/0xd0 [ 177.709092] vprintk_emit+0x16b/0x560 [ 177.709126] vprintk+0x84/0xa0 [ 177.709158] _printk+0xba/0xf1 [ 177.709181] ? record_print_text.cold+0x16/0x16 [ 177.709207] ? hrtimer_try_to_cancel+0x163/0x2c0 [ 177.709233] ? lock_downgrade+0x6d0/0x6d0 [ 177.709266] ? report_bug.cold+0x66/0xab [ 177.709300] ? group_sched_out.part.0+0x2c7/0x460 [ 177.709334] report_bug.cold+0x72/0xab [ 177.709369] handle_bug+0x3c/0x70 [ 177.709388] exc_invalid_op+0x14/0x50 [ 177.709407] asm_exc_invalid_op+0x16/0x20 [ 177.709432] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 177.709469] Code: 5e 41 5f e9 8b ae ef ff e8 86 ae ef ff 65 8b 1d 2b 08 ac 7e 31 ff 89 de e8 26 ab ef ff 85 db 0f 84 8a 00 00 00 e8 69 ae ef ff <0f> 0b e9 a5 fe ff ff e8 5d ae ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 177.709489] RSP: 0018:ffff88803e897978 EFLAGS: 00010006 [ 177.709506] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 177.709520] RDX: ffff8880174b0000 RSI: ffffffff81566da7 RDI: 0000000000000005 [ 177.709534] RBP: ffff8880086605c8 R08: 0000000000000005 R09: 0000000000000001 [ 177.709547] R10: 0000000000000000 R11: 0000000000000001 R12: ffff88800d29f400 [ 177.709561] R13: ffff88806ce3d2c0 R14: ffffffff8547c9a0 R15: 0000000000000002 [ 177.709581] ? group_sched_out.part.0+0x2c7/0x460 [ 177.709618] ? group_sched_out.part.0+0x2c7/0x460 [ 177.709654] ctx_sched_out+0x8f1/0xc10 [ 177.709690] __perf_event_task_sched_out+0x6d0/0x18d0 [ 177.709716] ? lock_is_held_type+0xd7/0x130 [ 177.709743] ? __perf_cgroup_move+0x160/0x160 [ 177.709763] ? set_next_entity+0x304/0x550 [ 177.709795] ? update_curr+0x267/0x740 [ 177.709829] ? lock_is_held_type+0xd7/0x130 [ 177.709856] __schedule+0xedd/0x2470 [ 177.709888] ? io_schedule_timeout+0x150/0x150 [ 177.709920] ? lock_is_held_type+0xd7/0x130 [ 177.709945] ? __cond_resched+0x17/0x30 [ 177.709975] preempt_schedule_common+0x45/0xc0 [ 177.710006] __cond_resched+0x17/0x30 [ 177.710034] __mutex_lock+0xa3/0x14d0 [ 177.710067] ? __do_sys_perf_event_open+0x1eec/0x32c0 [ 177.710091] ? __up_read+0x192/0x730 [ 177.710117] ? mutex_lock_io_nested+0x1310/0x1310 [ 177.710149] ? __up_read+0x19f/0x730 [ 177.710177] ? up_write+0x520/0x520 [ 177.710209] __do_sys_perf_event_open+0x1eec/0x32c0 [ 177.710238] ? perf_compat_ioctl+0x130/0x130 [ 177.710258] ? xfd_validate_state+0x59/0x180 [ 177.710299] ? syscall_enter_from_user_mode+0x1d/0x50 [ 177.710326] ? syscall_enter_from_user_mode+0x1d/0x50 [ 177.710356] do_syscall_64+0x3b/0x90 [ 177.710389] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 177.710415] RIP: 0033:0x7fed59eadb19 [ 177.710430] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 177.710450] RSP: 002b:00007fed57423188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 177.710470] RAX: ffffffffffffffda RBX: 00007fed59fc0f60 RCX: 00007fed59eadb19 [ 177.710484] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 0000000020000280 [ 177.710498] RBP: 00007fed59f07f6d R08: 0000000000000000 R09: 0000000000000000 [ 177.710512] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000000 [ 177.710525] R13: 00007fff05796ccf R14: 00007fed57423300 R15: 0000000000022000 [ 177.710549] [ 177.818799] WARNING: CPU: 0 PID: 7488 at kernel/events/core.c:2309 group_sched_out.part.0+0x2c7/0x460 [ 177.819991] Modules linked in: [ 177.820436] CPU: 0 PID: 7488 Comm: syz-executor.7 Not tainted 6.0.0-next-20221004 #1 [ 177.821452] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 177.822939] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 177.823680] Code: 5e 41 5f e9 8b ae ef ff e8 86 ae ef ff 65 8b 1d 2b 08 ac 7e 31 ff 89 de e8 26 ab ef ff 85 db 0f 84 8a 00 00 00 e8 69 ae ef ff <0f> 0b e9 a5 fe ff ff e8 5d ae ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 177.826077] RSP: 0018:ffff88803e897978 EFLAGS: 00010006 [ 177.826789] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 177.827733] RDX: ffff8880174b0000 RSI: ffffffff81566da7 RDI: 0000000000000005 [ 177.828695] RBP: ffff8880086605c8 R08: 0000000000000005 R09: 0000000000000001 [ 177.829633] R10: 0000000000000000 R11: 0000000000000001 R12: ffff88800d29f400 [ 177.830576] R13: ffff88806ce3d2c0 R14: ffffffff8547c9a0 R15: 0000000000000002 [ 177.831519] FS: 00007fed57423700(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 177.832596] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 177.833373] CR2: 00007fd9513dc760 CR3: 000000001ad06000 CR4: 0000000000350ef0 [ 177.834318] Call Trace: [ 177.834669] [ 177.834980] ctx_sched_out+0x8f1/0xc10 [ 177.835528] __perf_event_task_sched_out+0x6d0/0x18d0 [ 177.836225] ? lock_is_held_type+0xd7/0x130 [ 177.836836] ? __perf_cgroup_move+0x160/0x160 [ 177.837441] ? set_next_entity+0x304/0x550 [ 177.838037] ? update_curr+0x267/0x740 [ 177.838588] ? lock_is_held_type+0xd7/0x130 [ 177.839176] __schedule+0xedd/0x2470 [ 177.839699] ? io_schedule_timeout+0x150/0x150 [ 177.840327] ? lock_is_held_type+0xd7/0x130 [ 177.840933] ? __cond_resched+0x17/0x30 [ 177.841486] preempt_schedule_common+0x45/0xc0 [ 177.842117] __cond_resched+0x17/0x30 [ 177.842648] __mutex_lock+0xa3/0x14d0 [ 177.843187] ? __do_sys_perf_event_open+0x1eec/0x32c0 [ 177.843880] ? __up_read+0x192/0x730 [ 177.844393] ? mutex_lock_io_nested+0x1310/0x1310 [ 177.845072] ? __up_read+0x19f/0x730 [ 177.845591] ? up_write+0x520/0x520 [ 177.846101] __do_sys_perf_event_open+0x1eec/0x32c0 [ 177.846777] ? perf_compat_ioctl+0x130/0x130 [ 177.847374] ? xfd_validate_state+0x59/0x180 [ 177.847997] ? syscall_enter_from_user_mode+0x1d/0x50 [ 177.848709] ? syscall_enter_from_user_mode+0x1d/0x50 [ 177.849407] do_syscall_64+0x3b/0x90 [ 177.849932] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 177.850629] RIP: 0033:0x7fed59eadb19 [ 177.851132] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 177.853522] RSP: 002b:00007fed57423188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 177.854532] RAX: ffffffffffffffda RBX: 00007fed59fc0f60 RCX: 00007fed59eadb19 [ 177.855476] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 0000000020000280 [ 177.856424] RBP: 00007fed59f07f6d R08: 0000000000000000 R09: 0000000000000000 [ 177.857370] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000000 [ 177.858310] R13: 00007fff05796ccf R14: 00007fed57423300 R15: 0000000000022000 [ 177.859257] [ 177.859578] irq event stamp: 780 [ 177.860021] hardirqs last enabled at (779): [] asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 177.861317] hardirqs last disabled at (780): [] __schedule+0x1225/0x2470 [ 177.862428] softirqs last enabled at (762): [] __irq_exit_rcu+0x11b/0x180 [ 177.863561] softirqs last disabled at (441): [] __irq_exit_rcu+0x11b/0x180 [ 177.864705] ---[ end trace 0000000000000000 ]--- 14:20:13 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x49, &(0x7f0000000000)={@dev}, 0x14) 14:20:13 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, 0x0) 14:20:13 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) lsetxattr(&(0x7f0000000340)='./file1\x00', &(0x7f00000003c0)=@random={'security.', '/dev/ptp0\x00'}, &(0x7f0000000400)='/dev/ptp0\x00', 0xa, 0x0) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x800, 0x0) readv(r1, &(0x7f0000000300)=[{&(0x7f0000000140)=""/147, 0x93}, {&(0x7f0000000200)=""/116, 0x74}], 0x2) syz_open_dev$tty20(0xc, 0x4, 0x1) socket$nl_netfilter(0x10, 0x3, 0xc) 14:20:13 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000440)) 14:20:13 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000004c0)={@private1, @empty, @empty, 0x0, 0x0, 0x8001}) 14:20:13 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="140000001a00010212c91ef13440ca500a"], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:20:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1036e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000100)={0x69}) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) 14:20:13 executing program 5: futex(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0, 0x0) 14:20:13 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000004c0)={@private1, @empty, @empty, 0x0, 0x0, 0x8001}) 14:20:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1036e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000100)={0x69}) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) 14:20:13 executing program 5: futex(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0, 0x0) 14:20:13 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x49, &(0x7f0000000000)={@dev}, 0x14) 14:20:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1036e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000100)={0x69}) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) 14:20:13 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, 0x0) 14:20:13 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000440)) 14:20:13 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) lsetxattr(&(0x7f0000000340)='./file1\x00', &(0x7f00000003c0)=@random={'security.', '/dev/ptp0\x00'}, &(0x7f0000000400)='/dev/ptp0\x00', 0xa, 0x0) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x800, 0x0) readv(r1, &(0x7f0000000300)=[{&(0x7f0000000140)=""/147, 0x93}, {&(0x7f0000000200)=""/116, 0x74}], 0x2) syz_open_dev$tty20(0xc, 0x4, 0x1) socket$nl_netfilter(0x10, 0x3, 0xc) 14:20:13 executing program 5: futex(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0, 0x0) 14:20:13 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000004c0)={@private1, @empty, @empty, 0x0, 0x0, 0x8001}) 14:20:13 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="140000001a00010212c91ef13440ca500a"], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:20:13 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, 0x0) 14:20:13 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) lsetxattr(&(0x7f0000000340)='./file1\x00', &(0x7f00000003c0)=@random={'security.', '/dev/ptp0\x00'}, &(0x7f0000000400)='/dev/ptp0\x00', 0xa, 0x0) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x800, 0x0) readv(r1, &(0x7f0000000300)=[{&(0x7f0000000140)=""/147, 0x93}, {&(0x7f0000000200)=""/116, 0x74}], 0x2) syz_open_dev$tty20(0xc, 0x4, 0x1) socket$nl_netfilter(0x10, 0x3, 0xc) 14:20:13 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000440)) 14:20:13 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x49, &(0x7f0000000000)={@dev}, 0x14) 14:20:13 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) lsetxattr(&(0x7f0000000340)='./file1\x00', &(0x7f00000003c0)=@random={'security.', '/dev/ptp0\x00'}, &(0x7f0000000400)='/dev/ptp0\x00', 0xa, 0x0) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x800, 0x0) readv(r1, &(0x7f0000000300)=[{&(0x7f0000000140)=""/147, 0x93}, {&(0x7f0000000200)=""/116, 0x74}], 0x2) syz_open_dev$tty20(0xc, 0x4, 0x1) socket$nl_netfilter(0x10, 0x3, 0xc) 14:20:13 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) lsetxattr(&(0x7f0000000340)='./file1\x00', &(0x7f00000003c0)=@random={'security.', '/dev/ptp0\x00'}, &(0x7f0000000400)='/dev/ptp0\x00', 0xa, 0x0) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x800, 0x0) readv(r1, &(0x7f0000000300)=[{&(0x7f0000000140)=""/147, 0x93}, {&(0x7f0000000200)=""/116, 0x74}], 0x2) syz_open_dev$tty20(0xc, 0x4, 0x1) socket$nl_netfilter(0x10, 0x3, 0xc) 14:20:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1036e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000100)={0x69}) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) 14:20:13 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) lsetxattr(&(0x7f0000000340)='./file1\x00', &(0x7f00000003c0)=@random={'security.', '/dev/ptp0\x00'}, &(0x7f0000000400)='/dev/ptp0\x00', 0xa, 0x0) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x800, 0x0) readv(r1, &(0x7f0000000300)=[{&(0x7f0000000140)=""/147, 0x93}, {&(0x7f0000000200)=""/116, 0x74}], 0x2) syz_open_dev$tty20(0xc, 0x4, 0x1) socket$nl_netfilter(0x10, 0x3, 0xc) 14:20:13 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) lsetxattr(&(0x7f0000000340)='./file1\x00', &(0x7f00000003c0)=@random={'security.', '/dev/ptp0\x00'}, &(0x7f0000000400)='/dev/ptp0\x00', 0xa, 0x0) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x800, 0x0) readv(r1, &(0x7f0000000300)=[{&(0x7f0000000140)=""/147, 0x93}, {&(0x7f0000000200)=""/116, 0x74}], 0x2) syz_open_dev$tty20(0xc, 0x4, 0x1) socket$nl_netfilter(0x10, 0x3, 0xc) 14:20:13 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) lsetxattr(&(0x7f0000000340)='./file1\x00', &(0x7f00000003c0)=@random={'security.', '/dev/ptp0\x00'}, &(0x7f0000000400)='/dev/ptp0\x00', 0xa, 0x0) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x800, 0x0) readv(r1, &(0x7f0000000300)=[{&(0x7f0000000140)=""/147, 0x93}, {&(0x7f0000000200)=""/116, 0x74}], 0x2) syz_open_dev$tty20(0xc, 0x4, 0x1) socket$nl_netfilter(0x10, 0x3, 0xc) 14:20:13 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="140000001a00010212c91ef13440ca500a"], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:20:13 executing program 5: syz_emit_ethernet(0x32, &(0x7f0000000040)={@local, @random="7700c24d06a7", @void, {@ipv4={0x800, @dccp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x21, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1=0xe000f000}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "b50bbe", 0x0, "1b2813"}}}}}}, 0x0) 14:20:13 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) lsetxattr(&(0x7f0000000340)='./file1\x00', &(0x7f00000003c0)=@random={'security.', '/dev/ptp0\x00'}, &(0x7f0000000400)='/dev/ptp0\x00', 0xa, 0x0) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x800, 0x0) readv(r1, &(0x7f0000000300)=[{&(0x7f0000000140)=""/147, 0x93}, {&(0x7f0000000200)=""/116, 0x74}], 0x2) syz_open_dev$tty20(0xc, 0x4, 0x1) socket$nl_netfilter(0x10, 0x3, 0xc) 14:20:13 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x5b03, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 14:20:13 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) lsetxattr(&(0x7f0000000340)='./file1\x00', &(0x7f00000003c0)=@random={'security.', '/dev/ptp0\x00'}, &(0x7f0000000400)='/dev/ptp0\x00', 0xa, 0x0) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x800, 0x0) readv(r1, &(0x7f0000000300)=[{&(0x7f0000000140)=""/147, 0x93}, {&(0x7f0000000200)=""/116, 0x74}], 0x2) syz_open_dev$tty20(0xc, 0x4, 0x1) socket$nl_netfilter(0x10, 0x3, 0xc) 14:20:13 executing program 5: syz_emit_ethernet(0x32, &(0x7f0000000040)={@local, @random="7700c24d06a7", @void, {@ipv4={0x800, @dccp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x21, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1=0xe000f000}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "b50bbe", 0x0, "1b2813"}}}}}}, 0x0) 14:20:13 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) lsetxattr(&(0x7f0000000340)='./file1\x00', &(0x7f00000003c0)=@random={'security.', '/dev/ptp0\x00'}, &(0x7f0000000400)='/dev/ptp0\x00', 0xa, 0x0) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x800, 0x0) readv(r1, &(0x7f0000000300)=[{&(0x7f0000000140)=""/147, 0x93}, {&(0x7f0000000200)=""/116, 0x74}], 0x2) syz_open_dev$tty20(0xc, 0x4, 0x1) socket$nl_netfilter(0x10, 0x3, 0xc) 14:20:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1036e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000100)={0x69}) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) 14:20:13 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x5b03, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 14:20:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1036e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000100)={0x69}) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) 14:20:13 executing program 5: syz_emit_ethernet(0x32, &(0x7f0000000040)={@local, @random="7700c24d06a7", @void, {@ipv4={0x800, @dccp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x21, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1=0xe000f000}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "b50bbe", 0x0, "1b2813"}}}}}}, 0x0) 14:20:13 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000940)={0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)}) 14:20:13 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) lsetxattr(&(0x7f0000000340)='./file1\x00', &(0x7f00000003c0)=@random={'security.', '/dev/ptp0\x00'}, &(0x7f0000000400)='/dev/ptp0\x00', 0xa, 0x0) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x800, 0x0) readv(r1, &(0x7f0000000300)=[{&(0x7f0000000140)=""/147, 0x93}, {&(0x7f0000000200)=""/116, 0x74}], 0x2) syz_open_dev$tty20(0xc, 0x4, 0x1) socket$nl_netfilter(0x10, 0x3, 0xc) 14:20:13 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) lsetxattr(&(0x7f0000000340)='./file1\x00', &(0x7f00000003c0)=@random={'security.', '/dev/ptp0\x00'}, &(0x7f0000000400)='/dev/ptp0\x00', 0xa, 0x0) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x800, 0x0) readv(r1, &(0x7f0000000300)=[{&(0x7f0000000140)=""/147, 0x93}, {&(0x7f0000000200)=""/116, 0x74}], 0x2) syz_open_dev$tty20(0xc, 0x4, 0x1) socket$nl_netfilter(0x10, 0x3, 0xc) 14:20:13 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) lsetxattr(&(0x7f0000000340)='./file1\x00', &(0x7f00000003c0)=@random={'security.', '/dev/ptp0\x00'}, &(0x7f0000000400)='/dev/ptp0\x00', 0xa, 0x0) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x800, 0x0) readv(r1, &(0x7f0000000300)=[{&(0x7f0000000140)=""/147, 0x93}, {&(0x7f0000000200)=""/116, 0x74}], 0x2) syz_open_dev$tty20(0xc, 0x4, 0x1) socket$nl_netfilter(0x10, 0x3, 0xc) 14:20:13 executing program 7: modify_ldt$read_default(0x2, &(0x7f0000000000)=""/131, 0x83) 14:20:13 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x5b03, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 14:20:13 executing program 5: syz_emit_ethernet(0x32, &(0x7f0000000040)={@local, @random="7700c24d06a7", @void, {@ipv4={0x800, @dccp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x21, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1=0xe000f000}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "b50bbe", 0x0, "1b2813"}}}}}}, 0x0) 14:20:13 executing program 7: modify_ldt$read_default(0x2, &(0x7f0000000000)=""/131, 0x83) 14:20:13 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fsopen(&(0x7f0000000000)='bdev\x00', 0x0) dup3(r1, r0, 0x0) 14:20:13 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x5b03, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 14:20:14 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) lsetxattr(&(0x7f0000000340)='./file1\x00', &(0x7f00000003c0)=@random={'security.', '/dev/ptp0\x00'}, &(0x7f0000000400)='/dev/ptp0\x00', 0xa, 0x0) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x800, 0x0) readv(r1, &(0x7f0000000300)=[{&(0x7f0000000140)=""/147, 0x93}, {&(0x7f0000000200)=""/116, 0x74}], 0x2) syz_open_dev$tty20(0xc, 0x4, 0x1) socket$nl_netfilter(0x10, 0x3, 0xc) 14:20:14 executing program 7: modify_ldt$read_default(0x2, &(0x7f0000000000)=""/131, 0x83) 14:20:14 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000940)={0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)}) 14:20:14 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fsopen(&(0x7f0000000000)='bdev\x00', 0x0) dup3(r1, r0, 0x0) 14:20:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@sack_perm], 0x1) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000140)) 14:20:14 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0x10, 0x0, 0x0) 14:20:14 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000940)={0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)}) 14:20:14 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) r6 = socket$inet6(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r6, 0x29, 0x1e, 0x0, &(0x7f00000000c0)) r7 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r7, 0x40081271, &(0x7f0000002340)) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r7) ioctl$sock_SIOCGIFBR(r6, 0x8940, &(0x7f00000000c0)=@get={0x1, &(0x7f0000000040)=""/17, 0x10000}) sendmsg$NL80211_CMD_TRIGGER_SCAN(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="050000000000000000002100000008000300", @ANYRES32=r5], 0x40}}, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r8) sendmsg$NL80211_CMD_DEAUTHENTICATE(r3, &(0x7f0000000380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x2c, r9, 0x800, 0x70bd25, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0x800, 0x12}}}}, [@NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40c0}, 0x810) inotify_init1(0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="00010000", @ANYRES16=r2, @ANYBLOB="010000000000000000003b00000008000300", @ANYRES32=r1, @ANYBLOB="e200330080800000080211000001080211"], 0x100}}, 0x0) 14:20:14 executing program 5: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmat(r0, &(0x7f0000ffa000/0x1000)=nil, 0x7000) pkey_mprotect(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x6, 0xffffffffffffffff) 14:20:14 executing program 7: modify_ldt$read_default(0x2, &(0x7f0000000000)=""/131, 0x83) 14:20:14 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fsopen(&(0x7f0000000000)='bdev\x00', 0x0) dup3(r1, r0, 0x0) 14:20:14 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fsopen(&(0x7f0000000000)='bdev\x00', 0x0) dup3(r1, r0, 0x0) 14:20:14 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0x10, 0x0, 0x0) 14:20:14 executing program 5: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmat(r0, &(0x7f0000ffa000/0x1000)=nil, 0x7000) pkey_mprotect(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x6, 0xffffffffffffffff) 14:20:14 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fsopen(&(0x7f0000000000)='bdev\x00', 0x0) dup3(r1, r0, 0x0) 14:20:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@sack_perm], 0x1) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000140)) 14:20:14 executing program 7: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmat(r0, &(0x7f0000ffa000/0x1000)=nil, 0x7000) pkey_mprotect(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x6, 0xffffffffffffffff) 14:20:14 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0x10, 0x0, 0x0) 14:20:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@sack_perm], 0x1) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000140)) 14:20:14 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fsopen(&(0x7f0000000000)='bdev\x00', 0x0) dup3(r1, r0, 0x0) [ 179.411774] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.6'. [ 179.586584] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.6'. 14:20:14 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fsopen(&(0x7f0000000000)='bdev\x00', 0x0) dup3(r1, r0, 0x0) 14:20:14 executing program 7: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmat(r0, &(0x7f0000ffa000/0x1000)=nil, 0x7000) pkey_mprotect(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x6, 0xffffffffffffffff) 14:20:14 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0x10, 0x0, 0x0) 14:20:14 executing program 5: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmat(r0, &(0x7f0000ffa000/0x1000)=nil, 0x7000) pkey_mprotect(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x6, 0xffffffffffffffff) 14:20:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@sack_perm], 0x1) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000140)) 14:20:14 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000240), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000001300)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) r1 = openat(r0, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0) write(r1, &(0x7f0000000080)="01", 0xffff8000) 14:20:14 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000940)={0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)}) 14:20:14 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) r6 = socket$inet6(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r6, 0x29, 0x1e, 0x0, &(0x7f00000000c0)) r7 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r7, 0x40081271, &(0x7f0000002340)) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r7) ioctl$sock_SIOCGIFBR(r6, 0x8940, &(0x7f00000000c0)=@get={0x1, &(0x7f0000000040)=""/17, 0x10000}) sendmsg$NL80211_CMD_TRIGGER_SCAN(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="050000000000000000002100000008000300", @ANYRES32=r5], 0x40}}, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r8) sendmsg$NL80211_CMD_DEAUTHENTICATE(r3, &(0x7f0000000380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x2c, r9, 0x800, 0x70bd25, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0x800, 0x12}}}}, [@NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40c0}, 0x810) inotify_init1(0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="00010000", @ANYRES16=r2, @ANYBLOB="010000000000000000003b00000008000300", @ANYRES32=r1, @ANYBLOB="e200330080800000080211000001080211"], 0x100}}, 0x0) [ 179.662897] loop2: detected capacity change from 0 to 256 14:20:14 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) r6 = socket$inet6(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r6, 0x29, 0x1e, 0x0, &(0x7f00000000c0)) r7 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r7, 0x40081271, &(0x7f0000002340)) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r7) ioctl$sock_SIOCGIFBR(r6, 0x8940, &(0x7f00000000c0)=@get={0x1, &(0x7f0000000040)=""/17, 0x10000}) sendmsg$NL80211_CMD_TRIGGER_SCAN(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="050000000000000000002100000008000300", @ANYRES32=r5], 0x40}}, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r8) sendmsg$NL80211_CMD_DEAUTHENTICATE(r3, &(0x7f0000000380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x2c, r9, 0x800, 0x70bd25, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0x800, 0x12}}}}, [@NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40c0}, 0x810) inotify_init1(0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="00010000", @ANYRES16=r2, @ANYBLOB="010000000000000000003b00000008000300", @ANYRES32=r1, @ANYBLOB="e200330080800000080211000001080211"], 0x100}}, 0x0) 14:20:14 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) r6 = socket$inet6(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r6, 0x29, 0x1e, 0x0, &(0x7f00000000c0)) r7 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r7, 0x40081271, &(0x7f0000002340)) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r7) ioctl$sock_SIOCGIFBR(r6, 0x8940, &(0x7f00000000c0)=@get={0x1, &(0x7f0000000040)=""/17, 0x10000}) sendmsg$NL80211_CMD_TRIGGER_SCAN(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="050000000000000000002100000008000300", @ANYRES32=r5], 0x40}}, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r8) sendmsg$NL80211_CMD_DEAUTHENTICATE(r3, &(0x7f0000000380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x2c, r9, 0x800, 0x70bd25, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0x800, 0x12}}}}, [@NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40c0}, 0x810) inotify_init1(0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="00010000", @ANYRES16=r2, @ANYBLOB="010000000000000000003b00000008000300", @ANYRES32=r1, @ANYBLOB="e200330080800000080211000001080211"], 0x100}}, 0x0) 14:20:14 executing program 5: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmat(r0, &(0x7f0000ffa000/0x1000)=nil, 0x7000) pkey_mprotect(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x6, 0xffffffffffffffff) 14:20:14 executing program 7: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmat(r0, &(0x7f0000ffa000/0x1000)=nil, 0x7000) pkey_mprotect(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x6, 0xffffffffffffffff) 14:20:14 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) r6 = socket$inet6(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r6, 0x29, 0x1e, 0x0, &(0x7f00000000c0)) r7 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r7, 0x40081271, &(0x7f0000002340)) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r7) ioctl$sock_SIOCGIFBR(r6, 0x8940, &(0x7f00000000c0)=@get={0x1, &(0x7f0000000040)=""/17, 0x10000}) sendmsg$NL80211_CMD_TRIGGER_SCAN(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="050000000000000000002100000008000300", @ANYRES32=r5], 0x40}}, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r8) sendmsg$NL80211_CMD_DEAUTHENTICATE(r3, &(0x7f0000000380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x2c, r9, 0x800, 0x70bd25, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0x800, 0x12}}}}, [@NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40c0}, 0x810) inotify_init1(0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="00010000", @ANYRES16=r2, @ANYBLOB="010000000000000000003b00000008000300", @ANYRES32=r1, @ANYBLOB="e200330080800000080211000001080211"], 0x100}}, 0x0) 14:20:14 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000240), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000001300)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) r1 = openat(r0, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0) write(r1, &(0x7f0000000080)="01", 0xffff8000) [ 179.677458] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 179.797573] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 179.860717] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.6'. [ 179.882499] loop2: detected capacity change from 0 to 256 [ 179.886913] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 179.946851] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.4'. [ 179.978162] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.0'. [ 179.979881] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.1'. [ 180.215124] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 14:20:15 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000240), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000001300)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) r1 = openat(r0, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0) write(r1, &(0x7f0000000080)="01", 0xffff8000) 14:20:15 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) r6 = socket$inet6(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r6, 0x29, 0x1e, 0x0, &(0x7f00000000c0)) r7 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r7, 0x40081271, &(0x7f0000002340)) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r7) ioctl$sock_SIOCGIFBR(r6, 0x8940, &(0x7f00000000c0)=@get={0x1, &(0x7f0000000040)=""/17, 0x10000}) sendmsg$NL80211_CMD_TRIGGER_SCAN(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="050000000000000000002100000008000300", @ANYRES32=r5], 0x40}}, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r8) sendmsg$NL80211_CMD_DEAUTHENTICATE(r3, &(0x7f0000000380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x2c, r9, 0x800, 0x70bd25, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0x800, 0x12}}}}, [@NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40c0}, 0x810) inotify_init1(0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="00010000", @ANYRES16=r2, @ANYBLOB="010000000000000000003b00000008000300", @ANYRES32=r1, @ANYBLOB="e200330080800000080211000001080211"], 0x100}}, 0x0) 14:20:15 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000240), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000001300)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) r1 = openat(r0, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0) write(r1, &(0x7f0000000080)="01", 0xffff8000) 14:20:15 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) r6 = socket$inet6(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r6, 0x29, 0x1e, 0x0, &(0x7f00000000c0)) r7 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r7, 0x40081271, &(0x7f0000002340)) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r7) ioctl$sock_SIOCGIFBR(r6, 0x8940, &(0x7f00000000c0)=@get={0x1, &(0x7f0000000040)=""/17, 0x10000}) sendmsg$NL80211_CMD_TRIGGER_SCAN(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="050000000000000000002100000008000300", @ANYRES32=r5], 0x40}}, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r8) sendmsg$NL80211_CMD_DEAUTHENTICATE(r3, &(0x7f0000000380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x2c, r9, 0x800, 0x70bd25, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0x800, 0x12}}}}, [@NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40c0}, 0x810) inotify_init1(0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="00010000", @ANYRES16=r2, @ANYBLOB="010000000000000000003b00000008000300", @ANYRES32=r1, @ANYBLOB="e200330080800000080211000001080211"], 0x100}}, 0x0) 14:20:15 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000240), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000001300)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) r1 = openat(r0, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0) write(r1, &(0x7f0000000080)="01", 0xffff8000) 14:20:15 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) r6 = socket$inet6(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r6, 0x29, 0x1e, 0x0, &(0x7f00000000c0)) r7 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r7, 0x40081271, &(0x7f0000002340)) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r7) ioctl$sock_SIOCGIFBR(r6, 0x8940, &(0x7f00000000c0)=@get={0x1, &(0x7f0000000040)=""/17, 0x10000}) sendmsg$NL80211_CMD_TRIGGER_SCAN(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="050000000000000000002100000008000300", @ANYRES32=r5], 0x40}}, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r8) sendmsg$NL80211_CMD_DEAUTHENTICATE(r3, &(0x7f0000000380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x2c, r9, 0x800, 0x70bd25, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0x800, 0x12}}}}, [@NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40c0}, 0x810) inotify_init1(0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="00010000", @ANYRES16=r2, @ANYBLOB="010000000000000000003b00000008000300", @ANYRES32=r1, @ANYBLOB="e200330080800000080211000001080211"], 0x100}}, 0x0) 14:20:15 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) r6 = socket$inet6(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r6, 0x29, 0x1e, 0x0, &(0x7f00000000c0)) r7 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r7, 0x40081271, &(0x7f0000002340)) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r7) ioctl$sock_SIOCGIFBR(r6, 0x8940, &(0x7f00000000c0)=@get={0x1, &(0x7f0000000040)=""/17, 0x10000}) sendmsg$NL80211_CMD_TRIGGER_SCAN(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="050000000000000000002100000008000300", @ANYRES32=r5], 0x40}}, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r8) sendmsg$NL80211_CMD_DEAUTHENTICATE(r3, &(0x7f0000000380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x2c, r9, 0x800, 0x70bd25, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0x800, 0x12}}}}, [@NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40c0}, 0x810) inotify_init1(0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="00010000", @ANYRES16=r2, @ANYBLOB="010000000000000000003b00000008000300", @ANYRES32=r1, @ANYBLOB="e200330080800000080211000001080211"], 0x100}}, 0x0) [ 180.241978] loop3: detected capacity change from 0 to 256 [ 180.243799] loop7: detected capacity change from 0 to 256 14:20:15 executing program 5: io_setup(0x4, &(0x7f0000001a80)=0x0) io_pgetevents(r0, 0x0, 0x0, 0x0, &(0x7f0000001b40), &(0x7f0000001bc0)={&(0x7f0000001b80), 0x8}) [ 180.257713] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 180.258795] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 14:20:15 executing program 5: io_setup(0x4, &(0x7f0000001a80)=0x0) io_pgetevents(r0, 0x0, 0x0, 0x0, &(0x7f0000001b40), &(0x7f0000001bc0)={&(0x7f0000001b80), 0x8}) [ 180.308065] loop2: detected capacity change from 0 to 256 [ 180.342043] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 14:20:15 executing program 5: io_setup(0x4, &(0x7f0000001a80)=0x0) io_pgetevents(r0, 0x0, 0x0, 0x0, &(0x7f0000001b40), &(0x7f0000001bc0)={&(0x7f0000001b80), 0x8}) [ 180.419894] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 14:20:15 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000240), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000001300)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) r1 = openat(r0, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0) write(r1, &(0x7f0000000080)="01", 0xffff8000) [ 180.428752] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 14:20:15 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000240), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000001300)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) r1 = openat(r0, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0) write(r1, &(0x7f0000000080)="01", 0xffff8000) [ 180.440955] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.0'. [ 180.456517] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.1'. [ 180.460284] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.6'. [ 180.501417] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.4'. [ 180.543038] loop7: detected capacity change from 0 to 256 [ 180.544707] loop3: detected capacity change from 0 to 256 [ 180.553209] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 180.560669] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 14:20:15 executing program 5: io_setup(0x4, &(0x7f0000001a80)=0x0) io_pgetevents(r0, 0x0, 0x0, 0x0, &(0x7f0000001b40), &(0x7f0000001bc0)={&(0x7f0000001b80), 0x8}) 14:20:15 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000240), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000001300)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) r1 = openat(r0, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0) write(r1, &(0x7f0000000080)="01", 0xffff8000) [ 180.715852] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 14:20:15 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000240), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000001300)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) r1 = openat(r0, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0) write(r1, &(0x7f0000000080)="01", 0xffff8000) [ 180.723434] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 14:20:15 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) r6 = socket$inet6(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r6, 0x29, 0x1e, 0x0, &(0x7f00000000c0)) r7 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r7, 0x40081271, &(0x7f0000002340)) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r7) ioctl$sock_SIOCGIFBR(r6, 0x8940, &(0x7f00000000c0)=@get={0x1, &(0x7f0000000040)=""/17, 0x10000}) sendmsg$NL80211_CMD_TRIGGER_SCAN(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="050000000000000000002100000008000300", @ANYRES32=r5], 0x40}}, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r8) sendmsg$NL80211_CMD_DEAUTHENTICATE(r3, &(0x7f0000000380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x2c, r9, 0x800, 0x70bd25, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0x800, 0x12}}}}, [@NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40c0}, 0x810) inotify_init1(0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="00010000", @ANYRES16=r2, @ANYBLOB="010000000000000000003b00000008000300", @ANYRES32=r1, @ANYBLOB="e200330080800000080211000001080211"], 0x100}}, 0x0) 14:20:15 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000240), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000001300)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x800010, &(0x7f0000000040)=ANY=[]) r1 = openat(r0, &(0x7f0000000180)='./file0\x00', 0x101042, 0x0) write(r1, &(0x7f0000000080)="01", 0xffff8000) 14:20:15 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) r6 = socket$inet6(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r6, 0x29, 0x1e, 0x0, &(0x7f00000000c0)) r7 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r7, 0x40081271, &(0x7f0000002340)) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r7) ioctl$sock_SIOCGIFBR(r6, 0x8940, &(0x7f00000000c0)=@get={0x1, &(0x7f0000000040)=""/17, 0x10000}) sendmsg$NL80211_CMD_TRIGGER_SCAN(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="050000000000000000002100000008000300", @ANYRES32=r5], 0x40}}, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r8) sendmsg$NL80211_CMD_DEAUTHENTICATE(r3, &(0x7f0000000380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x2c, r9, 0x800, 0x70bd25, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0x800, 0x12}}}}, [@NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40c0}, 0x810) inotify_init1(0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="00010000", @ANYRES16=r2, @ANYBLOB="010000000000000000003b00000008000300", @ANYRES32=r1, @ANYBLOB="e200330080800000080211000001080211"], 0x100}}, 0x0) [ 180.773999] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 180.786993] loop3: detected capacity change from 0 to 256 [ 180.790124] loop7: detected capacity change from 0 to 256 [ 180.792827] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 180.797107] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 180.855064] loop2: detected capacity change from 0 to 256 [ 180.863081] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 180.905276] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 180.912628] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 181.093722] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 14:20:16 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x1c) 14:20:16 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) r6 = socket$inet6(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r6, 0x29, 0x1e, 0x0, &(0x7f00000000c0)) r7 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r7, 0x40081271, &(0x7f0000002340)) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r7) ioctl$sock_SIOCGIFBR(r6, 0x8940, &(0x7f00000000c0)=@get={0x1, &(0x7f0000000040)=""/17, 0x10000}) sendmsg$NL80211_CMD_TRIGGER_SCAN(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="050000000000000000002100000008000300", @ANYRES32=r5], 0x40}}, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r8) sendmsg$NL80211_CMD_DEAUTHENTICATE(r3, &(0x7f0000000380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x2c, r9, 0x800, 0x70bd25, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0x800, 0x12}}}}, [@NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40c0}, 0x810) inotify_init1(0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="00010000", @ANYRES16=r2, @ANYBLOB="010000000000000000003b00000008000300", @ANYRES32=r1, @ANYBLOB="e200330080800000080211000001080211"], 0x100}}, 0x0) 14:20:16 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) r6 = socket$inet6(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r6, 0x29, 0x1e, 0x0, &(0x7f00000000c0)) r7 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r7, 0x40081271, &(0x7f0000002340)) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r7) ioctl$sock_SIOCGIFBR(r6, 0x8940, &(0x7f00000000c0)=@get={0x1, &(0x7f0000000040)=""/17, 0x10000}) sendmsg$NL80211_CMD_TRIGGER_SCAN(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="050000000000000000002100000008000300", @ANYRES32=r5], 0x40}}, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r8) sendmsg$NL80211_CMD_DEAUTHENTICATE(r3, &(0x7f0000000380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x2c, r9, 0x800, 0x70bd25, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0x800, 0x12}}}}, [@NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40c0}, 0x810) inotify_init1(0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="00010000", @ANYRES16=r2, @ANYBLOB="010000000000000000003b00000008000300", @ANYRES32=r1, @ANYBLOB="e200330080800000080211000001080211"], 0x100}}, 0x0) 14:20:16 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000e00)={0x0, 0x0, 0x2, 0x0, 0x0, &(0x7f0000000a00)="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"}) 14:20:16 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x1c) 14:20:16 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000e00)={0x0, 0x0, 0x2, 0x0, 0x0, &(0x7f0000000a00)="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"}) 14:20:16 executing program 2: r0 = open_tree(0xffffffffffffff9c, &(0x7f0000007ec0)='./cgroup/cgroup.procs\x00', 0x900) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000007f00)={'vcan0\x00', {0x2, 0x0, @multicast1}}) lsetxattr$security_selinux(&(0x7f00000000c0)='./cgroup/cgroup.procs\x00', &(0x7f0000000140), &(0x7f0000000000)='unconfined\x00', 0xb, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r1) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000080)={r3, 0x1, 0x6, @broadcast}, 0x10) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000180)={r3, 0x1, 0x6, @broadcast}, 0x10) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000080)={r3, 0x1, 0x6, @broadcast}, 0x10) [ 181.319671] SELinux: Context unconfined is not valid (left unmapped). [ 181.321099] audit: type=1400 audit(1664893216.411:9): avc: denied { associate } for pid=7822 comm="syz-executor.2" name="cgroup.procs" dev="cgroup2" ino=1652 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=filesystem permissive=1 srawcon="unconfined" 14:20:16 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x1c) [ 181.329819] device syz_tun entered promiscuous mode [ 181.336632] device syz_tun left promiscuous mode [ 181.346594] device syz_tun entered promiscuous mode [ 181.349342] device syz_tun left promiscuous mode 14:20:16 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000e00)={0x0, 0x0, 0x2, 0x0, 0x0, &(0x7f0000000a00)="d47d609d17ca2b52e1554bb8ddf59f0dd708ba8aaf922bbccba2f421489a977da211fcbfac9d5b089a6afaa26c2234e54577fd6e18ad1fc0302a17994d65265396ce3db8beb083e37572fb2264defebe91b668a20b00ec74a3ee602e3826823bd25d92275db57ca933a9ff2fee70e0ee48e7c9bfb0cf6393638530224ba300308d2cf921e9f0d9e61ae2592a6c1a0bb408a5641e3fa75cb64412f180521ff78495b38e61b2245cdcc65977d16f5164066336a4560f5f6164d06175edecbaa9423754d0205201889cd4ccd95fc335794d78c59502cccb992f0453adae3599334698c5a4314ef99b3856c3c908761c405f41a9c9a5365ec1ff228d9406f8b36f1d47f455b11e478eca67d594f1f2d75f2137619df691afc210dd4158169880b6f249c1b682fab3a43598d8ab1b4b756598405cc5d5a79ab4739b330f659d94d434e736c321b1a099a6b6ea82e3f16ee0e77a8f5203a0dd0ce300540ae722636729db5fb974ba1927afd5cbc632ff60c1a3db7b5f6db7c0cd53bb6b57d886cd1bfb644565b66d2c82656b7c19ed243c73b60aba7d7317ee771faa376c7865e3249ab25bd081479671ae4ed2c5d8b6cf992c29642d8cf6d7c3b21a46f11b2a3a786a49d3f0fc27691180ec50b1b0b026984bcd89f082703d2f99ae42326fcf039df90c92b963551a18c4ec0a24cbb62b1d4bf44db38363cfd0238ee08375b0c496c74709ec340167fbe0960a98136101704c61ace581fac783bfc7f5bbbc383823e4a1585cb5ef384b4fb3976b16e8d798d53c79c14422e7ef66e7f940b0da9eb2656321b8adac2ce537ba1b579ee3876922e60ae5b89637d79a3080185796df67b465da2d69cdcb30ed394c0ce8ddc1703f3295e96807e5d5f351caec0ecc97dd64b5d83b0b0a13c968beb50ec4fabbb2617261b47d638cedb390821667534a8f098547733b239ad2ed91a55ad15763a1b5501afddc82340a159cae01fefe380b6b8abb8c8b427281f75b1a76df8c0a28c0511293a0cc8bfd75061d72fc54b0562677c7abda724a234a7c076d9e89dbb7a69f71b0f90ab1d15cd7de8b77eaadafb2ff83ae66a7bfab967d06b2f3c714cafafeeb60fc9462cbcb420cf885cd0a43a8a132cd37828263578ba0557ff1b2859ba9375a2881896750a26145a1af1c1d309be1aa0f3dbd1f462ab101b7cd1bfdf30f2cc6ef0b6d2b07c54f21505153a4b0163bbb04ff24023f70c4720a2ef5019f1502d0be188fdc0d2e9162a46993b4b901e918e41bab1b6ecbfde6388432301ec07aade2a6bf86649bcd1aab58cfef99973683651efc32a39d136507d633310999d74a14192f7dd3419b8d7c34be8c7d140a8fb8f6aae3e0e062e1015ec0dce6e7e928434b0fc63c62b2f2fcada7068c06b7c900cc4ff068f2200a9638c86660e1f43bc2c9ea69cd82e97fd282ad7569"}) 14:20:16 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x20b00, 0x0) ioctl$TIOCMBIS(r0, 0x5, 0x0) 14:20:16 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/diskstats\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x0, 0x0) 14:20:16 executing program 5: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x20082000) keyctl$join(0x1, &(0x7f0000000300)={'syz', 0x0}) keyctl$join(0x12, 0x0) [ 181.445479] program syz-executor.4 is using a deprecated SCSI ioctl, please convert it to SG_IO 14:20:16 executing program 2: r0 = open_tree(0xffffffffffffff9c, &(0x7f0000007ec0)='./cgroup/cgroup.procs\x00', 0x900) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000007f00)={'vcan0\x00', {0x2, 0x0, @multicast1}}) lsetxattr$security_selinux(&(0x7f00000000c0)='./cgroup/cgroup.procs\x00', &(0x7f0000000140), &(0x7f0000000000)='unconfined\x00', 0xb, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r1) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000080)={r3, 0x1, 0x6, @broadcast}, 0x10) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000180)={r3, 0x1, 0x6, @broadcast}, 0x10) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000080)={r3, 0x1, 0x6, @broadcast}, 0x10) 14:20:16 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x1c) [ 181.511380] device syz_tun entered promiscuous mode [ 181.517630] device syz_tun left promiscuous mode 14:20:16 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/diskstats\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x0, 0x0) 14:20:16 executing program 2: r0 = open_tree(0xffffffffffffff9c, &(0x7f0000007ec0)='./cgroup/cgroup.procs\x00', 0x900) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000007f00)={'vcan0\x00', {0x2, 0x0, @multicast1}}) lsetxattr$security_selinux(&(0x7f00000000c0)='./cgroup/cgroup.procs\x00', &(0x7f0000000140), &(0x7f0000000000)='unconfined\x00', 0xb, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r1) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000080)={r3, 0x1, 0x6, @broadcast}, 0x10) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000180)={r3, 0x1, 0x6, @broadcast}, 0x10) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000080)={r3, 0x1, 0x6, @broadcast}, 0x10) 14:20:16 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000e00)={0x0, 0x0, 0x2, 0x0, 0x0, &(0x7f0000000a00)="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"}) 14:20:16 executing program 1: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x20082000) keyctl$join(0x1, &(0x7f0000000300)={'syz', 0x0}) keyctl$join(0x12, 0x0) 14:20:16 executing program 5: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x20082000) keyctl$join(0x1, &(0x7f0000000300)={'syz', 0x0}) keyctl$join(0x12, 0x0) 14:20:16 executing program 0: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x20082000) keyctl$join(0x1, &(0x7f0000000300)={'syz', 0x0}) keyctl$join(0x12, 0x0) 14:20:16 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x20b00, 0x0) ioctl$TIOCMBIS(r0, 0x5, 0x0) [ 181.630553] device syz_tun entered promiscuous mode [ 181.631611] device syz_tun left promiscuous mode 14:20:16 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x20b00, 0x0) ioctl$TIOCMBIS(r0, 0x5, 0x0) 14:20:16 executing program 5: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x20082000) keyctl$join(0x1, &(0x7f0000000300)={'syz', 0x0}) keyctl$join(0x12, 0x0) 14:20:16 executing program 1: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x20082000) keyctl$join(0x1, &(0x7f0000000300)={'syz', 0x0}) keyctl$join(0x12, 0x0) [ 181.671377] program syz-executor.7 is using a deprecated SCSI ioctl, please convert it to SG_IO 14:20:16 executing program 0: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x20082000) keyctl$join(0x1, &(0x7f0000000300)={'syz', 0x0}) keyctl$join(0x12, 0x0) 14:20:16 executing program 2: r0 = open_tree(0xffffffffffffff9c, &(0x7f0000007ec0)='./cgroup/cgroup.procs\x00', 0x900) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000007f00)={'vcan0\x00', {0x2, 0x0, @multicast1}}) lsetxattr$security_selinux(&(0x7f00000000c0)='./cgroup/cgroup.procs\x00', &(0x7f0000000140), &(0x7f0000000000)='unconfined\x00', 0xb, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r1) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000080)={r3, 0x1, 0x6, @broadcast}, 0x10) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000180)={r3, 0x1, 0x6, @broadcast}, 0x10) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000080)={r3, 0x1, 0x6, @broadcast}, 0x10) 14:20:16 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/diskstats\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x0, 0x0) [ 181.689268] program syz-executor.4 is using a deprecated SCSI ioctl, please convert it to SG_IO 14:20:16 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x20b00, 0x0) ioctl$TIOCMBIS(r0, 0x5, 0x0) 14:20:16 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x20b00, 0x0) ioctl$TIOCMBIS(r0, 0x5, 0x0) 14:20:16 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x20b00, 0x0) ioctl$TIOCMBIS(r0, 0x5, 0x0) [ 181.750097] device syz_tun entered promiscuous mode [ 181.754427] device syz_tun left promiscuous mode 14:20:16 executing program 5: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x20082000) keyctl$join(0x1, &(0x7f0000000300)={'syz', 0x0}) keyctl$join(0x12, 0x0) 14:20:16 executing program 0: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x20082000) keyctl$join(0x1, &(0x7f0000000300)={'syz', 0x0}) keyctl$join(0x12, 0x0) [ 181.787530] program syz-executor.3 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 181.802366] program syz-executor.7 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 181.821456] program syz-executor.4 is using a deprecated SCSI ioctl, please convert it to SG_IO 14:20:16 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/diskstats\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x0, 0x0) 14:20:16 executing program 1: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x20082000) keyctl$join(0x1, &(0x7f0000000300)={'syz', 0x0}) keyctl$join(0x12, 0x0) 14:20:16 executing program 2: r0 = open_tree(0xffffffffffffff9c, &(0x7f0000007ec0)='./cgroup/cgroup.procs\x00', 0x900) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000007f00)={'vcan0\x00', {0x2, 0x0, @multicast1}}) lsetxattr$security_selinux(&(0x7f00000000c0)='./cgroup/cgroup.procs\x00', &(0x7f0000000140), &(0x7f0000000000)='unconfined\x00', 0xb, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r1) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000080)={r3, 0x1, 0x6, @broadcast}, 0x10) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000180)={r3, 0x1, 0x6, @broadcast}, 0x10) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000080)={r3, 0x1, 0x6, @broadcast}, 0x10) 14:20:16 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x20b00, 0x0) ioctl$TIOCMBIS(r0, 0x5, 0x0) 14:20:16 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x20b00, 0x0) ioctl$TIOCMBIS(r0, 0x5, 0x0) 14:20:16 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x20b00, 0x0) ioctl$TIOCMBIS(r0, 0x5, 0x0) 14:20:16 executing program 0: r0 = open_tree(0xffffffffffffff9c, &(0x7f0000007ec0)='./cgroup/cgroup.procs\x00', 0x900) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000007f00)={'vcan0\x00', {0x2, 0x0, @multicast1}}) lsetxattr$security_selinux(&(0x7f00000000c0)='./cgroup/cgroup.procs\x00', &(0x7f0000000140), &(0x7f0000000000)='unconfined\x00', 0xb, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r1) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000080)={r3, 0x1, 0x6, @broadcast}, 0x10) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000180)={r3, 0x1, 0x6, @broadcast}, 0x10) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000080)={r3, 0x1, 0x6, @broadcast}, 0x10) 14:20:16 executing program 5: r0 = open_tree(0xffffffffffffff9c, &(0x7f0000007ec0)='./cgroup/cgroup.procs\x00', 0x900) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000007f00)={'vcan0\x00', {0x2, 0x0, @multicast1}}) lsetxattr$security_selinux(&(0x7f00000000c0)='./cgroup/cgroup.procs\x00', &(0x7f0000000140), &(0x7f0000000000)='unconfined\x00', 0xb, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r1) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000080)={r3, 0x1, 0x6, @broadcast}, 0x10) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000180)={r3, 0x1, 0x6, @broadcast}, 0x10) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000080)={r3, 0x1, 0x6, @broadcast}, 0x10) [ 181.895900] device syz_tun entered promiscuous mode [ 181.900507] device syz_tun left promiscuous mode [ 181.906915] device syz_tun entered promiscuous mode [ 181.911446] device syz_tun left promiscuous mode [ 181.914268] device syz_tun entered promiscuous mode [ 181.916042] program syz-executor.7 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 181.920912] device syz_tun left promiscuous mode [ 181.931863] program syz-executor.3 is using a deprecated SCSI ioctl, please convert it to SG_IO 14:20:17 executing program 6: r0 = open_tree(0xffffffffffffff9c, &(0x7f0000007ec0)='./cgroup/cgroup.procs\x00', 0x900) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000007f00)={'vcan0\x00', {0x2, 0x0, @multicast1}}) lsetxattr$security_selinux(&(0x7f00000000c0)='./cgroup/cgroup.procs\x00', &(0x7f0000000140), &(0x7f0000000000)='unconfined\x00', 0xb, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r1) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000080)={r3, 0x1, 0x6, @broadcast}, 0x10) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000180)={r3, 0x1, 0x6, @broadcast}, 0x10) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000080)={r3, 0x1, 0x6, @broadcast}, 0x10) [ 181.957508] program syz-executor.4 is using a deprecated SCSI ioctl, please convert it to SG_IO 14:20:17 executing program 5: r0 = open_tree(0xffffffffffffff9c, &(0x7f0000007ec0)='./cgroup/cgroup.procs\x00', 0x900) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000007f00)={'vcan0\x00', {0x2, 0x0, @multicast1}}) lsetxattr$security_selinux(&(0x7f00000000c0)='./cgroup/cgroup.procs\x00', &(0x7f0000000140), &(0x7f0000000000)='unconfined\x00', 0xb, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r1) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000080)={r3, 0x1, 0x6, @broadcast}, 0x10) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000180)={r3, 0x1, 0x6, @broadcast}, 0x10) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000080)={r3, 0x1, 0x6, @broadcast}, 0x10) 14:20:17 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x20b00, 0x0) ioctl$TIOCMBIS(r0, 0x5, 0x0) 14:20:17 executing program 2: r0 = open_tree(0xffffffffffffff9c, &(0x7f0000007ec0)='./cgroup/cgroup.procs\x00', 0x900) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000007f00)={'vcan0\x00', {0x2, 0x0, @multicast1}}) lsetxattr$security_selinux(&(0x7f00000000c0)='./cgroup/cgroup.procs\x00', &(0x7f0000000140), &(0x7f0000000000)='unconfined\x00', 0xb, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r1) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000080)={r3, 0x1, 0x6, @broadcast}, 0x10) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000180)={r3, 0x1, 0x6, @broadcast}, 0x10) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000080)={r3, 0x1, 0x6, @broadcast}, 0x10) 14:20:17 executing program 1: r0 = open_tree(0xffffffffffffff9c, &(0x7f0000007ec0)='./cgroup/cgroup.procs\x00', 0x900) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000007f00)={'vcan0\x00', {0x2, 0x0, @multicast1}}) lsetxattr$security_selinux(&(0x7f00000000c0)='./cgroup/cgroup.procs\x00', &(0x7f0000000140), &(0x7f0000000000)='unconfined\x00', 0xb, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r1) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000080)={r3, 0x1, 0x6, @broadcast}, 0x10) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000180)={r3, 0x1, 0x6, @broadcast}, 0x10) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000080)={r3, 0x1, 0x6, @broadcast}, 0x10) [ 181.972968] device syz_tun entered promiscuous mode [ 181.973997] device syz_tun left promiscuous mode [ 182.004680] device syz_tun entered promiscuous mode [ 182.006653] device syz_tun left promiscuous mode [ 182.011486] device syz_tun entered promiscuous mode [ 182.012602] device syz_tun left promiscuous mode [ 182.019973] device syz_tun entered promiscuous mode [ 182.022225] program syz-executor.3 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 182.022715] device syz_tun left promiscuous mode 14:20:17 executing program 0: r0 = open_tree(0xffffffffffffff9c, &(0x7f0000007ec0)='./cgroup/cgroup.procs\x00', 0x900) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000007f00)={'vcan0\x00', {0x2, 0x0, @multicast1}}) lsetxattr$security_selinux(&(0x7f00000000c0)='./cgroup/cgroup.procs\x00', &(0x7f0000000140), &(0x7f0000000000)='unconfined\x00', 0xb, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r1) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000080)={r3, 0x1, 0x6, @broadcast}, 0x10) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000180)={r3, 0x1, 0x6, @broadcast}, 0x10) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000080)={r3, 0x1, 0x6, @broadcast}, 0x10) 14:20:17 executing program 6: r0 = open_tree(0xffffffffffffff9c, &(0x7f0000007ec0)='./cgroup/cgroup.procs\x00', 0x900) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000007f00)={'vcan0\x00', {0x2, 0x0, @multicast1}}) lsetxattr$security_selinux(&(0x7f00000000c0)='./cgroup/cgroup.procs\x00', &(0x7f0000000140), &(0x7f0000000000)='unconfined\x00', 0xb, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r1) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000080)={r3, 0x1, 0x6, @broadcast}, 0x10) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000180)={r3, 0x1, 0x6, @broadcast}, 0x10) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000080)={r3, 0x1, 0x6, @broadcast}, 0x10) [ 182.041891] device syz_tun entered promiscuous mode [ 182.043054] device syz_tun left promiscuous mode 14:20:17 executing program 5: r0 = open_tree(0xffffffffffffff9c, &(0x7f0000007ec0)='./cgroup/cgroup.procs\x00', 0x900) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000007f00)={'vcan0\x00', {0x2, 0x0, @multicast1}}) lsetxattr$security_selinux(&(0x7f00000000c0)='./cgroup/cgroup.procs\x00', &(0x7f0000000140), &(0x7f0000000000)='unconfined\x00', 0xb, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r1) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000080)={r3, 0x1, 0x6, @broadcast}, 0x10) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000180)={r3, 0x1, 0x6, @broadcast}, 0x10) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000080)={r3, 0x1, 0x6, @broadcast}, 0x10) [ 182.058033] device syz_tun entered promiscuous mode [ 182.058965] device syz_tun left promiscuous mode [ 182.075895] device syz_tun entered promiscuous mode [ 182.079454] device syz_tun left promiscuous mode 14:20:17 executing program 1: r0 = open_tree(0xffffffffffffff9c, &(0x7f0000007ec0)='./cgroup/cgroup.procs\x00', 0x900) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000007f00)={'vcan0\x00', {0x2, 0x0, @multicast1}}) lsetxattr$security_selinux(&(0x7f00000000c0)='./cgroup/cgroup.procs\x00', &(0x7f0000000140), &(0x7f0000000000)='unconfined\x00', 0xb, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r1) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000080)={r3, 0x1, 0x6, @broadcast}, 0x10) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000180)={r3, 0x1, 0x6, @broadcast}, 0x10) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000080)={r3, 0x1, 0x6, @broadcast}, 0x10) 14:20:17 executing program 7: r0 = open_tree(0xffffffffffffff9c, &(0x7f0000007ec0)='./cgroup/cgroup.procs\x00', 0x900) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000007f00)={'vcan0\x00', {0x2, 0x0, @multicast1}}) lsetxattr$security_selinux(&(0x7f00000000c0)='./cgroup/cgroup.procs\x00', &(0x7f0000000140), &(0x7f0000000000)='unconfined\x00', 0xb, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r1) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000080)={r3, 0x1, 0x6, @broadcast}, 0x10) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000180)={r3, 0x1, 0x6, @broadcast}, 0x10) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000080)={r3, 0x1, 0x6, @broadcast}, 0x10) 14:20:17 executing program 2: r0 = open_tree(0xffffffffffffff9c, &(0x7f0000007ec0)='./cgroup/cgroup.procs\x00', 0x900) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000007f00)={'vcan0\x00', {0x2, 0x0, @multicast1}}) lsetxattr$security_selinux(&(0x7f00000000c0)='./cgroup/cgroup.procs\x00', &(0x7f0000000140), &(0x7f0000000000)='unconfined\x00', 0xb, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r1) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000080)={r3, 0x1, 0x6, @broadcast}, 0x10) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000180)={r3, 0x1, 0x6, @broadcast}, 0x10) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000080)={r3, 0x1, 0x6, @broadcast}, 0x10) 14:20:17 executing program 0: r0 = open_tree(0xffffffffffffff9c, &(0x7f0000007ec0)='./cgroup/cgroup.procs\x00', 0x900) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000007f00)={'vcan0\x00', {0x2, 0x0, @multicast1}}) lsetxattr$security_selinux(&(0x7f00000000c0)='./cgroup/cgroup.procs\x00', &(0x7f0000000140), &(0x7f0000000000)='unconfined\x00', 0xb, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r1) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000080)={r3, 0x1, 0x6, @broadcast}, 0x10) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000180)={r3, 0x1, 0x6, @broadcast}, 0x10) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000080)={r3, 0x1, 0x6, @broadcast}, 0x10) 14:20:17 executing program 6: r0 = open_tree(0xffffffffffffff9c, &(0x7f0000007ec0)='./cgroup/cgroup.procs\x00', 0x900) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000007f00)={'vcan0\x00', {0x2, 0x0, @multicast1}}) lsetxattr$security_selinux(&(0x7f00000000c0)='./cgroup/cgroup.procs\x00', &(0x7f0000000140), &(0x7f0000000000)='unconfined\x00', 0xb, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r1) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000080)={r3, 0x1, 0x6, @broadcast}, 0x10) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000180)={r3, 0x1, 0x6, @broadcast}, 0x10) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000080)={r3, 0x1, 0x6, @broadcast}, 0x10) 14:20:17 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)={0x18, 0x1, 0x2, 0x801, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4}]}, 0x18}}, 0x0) 14:20:17 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) [ 182.136153] device syz_tun entered promiscuous mode [ 182.136997] device syz_tun left promiscuous mode [ 182.143674] device syz_tun entered promiscuous mode [ 182.144403] device syz_tun left promiscuous mode [ 182.154629] device syz_tun entered promiscuous mode [ 182.155114] device syz_tun entered promiscuous mode [ 182.156544] device syz_tun left promiscuous mode [ 182.157222] device syz_tun left promiscuous mode [ 182.158581] device syz_tun entered promiscuous mode [ 182.160744] device syz_tun left promiscuous mode 14:20:17 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 14:20:17 executing program 3: syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x10000, 0x0, &(0x7f0000000240), 0x8000, &(0x7f0000000280)={[{@fat=@nfs}], [{@smackfsdef}, {@hash}, {@fowner_gt={'fowner>', 0xee00}}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 14:20:17 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)={0x18, 0x1, 0x2, 0x801, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4}]}, 0x18}}, 0x0) [ 182.198514] loop3: detected capacity change from 0 to 128 14:20:17 executing program 1: r0 = open_tree(0xffffffffffffff9c, &(0x7f0000007ec0)='./cgroup/cgroup.procs\x00', 0x900) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000007f00)={'vcan0\x00', {0x2, 0x0, @multicast1}}) lsetxattr$security_selinux(&(0x7f00000000c0)='./cgroup/cgroup.procs\x00', &(0x7f0000000140), &(0x7f0000000000)='unconfined\x00', 0xb, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r1) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000080)={r3, 0x1, 0x6, @broadcast}, 0x10) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000180)={r3, 0x1, 0x6, @broadcast}, 0x10) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000080)={r3, 0x1, 0x6, @broadcast}, 0x10) 14:20:17 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) [ 182.214256] loop3: detected capacity change from 0 to 128 14:20:17 executing program 6: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) bind$bt_l2cap(r1, &(0x7f0000000880)={0x1f, 0xffc0}, 0xe) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) bind$bt_l2cap(r2, &(0x7f0000000880)={0x1f, 0xffc0}, 0xe) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0}], 0x0, &(0x7f0000000180)=ANY=[@ANYRESDEC=r4, @ANYRES16=r1, @ANYRESOCT=r1, @ANYRESOCT=r0, @ANYRES16=r3, @ANYRES64=r1, @ANYRESDEC=r2, @ANYRES32=r1, @ANYRESOCT=r3]) chdir(&(0x7f0000000140)='./file0\x00') r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x6) setsockopt$inet6_IPV6_RTHDR(0xffffffffffffffff, 0x29, 0x39, 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r5, 0x29, 0x41, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)=0xa8) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000880)={0x1f, 0xffc0}, 0xe) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x6) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r6, 0x0, 0x0, 0x8800000) openat(r6, &(0x7f0000000080)='./file0\x00', 0x64000, 0x0) 14:20:17 executing program 7: r0 = open_tree(0xffffffffffffff9c, &(0x7f0000007ec0)='./cgroup/cgroup.procs\x00', 0x900) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000007f00)={'vcan0\x00', {0x2, 0x0, @multicast1}}) lsetxattr$security_selinux(&(0x7f00000000c0)='./cgroup/cgroup.procs\x00', &(0x7f0000000140), &(0x7f0000000000)='unconfined\x00', 0xb, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r1) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000080)={r3, 0x1, 0x6, @broadcast}, 0x10) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000180)={r3, 0x1, 0x6, @broadcast}, 0x10) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000080)={r3, 0x1, 0x6, @broadcast}, 0x10) 14:20:17 executing program 2: r0 = fsopen(&(0x7f0000000000)='sockfs\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x7, 0x0, 0x0, 0x0) [ 182.256936] device syz_tun entered promiscuous mode [ 182.259930] FAT-fs (loop6): Unrecognized mount option "00000000000000000008" or missing value [ 182.260942] device syz_tun left promiscuous mode 14:20:17 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) [ 182.281833] device syz_tun entered promiscuous mode [ 182.284026] device syz_tun left promiscuous mode 14:20:17 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)={0x18, 0x1, 0x2, 0x801, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4}]}, 0x18}}, 0x0) 14:20:17 executing program 3: syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x10000, 0x0, &(0x7f0000000240), 0x8000, &(0x7f0000000280)={[{@fat=@nfs}], [{@smackfsdef}, {@hash}, {@fowner_gt={'fowner>', 0xee00}}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 14:20:17 executing program 2: r0 = fsopen(&(0x7f0000000000)='sockfs\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x7, 0x0, 0x0, 0x0) 14:20:17 executing program 0: r0 = fsopen(&(0x7f0000000000)='sockfs\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x7, 0x0, 0x0, 0x0) [ 182.314883] loop3: detected capacity change from 0 to 128 [ 182.397929] loop3: detected capacity change from 0 to 128 14:20:17 executing program 3: syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x10000, 0x0, &(0x7f0000000240), 0x8000, &(0x7f0000000280)={[{@fat=@nfs}], [{@smackfsdef}, {@hash}, {@fowner_gt={'fowner>', 0xee00}}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 14:20:17 executing program 7: r0 = open_tree(0xffffffffffffff9c, &(0x7f0000007ec0)='./cgroup/cgroup.procs\x00', 0x900) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000007f00)={'vcan0\x00', {0x2, 0x0, @multicast1}}) lsetxattr$security_selinux(&(0x7f00000000c0)='./cgroup/cgroup.procs\x00', &(0x7f0000000140), &(0x7f0000000000)='unconfined\x00', 0xb, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r1) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000080)={r3, 0x1, 0x6, @broadcast}, 0x10) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000180)={r3, 0x1, 0x6, @broadcast}, 0x10) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000080)={r3, 0x1, 0x6, @broadcast}, 0x10) [ 182.403697] device syz_tun entered promiscuous mode [ 182.404730] device syz_tun left promiscuous mode 14:20:17 executing program 5: r0 = fsopen(&(0x7f0000000000)='sockfs\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x7, 0x0, 0x0, 0x0) 14:20:17 executing program 0: r0 = fsopen(&(0x7f0000000000)='sockfs\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x7, 0x0, 0x0, 0x0) 14:20:17 executing program 2: r0 = fsopen(&(0x7f0000000000)='sockfs\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x7, 0x0, 0x0, 0x0) 14:20:17 executing program 6: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) bind$bt_l2cap(r1, &(0x7f0000000880)={0x1f, 0xffc0}, 0xe) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) bind$bt_l2cap(r2, &(0x7f0000000880)={0x1f, 0xffc0}, 0xe) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0}], 0x0, &(0x7f0000000180)=ANY=[@ANYRESDEC=r4, @ANYRES16=r1, @ANYRESOCT=r1, @ANYRESOCT=r0, @ANYRES16=r3, @ANYRES64=r1, @ANYRESDEC=r2, @ANYRES32=r1, @ANYRESOCT=r3]) chdir(&(0x7f0000000140)='./file0\x00') r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x6) setsockopt$inet6_IPV6_RTHDR(0xffffffffffffffff, 0x29, 0x39, 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r5, 0x29, 0x41, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)=0xa8) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000880)={0x1f, 0xffc0}, 0xe) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x6) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r6, 0x0, 0x0, 0x8800000) openat(r6, &(0x7f0000000080)='./file0\x00', 0x64000, 0x0) 14:20:17 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)={0x18, 0x1, 0x2, 0x801, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4}]}, 0x18}}, 0x0) 14:20:17 executing program 0: r0 = fsopen(&(0x7f0000000000)='sockfs\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x7, 0x0, 0x0, 0x0) 14:20:17 executing program 5: r0 = fsopen(&(0x7f0000000000)='sockfs\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x7, 0x0, 0x0, 0x0) 14:20:17 executing program 2: r0 = fsopen(&(0x7f0000000000)='sockfs\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x7, 0x0, 0x0, 0x0) 14:20:17 executing program 3: syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x10000, 0x0, &(0x7f0000000240), 0x8000, &(0x7f0000000280)={[{@fat=@nfs}], [{@smackfsdef}, {@hash}, {@fowner_gt={'fowner>', 0xee00}}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) [ 182.493898] FAT-fs (loop6): Unrecognized mount option "00000000000000000008" or missing value [ 182.496022] loop3: detected capacity change from 0 to 128 14:20:17 executing program 5: r0 = fsopen(&(0x7f0000000000)='sockfs\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x7, 0x0, 0x0, 0x0) 14:20:17 executing program 1: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) bind$bt_l2cap(r1, &(0x7f0000000880)={0x1f, 0xffc0}, 0xe) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) bind$bt_l2cap(r2, &(0x7f0000000880)={0x1f, 0xffc0}, 0xe) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0}], 0x0, &(0x7f0000000180)=ANY=[@ANYRESDEC=r4, @ANYRES16=r1, @ANYRESOCT=r1, @ANYRESOCT=r0, @ANYRES16=r3, @ANYRES64=r1, @ANYRESDEC=r2, @ANYRES32=r1, @ANYRESOCT=r3]) chdir(&(0x7f0000000140)='./file0\x00') r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x6) setsockopt$inet6_IPV6_RTHDR(0xffffffffffffffff, 0x29, 0x39, 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r5, 0x29, 0x41, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)=0xa8) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000880)={0x1f, 0xffc0}, 0xe) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x6) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r6, 0x0, 0x0, 0x8800000) openat(r6, &(0x7f0000000080)='./file0\x00', 0x64000, 0x0) 14:20:17 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) bind$bt_l2cap(r1, &(0x7f0000000880)={0x1f, 0xffc0}, 0xe) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) bind$bt_l2cap(r2, &(0x7f0000000880)={0x1f, 0xffc0}, 0xe) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0}], 0x0, &(0x7f0000000180)=ANY=[@ANYRESDEC=r4, @ANYRES16=r1, @ANYRESOCT=r1, @ANYRESOCT=r0, @ANYRES16=r3, @ANYRES64=r1, @ANYRESDEC=r2, @ANYRES32=r1, @ANYRESOCT=r3]) chdir(&(0x7f0000000140)='./file0\x00') r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x6) setsockopt$inet6_IPV6_RTHDR(0xffffffffffffffff, 0x29, 0x39, 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r5, 0x29, 0x41, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)=0xa8) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000880)={0x1f, 0xffc0}, 0xe) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x6) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r6, 0x0, 0x0, 0x8800000) openat(r6, &(0x7f0000000080)='./file0\x00', 0x64000, 0x0) 14:20:17 executing program 0: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) bind$bt_l2cap(r1, &(0x7f0000000880)={0x1f, 0xffc0}, 0xe) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) bind$bt_l2cap(r2, &(0x7f0000000880)={0x1f, 0xffc0}, 0xe) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0}], 0x0, &(0x7f0000000180)=ANY=[@ANYRESDEC=r4, @ANYRES16=r1, @ANYRESOCT=r1, @ANYRESOCT=r0, @ANYRES16=r3, @ANYRES64=r1, @ANYRESDEC=r2, @ANYRES32=r1, @ANYRESOCT=r3]) chdir(&(0x7f0000000140)='./file0\x00') r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x6) setsockopt$inet6_IPV6_RTHDR(0xffffffffffffffff, 0x29, 0x39, 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r5, 0x29, 0x41, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)=0xa8) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000880)={0x1f, 0xffc0}, 0xe) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x6) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r6, 0x0, 0x0, 0x8800000) openat(r6, &(0x7f0000000080)='./file0\x00', 0x64000, 0x0) 14:20:17 executing program 6: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) bind$bt_l2cap(r1, &(0x7f0000000880)={0x1f, 0xffc0}, 0xe) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) bind$bt_l2cap(r2, &(0x7f0000000880)={0x1f, 0xffc0}, 0xe) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0}], 0x0, &(0x7f0000000180)=ANY=[@ANYRESDEC=r4, @ANYRES16=r1, @ANYRESOCT=r1, @ANYRESOCT=r0, @ANYRES16=r3, @ANYRES64=r1, @ANYRESDEC=r2, @ANYRES32=r1, @ANYRESOCT=r3]) chdir(&(0x7f0000000140)='./file0\x00') r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x6) setsockopt$inet6_IPV6_RTHDR(0xffffffffffffffff, 0x29, 0x39, 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r5, 0x29, 0x41, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)=0xa8) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000880)={0x1f, 0xffc0}, 0xe) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x6) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r6, 0x0, 0x0, 0x8800000) openat(r6, &(0x7f0000000080)='./file0\x00', 0x64000, 0x0) [ 182.606601] FAT-fs (loop0): Unrecognized mount option "00000000000000000008" or missing value [ 182.609360] FAT-fs (loop6): Unrecognized mount option "00000000000000000008" or missing value [ 182.647109] FAT-fs (loop2): Unrecognized mount option "00000000000000000008" or missing value 14:20:17 executing program 2: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) bind$bt_l2cap(r1, &(0x7f0000000880)={0x1f, 0xffc0}, 0xe) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) bind$bt_l2cap(r2, &(0x7f0000000880)={0x1f, 0xffc0}, 0xe) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0}], 0x0, &(0x7f0000000180)=ANY=[@ANYRESDEC=r4, @ANYRES16=r1, @ANYRESOCT=r1, @ANYRESOCT=r0, @ANYRES16=r3, @ANYRES64=r1, @ANYRESDEC=r2, @ANYRES32=r1, @ANYRESOCT=r3]) chdir(&(0x7f0000000140)='./file0\x00') r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x6) setsockopt$inet6_IPV6_RTHDR(0xffffffffffffffff, 0x29, 0x39, 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r5, 0x29, 0x41, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)=0xa8) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000880)={0x1f, 0xffc0}, 0xe) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x6) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r6, 0x0, 0x0, 0x8800000) openat(r6, &(0x7f0000000080)='./file0\x00', 0x64000, 0x0) [ 182.675527] FAT-fs (loop1): Unrecognized mount option "00000000000000000008" or missing value [ 182.678911] FAT-fs (loop7): Unrecognized mount option "00000000000000000008" or missing value 14:20:17 executing program 6: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) bind$bt_l2cap(r1, &(0x7f0000000880)={0x1f, 0xffc0}, 0xe) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) bind$bt_l2cap(r2, &(0x7f0000000880)={0x1f, 0xffc0}, 0xe) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0}], 0x0, &(0x7f0000000180)=ANY=[@ANYRESDEC=r4, @ANYRES16=r1, @ANYRESOCT=r1, @ANYRESOCT=r0, @ANYRES16=r3, @ANYRES64=r1, @ANYRESDEC=r2, @ANYRES32=r1, @ANYRESOCT=r3]) chdir(&(0x7f0000000140)='./file0\x00') r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x6) setsockopt$inet6_IPV6_RTHDR(0xffffffffffffffff, 0x29, 0x39, 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r5, 0x29, 0x41, &(0x7f0000000300)=ANY=[@ANYBLOB="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 VM DIAGNOSIS: 14:20:13 Registers: info registers vcpu 0 RAX=0000000000000063 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff823bd531 RDI=ffffffff8765c9a0 RBP=ffffffff8765c960 RSP=ffff88803e8973c0 R8 =0000000000000001 R9 =000000000000000a R10=0000000000000063 R11=0000000000000001 R12=0000000000000063 R13=ffffffff8765c960 R14=0000000000000010 R15=ffffffff823bd520 RIP=ffffffff823bd589 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fed57423700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fd9513dc760 CR3=000000001ad06000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 ffffffffffffffff ffffffffffffffff YMM02=0000000000000000 0000000000000000 00524f5252450040 0000000000000000 YMM03=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM04=0000000000000000 0000000000000000 0000000000000000 00000000000000ff YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=0000000000000000 RBX=0000000000000001 RCX=ffffffff842766f7 RDX=ffffed100d9c6fd1 RSI=0000000000000004 RDI=ffff88806ce37e80 RBP=ffff88806ce37e80 RSP=ffff88806cf09b28 R8 =0000000000000000 R9 =ffff88806ce37e83 R10=ffffed100d9c6fd0 R11=0000000000000001 R12=0000000000000003 R13=ffffed100d9c6fd0 R14=0000000000000001 R15=1ffff1100d9e1366 RIP=ffffffff84276774 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f7ded9e2464 CR3=0000000008a56000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 2032313a30323a34 312034202074634f YMM01=0000000000000000 0000000000000000 5d3331323230372e 37373120205b203a YMM02=0000000000000000 0000000000000000 7075727265746e69 203a72656d697472 YMM03=0000000000000000 0000000000000000 203a6c656e72656b 2072656c6c616b7a YMM04=0000000000000000 0000000000000000 2032313a30323a34 312034202074634f YMM05=0000000000000000 0000000000000000 6576655f66726570 3d7373616c637420 YMM06=0000000000000000 0000000000000000 747379733a755f6d 65747379733d7478 YMM07=0000000000000000 0000000000000000 656b3a725f6d6574 7379733a755f6d65 YMM08=0000000000000000 0000000000000000 2e726f7475636578 652d7a7973223d6d YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000