Warning: Permanently added '[localhost]:35474' (ECDSA) to the list of known hosts. 2022/10/05 11:46:58 fuzzer started 2022/10/05 11:46:59 dialing manager at localhost:37193 syzkaller login: [ 36.636306] cgroup: Unknown subsys name 'net' [ 36.691708] cgroup: Unknown subsys name 'rlimit' 2022/10/05 11:47:13 syscalls: 2215 2022/10/05 11:47:13 code coverage: enabled 2022/10/05 11:47:13 comparison tracing: enabled 2022/10/05 11:47:13 extra coverage: enabled 2022/10/05 11:47:13 setuid sandbox: enabled 2022/10/05 11:47:13 namespace sandbox: enabled 2022/10/05 11:47:13 Android sandbox: enabled 2022/10/05 11:47:13 fault injection: enabled 2022/10/05 11:47:13 leak checking: enabled 2022/10/05 11:47:13 net packet injection: enabled 2022/10/05 11:47:13 net device setup: enabled 2022/10/05 11:47:13 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/10/05 11:47:13 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/10/05 11:47:13 USB emulation: enabled 2022/10/05 11:47:13 hci packet injection: enabled 2022/10/05 11:47:13 wifi device emulation: failed to parse kernel version (6.0.0-next-20221005) 2022/10/05 11:47:13 802.15.4 emulation: enabled 2022/10/05 11:47:13 fetching corpus: 0, signal 0/2000 (executing program) 2022/10/05 11:47:13 fetching corpus: 50, signal 25019/28408 (executing program) 2022/10/05 11:47:13 fetching corpus: 100, signal 32652/37455 (executing program) 2022/10/05 11:47:13 fetching corpus: 150, signal 39348/45427 (executing program) 2022/10/05 11:47:13 fetching corpus: 200, signal 45501/52715 (executing program) 2022/10/05 11:47:14 fetching corpus: 250, signal 50397/58746 (executing program) 2022/10/05 11:47:14 fetching corpus: 300, signal 54153/63557 (executing program) 2022/10/05 11:47:14 fetching corpus: 350, signal 59064/69275 (executing program) 2022/10/05 11:47:14 fetching corpus: 400, signal 64465/75355 (executing program) 2022/10/05 11:47:14 fetching corpus: 450, signal 68889/80428 (executing program) 2022/10/05 11:47:14 fetching corpus: 500, signal 74386/86388 (executing program) 2022/10/05 11:47:14 fetching corpus: 550, signal 77746/90350 (executing program) 2022/10/05 11:47:14 fetching corpus: 600, signal 81138/94218 (executing program) 2022/10/05 11:47:14 fetching corpus: 650, signal 83573/97229 (executing program) 2022/10/05 11:47:15 fetching corpus: 700, signal 86468/100541 (executing program) 2022/10/05 11:47:15 fetching corpus: 750, signal 88719/103279 (executing program) 2022/10/05 11:47:15 fetching corpus: 800, signal 91836/106680 (executing program) 2022/10/05 11:47:15 fetching corpus: 850, signal 94532/109696 (executing program) 2022/10/05 11:47:15 fetching corpus: 900, signal 96202/111798 (executing program) 2022/10/05 11:47:15 fetching corpus: 950, signal 97650/113727 (executing program) 2022/10/05 11:47:15 fetching corpus: 1000, signal 99162/115685 (executing program) 2022/10/05 11:47:15 fetching corpus: 1050, signal 100464/117432 (executing program) 2022/10/05 11:47:15 fetching corpus: 1100, signal 101259/118775 (executing program) 2022/10/05 11:47:16 fetching corpus: 1150, signal 103393/121060 (executing program) 2022/10/05 11:47:16 fetching corpus: 1200, signal 104804/122828 (executing program) 2022/10/05 11:47:16 fetching corpus: 1250, signal 107142/125146 (executing program) 2022/10/05 11:47:16 fetching corpus: 1300, signal 108892/127012 (executing program) 2022/10/05 11:47:16 fetching corpus: 1350, signal 109845/128314 (executing program) 2022/10/05 11:47:16 fetching corpus: 1400, signal 110895/129663 (executing program) 2022/10/05 11:47:16 fetching corpus: 1450, signal 113922/132226 (executing program) 2022/10/05 11:47:16 fetching corpus: 1500, signal 115749/133943 (executing program) 2022/10/05 11:47:16 fetching corpus: 1550, signal 117195/135446 (executing program) 2022/10/05 11:47:17 fetching corpus: 1600, signal 118179/136577 (executing program) 2022/10/05 11:47:17 fetching corpus: 1650, signal 119589/138037 (executing program) 2022/10/05 11:47:17 fetching corpus: 1700, signal 122562/140365 (executing program) 2022/10/05 11:47:17 fetching corpus: 1750, signal 123771/141528 (executing program) 2022/10/05 11:47:17 fetching corpus: 1800, signal 124684/142553 (executing program) 2022/10/05 11:47:17 fetching corpus: 1850, signal 126142/143835 (executing program) 2022/10/05 11:47:17 fetching corpus: 1900, signal 127134/144806 (executing program) 2022/10/05 11:47:17 fetching corpus: 1950, signal 128189/145755 (executing program) 2022/10/05 11:47:17 fetching corpus: 2000, signal 129011/146537 (executing program) 2022/10/05 11:47:18 fetching corpus: 2050, signal 130139/147490 (executing program) 2022/10/05 11:47:18 fetching corpus: 2100, signal 131024/148336 (executing program) 2022/10/05 11:47:18 fetching corpus: 2150, signal 131883/149117 (executing program) 2022/10/05 11:47:18 fetching corpus: 2200, signal 133353/150143 (executing program) 2022/10/05 11:47:18 fetching corpus: 2250, signal 134452/150984 (executing program) 2022/10/05 11:47:18 fetching corpus: 2300, signal 135098/151606 (executing program) 2022/10/05 11:47:18 fetching corpus: 2350, signal 135777/152253 (executing program) 2022/10/05 11:47:18 fetching corpus: 2400, signal 137661/153402 (executing program) 2022/10/05 11:47:19 fetching corpus: 2450, signal 138637/154140 (executing program) 2022/10/05 11:47:19 fetching corpus: 2500, signal 139946/154928 (executing program) 2022/10/05 11:47:19 fetching corpus: 2550, signal 140650/155509 (executing program) 2022/10/05 11:47:19 fetching corpus: 2600, signal 141806/156222 (executing program) 2022/10/05 11:47:19 fetching corpus: 2650, signal 142425/156731 (executing program) 2022/10/05 11:47:19 fetching corpus: 2700, signal 143157/157220 (executing program) 2022/10/05 11:47:19 fetching corpus: 2750, signal 143697/157610 (executing program) 2022/10/05 11:47:19 fetching corpus: 2800, signal 144389/158044 (executing program) 2022/10/05 11:47:19 fetching corpus: 2850, signal 144933/158423 (executing program) 2022/10/05 11:47:19 fetching corpus: 2900, signal 146461/159115 (executing program) 2022/10/05 11:47:20 fetching corpus: 2950, signal 147136/159495 (executing program) 2022/10/05 11:47:20 fetching corpus: 3000, signal 147707/159871 (executing program) 2022/10/05 11:47:20 fetching corpus: 3050, signal 148640/160258 (executing program) 2022/10/05 11:47:20 fetching corpus: 3100, signal 149369/160660 (executing program) 2022/10/05 11:47:20 fetching corpus: 3150, signal 149858/160962 (executing program) 2022/10/05 11:47:20 fetching corpus: 3200, signal 150362/161221 (executing program) 2022/10/05 11:47:20 fetching corpus: 3250, signal 150717/161459 (executing program) 2022/10/05 11:47:20 fetching corpus: 3300, signal 152368/162158 (executing program) 2022/10/05 11:47:20 fetching corpus: 3350, signal 152863/162404 (executing program) 2022/10/05 11:47:20 fetching corpus: 3400, signal 153523/162668 (executing program) 2022/10/05 11:47:21 fetching corpus: 3450, signal 154418/162988 (executing program) 2022/10/05 11:47:21 fetching corpus: 3500, signal 155888/163303 (executing program) 2022/10/05 11:47:21 fetching corpus: 3550, signal 156497/163496 (executing program) 2022/10/05 11:47:21 fetching corpus: 3600, signal 157192/163666 (executing program) 2022/10/05 11:47:21 fetching corpus: 3650, signal 158677/163884 (executing program) 2022/10/05 11:47:21 fetching corpus: 3700, signal 159608/164031 (executing program) 2022/10/05 11:47:21 fetching corpus: 3750, signal 160123/164123 (executing program) 2022/10/05 11:47:21 fetching corpus: 3766, signal 160383/164181 (executing program) 2022/10/05 11:47:21 fetching corpus: 3766, signal 160383/164227 (executing program) 2022/10/05 11:47:21 fetching corpus: 3766, signal 160383/164276 (executing program) 2022/10/05 11:47:21 fetching corpus: 3766, signal 160383/164329 (executing program) 2022/10/05 11:47:21 fetching corpus: 3766, signal 160383/164377 (executing program) 2022/10/05 11:47:21 fetching corpus: 3766, signal 160383/164399 (executing program) 2022/10/05 11:47:21 fetching corpus: 3766, signal 160383/164399 (executing program) 2022/10/05 11:47:24 starting 8 fuzzer processes 11:47:24 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_int(r0, 0x1, 0x2c, &(0x7f0000000b80), &(0x7f0000000bc0)=0x4) 11:47:24 executing program 1: rseq(&(0x7f0000000340), 0x20, 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000900)={'wpan3\x00'}) 11:47:24 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000017c0)={'ah\x00'}, &(0x7f0000001800)=0x1e) 11:47:24 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) fadvise64(r0, 0x0, 0xfffffffffffffff8, 0x0) [ 61.920600] audit: type=1400 audit(1664970444.603:6): avc: denied { execmem } for pid=281 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 11:47:24 executing program 4: r0 = socket(0xa, 0x3, 0x1) sendmmsg$sock(r0, &(0x7f0000004300)=[{{&(0x7f0000001f00)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @mcast2}}, 0x80, 0x0, 0x0, &(0x7f0000002140)=[@timestamping={{0x14}}], 0x18}}], 0x1, 0x0) 11:47:24 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getgroups(0x2, &(0x7f0000000840)=[0x0, 0xee01]) fchown(r0, 0xffffffffffffffff, r1) 11:47:24 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSTI(r2, 0x5412, &(0x7f00000000c0)=0x11) io_submit(0x0, 0x5, &(0x7f0000000480)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x3, 0x9, r0, &(0x7f0000000180)="799f2fbd19cdb4078cad1921c0329c09ec57535ea52c20d7ddf70ffb1eea83433373911b4f81dab308fdf2495f101055e55fa4c3f8ef3a6b920d7ebc550f1a9a06f6e564b80b65357588a6ea", 0x4c, 0xfff}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xb, 0x78, r1, &(0x7f0000000240)="74027e7c08583aac9b80a839c3471a", 0xf, 0x5, 0x0, 0x3}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x3, 0x4, r2, &(0x7f0000000340)="c22589004fdac6659a141a503b0f3e415293bfe461848b9df6c5f4206a4e2b593ce89cf96d1172c59ab9396e6619504e0112a0cd53dcfbd74e8b63dfbc552d4aaa08da0cd14cd7eafa462591b800b6b78e6b50c206f4203c866b158cd22ebc312f", 0x61, 0x0, 0x0, 0x1}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x6, 0x8, r0, &(0x7f00000005c0)="feb1a716c04ab705f3a5fdfe78e875b051a1eb5da100389d307ca8a9dba87e7ddd850987c9a1d951dbb1224d07be0c4ee44f88759344ecc702c4570785deb68aefebd638873c319557167e7672babc438ab615636b0a9f5931d5c5ce90c4f67918e138322355e5afe957f29c746c6fde8ea60556edad99c1fac0965deb12f303d659dd8443a60591a375a331c5b30d8b8d79a6681344746b25a9f350518c90a1cd0f4c01224aa242774e4288c6b29e266e0bc2b358001c25462671ac847508f7fd2676be0d915c48ed566e5d8743d2c167b933987defb533809cbed260d31349cc7f659813f1bd0d6f01", 0xea, 0x4, 0x0, 0x3}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x5, 0x0, r0, &(0x7f00000006c0)="fc37e85c843e79a6ffc7e301b786b7e045305f2f99202a5fa15b8a19c705a1f9c3e01ffecd6ff747418b45cc2d9c4bf9dee67b9bc5d9d24b85ca7a44dab871d8dbc69e233eeb577ecb3d4044136540a157fd6b7747069bed5622f6d1290e925784322e7ffeccc5e0ca9c4ffd1ab2741c73d7a5a389ce70b39a6af482d5bf556f6b0e7c1869dc834de6a2a5e03eaff803bf665789d44fc2b1dc330a2ffd4ac661ba8e0976e15514fbb9a95ea07b1808779a43842fd04ecde2c67e4b8abc728fb38739e49791ab23b3bc0972a1930ed1a6fb862c3cd316b80c3ab59755f37d97f7d9a281afeb2b1ee1", 0xe8, 0x3, 0x0, 0x3}]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x3, 0x0, 0x3f, 0x5d, 0x0, 0x9, 0x80000, 0x8, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80000009, 0x4, @perf_config_ext={0x3, 0xfc0000000}, 0x12198, 0x1000, 0x0, 0x0, 0x8, 0x2, 0x9, 0x0, 0x9, 0x0, 0x5}, r3, 0x2, 0xffffffffffffffff, 0x3) getpid() lchown(&(0x7f0000000140)='./file0\x00', 0xee01, 0xee01) 11:47:24 executing program 7: process_vm_readv(0x0, &(0x7f0000001540)=[{&(0x7f00000014c0)=""/128, 0x80}], 0x1, 0x0, 0x0, 0x0) [ 63.200132] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 63.202650] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 63.204308] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 63.206202] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 63.207250] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 63.208558] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 63.209996] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 63.211038] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 63.212127] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 63.247557] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 63.248658] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 63.249586] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 63.256034] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 63.257091] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 63.258380] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 63.259761] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 63.259849] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 63.261189] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 63.270359] Bluetooth: hci0: HCI_REQ-0x0c1a [ 63.271746] Bluetooth: hci2: HCI_REQ-0x0c1a [ 63.273354] Bluetooth: hci1: HCI_REQ-0x0c1a [ 63.326599] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 63.329217] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 63.330816] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 63.333753] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 63.336365] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 63.338024] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 63.339899] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 63.341869] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 63.343395] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 63.344517] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 63.346326] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 63.349106] Bluetooth: hci5: HCI_REQ-0x0c1a [ 63.349993] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 63.353618] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 63.354864] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 63.358591] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 63.360045] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 63.361246] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 63.362775] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 63.367598] Bluetooth: hci3: HCI_REQ-0x0c1a [ 63.370251] Bluetooth: hci4: HCI_REQ-0x0c1a [ 63.391097] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 63.396126] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 63.399764] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 63.407709] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 63.411869] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 63.413393] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 63.419588] Bluetooth: hci7: HCI_REQ-0x0c1a [ 65.326977] Bluetooth: hci6: Opcode 0x c03 failed: -110 [ 65.326996] Bluetooth: hci2: command 0x0409 tx timeout [ 65.328840] Bluetooth: hci0: command 0x0409 tx timeout [ 65.329079] Bluetooth: hci1: command 0x0409 tx timeout [ 65.392342] Bluetooth: hci4: command 0x0409 tx timeout [ 65.393790] Bluetooth: hci3: command 0x0409 tx timeout [ 65.395034] Bluetooth: hci5: command 0x0409 tx timeout [ 65.454914] Bluetooth: hci7: command 0x0409 tx timeout [ 67.374553] Bluetooth: hci1: command 0x041b tx timeout [ 67.375509] Bluetooth: hci2: command 0x041b tx timeout [ 67.375897] Bluetooth: hci0: command 0x041b tx timeout [ 67.438679] Bluetooth: hci5: command 0x041b tx timeout [ 67.439115] Bluetooth: hci3: command 0x041b tx timeout [ 67.439533] Bluetooth: hci4: command 0x041b tx timeout [ 67.502553] Bluetooth: hci7: command 0x041b tx timeout [ 68.402921] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 68.405224] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 68.406438] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 68.408322] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 68.409701] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 68.410616] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 68.414110] Bluetooth: hci6: HCI_REQ-0x0c1a [ 69.422551] Bluetooth: hci0: command 0x040f tx timeout [ 69.423041] Bluetooth: hci2: command 0x040f tx timeout [ 69.423864] Bluetooth: hci1: command 0x040f tx timeout [ 69.486516] Bluetooth: hci4: command 0x040f tx timeout [ 69.486946] Bluetooth: hci3: command 0x040f tx timeout [ 69.487343] Bluetooth: hci5: command 0x040f tx timeout [ 69.550710] Bluetooth: hci7: command 0x040f tx timeout [ 70.446595] Bluetooth: hci6: command 0x0409 tx timeout [ 71.470968] Bluetooth: hci1: command 0x0419 tx timeout [ 71.471393] Bluetooth: hci2: command 0x0419 tx timeout [ 71.471953] Bluetooth: hci0: command 0x0419 tx timeout [ 71.534561] Bluetooth: hci5: command 0x0419 tx timeout [ 71.534972] Bluetooth: hci3: command 0x0419 tx timeout [ 71.535344] Bluetooth: hci4: command 0x0419 tx timeout [ 71.598570] Bluetooth: hci7: command 0x0419 tx timeout [ 72.494591] Bluetooth: hci6: command 0x041b tx timeout [ 74.542642] Bluetooth: hci6: command 0x040f tx timeout [ 76.638387] Bluetooth: hci6: command 0x0419 tx timeout 11:48:18 executing program 7: mlock2(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0) 11:48:18 executing program 7: r0 = memfd_create(&(0x7f0000000000)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLK\xa4g?K)\xa0\xf0\x9b8Y\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x05\x00\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\xff#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x80L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x04\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\x01\x00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xee\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\x01\x01\x00\x00\x00\x00\x00\x00\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/\\\x01\xe2\xba\x0e\xe3\xf95\x1d\x10\xa7\x97\xbf\x8e\xac\x81\xc9\x13\x8e\xb3\xf3\xb5d\xa1\xcf\x1d\x92\x9b\x9b\xa7\x12F\xa0\xe0\xff\x1a\x8e\xe2ae^=\n\xe1\xa6\xb8\xe9v\x8f2\xf4\xac\xe5\xdf\xffi`Mo\x1e\x1cMN<\x1b\xd8\xfe\xd6P\xcdQ\x83\xfa\xe7\x1d\xd5\x01n\xa7~\x8b\x90/62\xff;.S\xf7\x0flwa\x16\xf0\xf2(\x96V,\xd7s\xaaOE\xd3H\xfd`}\xd8\xbc\x9a\xca\xe3\n\xd7fCe\xd8\xbb\xdao\xb0\x85\xcc\xedv\x94\xb5\xc4\xb6[>\xb9,\xfch_-s\x94,F\x15\xd8m5>\x94\x84\xf5\x00\xc3\xf6m\xc7B\t{\xe0d\xc65(\x18\x9c\xad\x13b6\xca\x16\x95\xcb^zF\xd0\x1a\x8dP\x94\x19\xa4\xbfr=\xb6\xae', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0xe456}) ftruncate(r0, 0x0) 11:48:19 executing program 7: r0 = memfd_create(&(0x7f0000000000)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLK\xa4g?K)\xa0\xf0\x9b8Y\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x05\x00\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\xff#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x80L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x04\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\x01\x00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xee\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\x01\x01\x00\x00\x00\x00\x00\x00\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/\\\x01\xe2\xba\x0e\xe3\xf95\x1d\x10\xa7\x97\xbf\x8e\xac\x81\xc9\x13\x8e\xb3\xf3\xb5d\xa1\xcf\x1d\x92\x9b\x9b\xa7\x12F\xa0\xe0\xff\x1a\x8e\xe2ae^=\n\xe1\xa6\xb8\xe9v\x8f2\xf4\xac\xe5\xdf\xffi`Mo\x1e\x1cMN<\x1b\xd8\xfe\xd6P\xcdQ\x83\xfa\xe7\x1d\xd5\x01n\xa7~\x8b\x90/62\xff;.S\xf7\x0flwa\x16\xf0\xf2(\x96V,\xd7s\xaaOE\xd3H\xfd`}\xd8\xbc\x9a\xca\xe3\n\xd7fCe\xd8\xbb\xdao\xb0\x85\xcc\xedv\x94\xb5\xc4\xb6[>\xb9,\xfch_-s\x94,F\x15\xd8m5>\x94\x84\xf5\x00\xc3\xf6m\xc7B\t{\xe0d\xc65(\x18\x9c\xad\x13b6\xca\x16\x95\xcb^zF\xd0\x1a\x8dP\x94\x19\xa4\xbfr=\xb6\xae', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0xe456}) ftruncate(r0, 0x0) 11:48:19 executing program 7: r0 = memfd_create(&(0x7f0000000000)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLK\xa4g?K)\xa0\xf0\x9b8Y\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x05\x00\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\xff#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x80L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x04\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\x01\x00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xee\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\x01\x01\x00\x00\x00\x00\x00\x00\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/\\\x01\xe2\xba\x0e\xe3\xf95\x1d\x10\xa7\x97\xbf\x8e\xac\x81\xc9\x13\x8e\xb3\xf3\xb5d\xa1\xcf\x1d\x92\x9b\x9b\xa7\x12F\xa0\xe0\xff\x1a\x8e\xe2ae^=\n\xe1\xa6\xb8\xe9v\x8f2\xf4\xac\xe5\xdf\xffi`Mo\x1e\x1cMN<\x1b\xd8\xfe\xd6P\xcdQ\x83\xfa\xe7\x1d\xd5\x01n\xa7~\x8b\x90/62\xff;.S\xf7\x0flwa\x16\xf0\xf2(\x96V,\xd7s\xaaOE\xd3H\xfd`}\xd8\xbc\x9a\xca\xe3\n\xd7fCe\xd8\xbb\xdao\xb0\x85\xcc\xedv\x94\xb5\xc4\xb6[>\xb9,\xfch_-s\x94,F\x15\xd8m5>\x94\x84\xf5\x00\xc3\xf6m\xc7B\t{\xe0d\xc65(\x18\x9c\xad\x13b6\xca\x16\x95\xcb^zF\xd0\x1a\x8dP\x94\x19\xa4\xbfr=\xb6\xae', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0xe456}) ftruncate(r0, 0x0) 11:48:19 executing program 7: r0 = memfd_create(&(0x7f0000000000)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLK\xa4g?K)\xa0\xf0\x9b8Y\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x05\x00\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\xff#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x80L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x04\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\x01\x00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xee\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\x01\x01\x00\x00\x00\x00\x00\x00\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/\\\x01\xe2\xba\x0e\xe3\xf95\x1d\x10\xa7\x97\xbf\x8e\xac\x81\xc9\x13\x8e\xb3\xf3\xb5d\xa1\xcf\x1d\x92\x9b\x9b\xa7\x12F\xa0\xe0\xff\x1a\x8e\xe2ae^=\n\xe1\xa6\xb8\xe9v\x8f2\xf4\xac\xe5\xdf\xffi`Mo\x1e\x1cMN<\x1b\xd8\xfe\xd6P\xcdQ\x83\xfa\xe7\x1d\xd5\x01n\xa7~\x8b\x90/62\xff;.S\xf7\x0flwa\x16\xf0\xf2(\x96V,\xd7s\xaaOE\xd3H\xfd`}\xd8\xbc\x9a\xca\xe3\n\xd7fCe\xd8\xbb\xdao\xb0\x85\xcc\xedv\x94\xb5\xc4\xb6[>\xb9,\xfch_-s\x94,F\x15\xd8m5>\x94\x84\xf5\x00\xc3\xf6m\xc7B\t{\xe0d\xc65(\x18\x9c\xad\x13b6\xca\x16\x95\xcb^zF\xd0\x1a\x8dP\x94\x19\xa4\xbfr=\xb6\xae', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0xe456}) ftruncate(r0, 0x0) 11:48:19 executing program 7: inotify_rm_watch(0xffffffffffffffff, 0x0) 11:48:19 executing program 7: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366cef82e00080820000200008000f80000200040000000000000000000010000000000000002000000010006000000000000000000000000008000"/96, 0x60}, {&(0x7f0000010100)='RRaA\x00'/32, 0x20, 0x800}, {&(0x7f0000010200)="00000000727241610500000007000000000000000000000000000000000055aa", 0x20, 0x9e0}, {&(0x7f0000010300)="601c6d6b646f7366cef82e00080820000200008000f80000200040000000000000000000010000000000000002000000010006000000000000000000000000008000"/96, 0x60, 0x3000}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0fffffff0fffffff0fffffff0fffffff0fffffff0f", 0x20, 0x10000}, {&(0x7f0000010500)="f8ffff0fffffff0fffffff0fffffff0fffffff0fffffff0fffffff0fffffff0f", 0x20, 0x10800}, {&(0x7f0000010600)="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", 0x120, 0x11000}, {&(0x7f0000010800)="2e2020202020202020202010007ae770325132510000e77032510300000000002e2e20202020202020202010007ae770325132510000e770325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c453020202020202020007ae770325132510000e770325104001a040000", 0x80, 0x15000}, {&(0x7f0000010900)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x19000}, {&(0x7f0000010e00)='syzkallers\x00'/32, 0x20, 0x1d000}, {&(0x7f0000010f00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x25000}], 0x0, &(0x7f0000011000)) [ 117.251605] loop7: detected capacity change from 0 to 592 11:48:20 executing program 7: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366cef82e00080820000200008000f80000200040000000000000000000010000000000000002000000010006000000000000000000000000008000"/96, 0x60}, {&(0x7f0000010100)='RRaA\x00'/32, 0x20, 0x800}, {&(0x7f0000010200)="00000000727241610500000007000000000000000000000000000000000055aa", 0x20, 0x9e0}, {&(0x7f0000010300)="601c6d6b646f7366cef82e00080820000200008000f80000200040000000000000000000010000000000000002000000010006000000000000000000000000008000"/96, 0x60, 0x3000}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0fffffff0fffffff0fffffff0fffffff0fffffff0f", 0x20, 0x10000}, {&(0x7f0000010500)="f8ffff0fffffff0fffffff0fffffff0fffffff0fffffff0fffffff0fffffff0f", 0x20, 0x10800}, {&(0x7f0000010600)="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", 0x120, 0x11000}, {&(0x7f0000010800)="2e2020202020202020202010007ae770325132510000e77032510300000000002e2e20202020202020202010007ae770325132510000e770325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c453020202020202020007ae770325132510000e770325104001a040000", 0x80, 0x15000}, {&(0x7f0000010900)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x19000}, {&(0x7f0000010e00)='syzkallers\x00'/32, 0x20, 0x1d000}, {&(0x7f0000010f00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x25000}], 0x0, &(0x7f0000011000)) [ 117.457685] loop7: detected capacity change from 0 to 592 [ 118.280652] audit: type=1400 audit(1664970500.963:7): avc: denied { open } for pid=3880 comm="syz-executor.6" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 118.282161] audit: type=1400 audit(1664970500.964:8): avc: denied { kernel } for pid=3880 comm="syz-executor.6" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 118.317561] ------------[ cut here ]------------ [ 118.317593] [ 118.317598] ====================================================== [ 118.317604] WARNING: possible circular locking dependency detected [ 118.317611] 6.0.0-next-20221005 #1 Not tainted [ 118.317622] ------------------------------------------------------ [ 118.317627] syz-executor.6/3881 is trying to acquire lock: [ 118.317638] ffffffff853faaf8 ((console_sem).lock){....}-{2:2}, at: down_trylock+0xe/0x70 [ 118.317704] [ 118.317704] but task is already holding lock: [ 118.317708] ffff88803ee3ec20 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 118.317754] [ 118.317754] which lock already depends on the new lock. [ 118.317754] [ 118.317759] [ 118.317759] the existing dependency chain (in reverse order) is: [ 118.317764] [ 118.317764] -> #3 (&ctx->lock){....}-{2:2}: [ 118.317789] _raw_spin_lock+0x2a/0x40 [ 118.317810] __perf_event_task_sched_out+0x53b/0x18d0 [ 118.317830] __schedule+0xedd/0x2470 [ 118.317856] schedule+0xda/0x1b0 [ 118.317881] exit_to_user_mode_prepare+0x114/0x1a0 [ 118.317902] syscall_exit_to_user_mode+0x19/0x40 [ 118.317925] do_syscall_64+0x48/0x90 [ 118.317942] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 118.317966] [ 118.317966] -> #2 (&rq->__lock){-.-.}-{2:2}: [ 118.317990] _raw_spin_lock_nested+0x30/0x40 [ 118.318010] raw_spin_rq_lock_nested+0x1e/0x30 [ 118.318033] task_fork_fair+0x63/0x4d0 [ 118.318062] sched_cgroup_fork+0x3d0/0x540 [ 118.318087] copy_process+0x4183/0x6e20 [ 118.318105] kernel_clone+0xe7/0x890 [ 118.318122] user_mode_thread+0xad/0xf0 [ 118.318140] rest_init+0x24/0x250 [ 118.318163] arch_call_rest_init+0xf/0x14 [ 118.318195] start_kernel+0x4c6/0x4eb [ 118.318225] secondary_startup_64_no_verify+0xe0/0xeb [ 118.318249] [ 118.318249] -> #1 (&p->pi_lock){-.-.}-{2:2}: [ 118.318273] _raw_spin_lock_irqsave+0x39/0x60 [ 118.318294] try_to_wake_up+0xab/0x1930 [ 118.318317] up+0x75/0xb0 [ 118.318344] __up_console_sem+0x6e/0x80 [ 118.318372] console_unlock+0x46a/0x590 [ 118.318400] vprintk_emit+0x1bd/0x560 [ 118.318431] vprintk+0x84/0xa0 [ 118.318460] _printk+0xba/0xf1 [ 118.318480] kauditd_hold_skb.cold+0x3f/0x4e [ 118.318511] kauditd_send_queue+0x233/0x290 [ 118.318537] kauditd_thread+0x5f9/0x9c0 [ 118.318562] kthread+0x2ed/0x3a0 [ 118.318587] ret_from_fork+0x22/0x30 [ 118.318609] [ 118.318609] -> #0 ((console_sem).lock){....}-{2:2}: [ 118.318633] __lock_acquire+0x2a02/0x5e70 [ 118.318661] lock_acquire+0x1a2/0x530 [ 118.318689] _raw_spin_lock_irqsave+0x39/0x60 [ 118.318710] down_trylock+0xe/0x70 [ 118.318738] __down_trylock_console_sem+0x3b/0xd0 [ 118.318766] vprintk_emit+0x16b/0x560 [ 118.318795] vprintk+0x84/0xa0 [ 118.318824] _printk+0xba/0xf1 [ 118.318843] report_bug.cold+0x72/0xab [ 118.318881] handle_bug+0x3c/0x70 [ 118.318897] exc_invalid_op+0x14/0x50 [ 118.318914] asm_exc_invalid_op+0x16/0x20 [ 118.318936] group_sched_out.part.0+0x2c7/0x460 [ 118.318967] ctx_sched_out+0x8f1/0xc10 [ 118.318997] __perf_event_task_sched_out+0x6d0/0x18d0 [ 118.319017] __schedule+0xedd/0x2470 [ 118.319042] schedule+0xda/0x1b0 [ 118.319067] exit_to_user_mode_prepare+0x114/0x1a0 [ 118.319086] syscall_exit_to_user_mode+0x19/0x40 [ 118.319110] do_syscall_64+0x48/0x90 [ 118.319126] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 118.319150] [ 118.319150] other info that might help us debug this: [ 118.319150] [ 118.319154] Chain exists of: [ 118.319154] (console_sem).lock --> &rq->__lock --> &ctx->lock [ 118.319154] [ 118.319180] Possible unsafe locking scenario: [ 118.319180] [ 118.319184] CPU0 CPU1 [ 118.319187] ---- ---- [ 118.319191] lock(&ctx->lock); [ 118.319201] lock(&rq->__lock); [ 118.319212] lock(&ctx->lock); [ 118.319222] lock((console_sem).lock); [ 118.319232] [ 118.319232] *** DEADLOCK *** [ 118.319232] [ 118.319235] 2 locks held by syz-executor.6/3881: [ 118.319247] #0: ffff88806ce37e98 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x1cf/0x2470 [ 118.319301] #1: ffff88803ee3ec20 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 118.319347] [ 118.319347] stack backtrace: [ 118.319351] CPU: 0 PID: 3881 Comm: syz-executor.6 Not tainted 6.0.0-next-20221005 #1 [ 118.319373] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 118.319385] Call Trace: [ 118.319390] [ 118.319397] dump_stack_lvl+0x8b/0xb3 [ 118.319431] check_noncircular+0x263/0x2e0 [ 118.319461] ? format_decode+0x26c/0xb50 [ 118.319491] ? print_circular_bug+0x450/0x450 [ 118.319522] ? simple_strtoul+0x30/0x30 [ 118.319552] ? format_decode+0x26c/0xb50 [ 118.319584] ? alloc_chain_hlocks+0x1ec/0x5a0 [ 118.319616] __lock_acquire+0x2a02/0x5e70 [ 118.319654] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 118.319695] lock_acquire+0x1a2/0x530 [ 118.319725] ? down_trylock+0xe/0x70 [ 118.319757] ? lock_release+0x750/0x750 [ 118.319794] ? vprintk+0x84/0xa0 [ 118.319826] _raw_spin_lock_irqsave+0x39/0x60 [ 118.319848] ? down_trylock+0xe/0x70 [ 118.319878] down_trylock+0xe/0x70 [ 118.319909] ? vprintk+0x84/0xa0 [ 118.319939] __down_trylock_console_sem+0x3b/0xd0 [ 118.319971] vprintk_emit+0x16b/0x560 [ 118.320005] vprintk+0x84/0xa0 [ 118.320036] _printk+0xba/0xf1 [ 118.320058] ? record_print_text.cold+0x16/0x16 [ 118.320088] ? report_bug.cold+0x66/0xab [ 118.320122] ? group_sched_out.part.0+0x2c7/0x460 [ 118.320155] report_bug.cold+0x72/0xab [ 118.320190] handle_bug+0x3c/0x70 [ 118.320208] exc_invalid_op+0x14/0x50 [ 118.320227] asm_exc_invalid_op+0x16/0x20 [ 118.320251] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 118.320288] Code: 5e 41 5f e9 8b ae ef ff e8 86 ae ef ff 65 8b 1d 2b 08 ac 7e 31 ff 89 de e8 26 ab ef ff 85 db 0f 84 8a 00 00 00 e8 69 ae ef ff <0f> 0b e9 a5 fe ff ff e8 5d ae ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 118.320308] RSP: 0018:ffff8880400e7c48 EFLAGS: 00010006 [ 118.320324] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 118.320337] RDX: ffff888017419ac0 RSI: ffffffff81566da7 RDI: 0000000000000005 [ 118.320350] RBP: ffff888008660b90 R08: 0000000000000005 R09: 0000000000000001 [ 118.320363] R10: 0000000000000000 R11: ffffffff865b601b R12: ffff88803ee3ec00 [ 118.320377] R13: ffff88806ce3d2c0 R14: ffffffff8547d040 R15: 0000000000000002 [ 118.320396] ? group_sched_out.part.0+0x2c7/0x460 [ 118.320431] ? group_sched_out.part.0+0x2c7/0x460 [ 118.320466] ctx_sched_out+0x8f1/0xc10 [ 118.320500] __perf_event_task_sched_out+0x6d0/0x18d0 [ 118.320525] ? lock_is_held_type+0xd7/0x130 [ 118.320551] ? __perf_cgroup_move+0x160/0x160 [ 118.320570] ? set_next_entity+0x304/0x550 [ 118.320601] ? update_curr+0x267/0x740 [ 118.320633] ? lock_is_held_type+0xd7/0x130 [ 118.320659] __schedule+0xedd/0x2470 [ 118.320691] ? io_schedule_timeout+0x150/0x150 [ 118.320721] ? rcu_read_lock_sched_held+0x3e/0x80 [ 118.320756] schedule+0xda/0x1b0 [ 118.320784] exit_to_user_mode_prepare+0x114/0x1a0 [ 118.320806] syscall_exit_to_user_mode+0x19/0x40 [ 118.320831] do_syscall_64+0x48/0x90 [ 118.320850] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 118.320874] RIP: 0033:0x7fbb9a158b19 [ 118.320888] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 118.320907] RSP: 002b:00007fbb976ce218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 118.320926] RAX: 0000000000000001 RBX: 00007fbb9a26bf68 RCX: 00007fbb9a158b19 [ 118.320939] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007fbb9a26bf6c [ 118.320952] RBP: 00007fbb9a26bf60 R08: 000000000000000e R09: 0000000000000000 [ 118.320965] R10: 0000000000000005 R11: 0000000000000246 R12: 00007fbb9a26bf6c [ 118.320978] R13: 00007fff5c6c21df R14: 00007fbb976ce300 R15: 0000000000022000 [ 118.321000] [ 118.410581] WARNING: CPU: 0 PID: 3881 at kernel/events/core.c:2309 group_sched_out.part.0+0x2c7/0x460 [ 118.411675] Modules linked in: [ 118.412056] CPU: 0 PID: 3881 Comm: syz-executor.6 Not tainted 6.0.0-next-20221005 #1 [ 118.412947] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 118.413903] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 118.414552] Code: 5e 41 5f e9 8b ae ef ff e8 86 ae ef ff 65 8b 1d 2b 08 ac 7e 31 ff 89 de e8 26 ab ef ff 85 db 0f 84 8a 00 00 00 e8 69 ae ef ff <0f> 0b e9 a5 fe ff ff e8 5d ae ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 118.416634] RSP: 0018:ffff8880400e7c48 EFLAGS: 00010006 [ 118.417252] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 118.418070] RDX: ffff888017419ac0 RSI: ffffffff81566da7 RDI: 0000000000000005 [ 118.418901] RBP: ffff888008660b90 R08: 0000000000000005 R09: 0000000000000001 [ 118.419719] R10: 0000000000000000 R11: ffffffff865b601b R12: ffff88803ee3ec00 [ 118.420531] R13: ffff88806ce3d2c0 R14: ffffffff8547d040 R15: 0000000000000002 [ 118.421358] FS: 00007fbb976ce700(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 118.422273] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 118.422949] CR2: 00007f46f740e008 CR3: 0000000037850000 CR4: 0000000000350ef0 [ 118.423755] Call Trace: [ 118.424062] [ 118.424335] ctx_sched_out+0x8f1/0xc10 [ 118.424813] __perf_event_task_sched_out+0x6d0/0x18d0 [ 118.425416] ? lock_is_held_type+0xd7/0x130 [ 118.425930] ? __perf_cgroup_move+0x160/0x160 [ 118.426459] ? set_next_entity+0x304/0x550 [ 118.426977] ? update_curr+0x267/0x740 [ 118.427441] ? lock_is_held_type+0xd7/0x130 [ 118.427948] __schedule+0xedd/0x2470 [ 118.428400] ? io_schedule_timeout+0x150/0x150 [ 118.428948] ? rcu_read_lock_sched_held+0x3e/0x80 [ 118.429528] schedule+0xda/0x1b0 [ 118.429940] exit_to_user_mode_prepare+0x114/0x1a0 [ 118.430509] syscall_exit_to_user_mode+0x19/0x40 [ 118.431077] do_syscall_64+0x48/0x90 [ 118.431515] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 118.432118] RIP: 0033:0x7fbb9a158b19 [ 118.432552] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 118.434635] RSP: 002b:00007fbb976ce218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 118.435517] RAX: 0000000000000001 RBX: 00007fbb9a26bf68 RCX: 00007fbb9a158b19 [ 118.436326] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007fbb9a26bf6c [ 118.437134] RBP: 00007fbb9a26bf60 R08: 000000000000000e R09: 0000000000000000 [ 118.437954] R10: 0000000000000005 R11: 0000000000000246 R12: 00007fbb9a26bf6c [ 118.438756] R13: 00007fff5c6c21df R14: 00007fbb976ce300 R15: 0000000000022000 [ 118.439576] [ 118.439849] irq event stamp: 2758 [ 118.440239] hardirqs last enabled at (2757): [] exit_to_user_mode_prepare+0x109/0x1a0 [ 118.441308] hardirqs last disabled at (2758): [] __schedule+0x1225/0x2470 [ 118.442267] softirqs last enabled at (2660): [] __irq_exit_rcu+0x11b/0x180 [ 118.443264] softirqs last disabled at (2505): [] __irq_exit_rcu+0x11b/0x180 [ 118.444244] ---[ end trace 0000000000000000 ]--- 11:48:22 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f000000c340)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)={0x18, 0x30, 0xe21, 0x0, 0x0, "", [@generic="8e274d9475"]}, 0x18}], 0x1}, 0x0) 11:48:22 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSTI(r2, 0x5412, &(0x7f00000000c0)=0x11) io_submit(0x0, 0x5, &(0x7f0000000480)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x3, 0x9, r0, &(0x7f0000000180)="799f2fbd19cdb4078cad1921c0329c09ec57535ea52c20d7ddf70ffb1eea83433373911b4f81dab308fdf2495f101055e55fa4c3f8ef3a6b920d7ebc550f1a9a06f6e564b80b65357588a6ea", 0x4c, 0xfff}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xb, 0x78, r1, &(0x7f0000000240)="74027e7c08583aac9b80a839c3471a", 0xf, 0x5, 0x0, 0x3}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x3, 0x4, r2, &(0x7f0000000340)="c22589004fdac6659a141a503b0f3e415293bfe461848b9df6c5f4206a4e2b593ce89cf96d1172c59ab9396e6619504e0112a0cd53dcfbd74e8b63dfbc552d4aaa08da0cd14cd7eafa462591b800b6b78e6b50c206f4203c866b158cd22ebc312f", 0x61, 0x0, 0x0, 0x1}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x6, 0x8, r0, &(0x7f00000005c0)="feb1a716c04ab705f3a5fdfe78e875b051a1eb5da100389d307ca8a9dba87e7ddd850987c9a1d951dbb1224d07be0c4ee44f88759344ecc702c4570785deb68aefebd638873c319557167e7672babc438ab615636b0a9f5931d5c5ce90c4f67918e138322355e5afe957f29c746c6fde8ea60556edad99c1fac0965deb12f303d659dd8443a60591a375a331c5b30d8b8d79a6681344746b25a9f350518c90a1cd0f4c01224aa242774e4288c6b29e266e0bc2b358001c25462671ac847508f7fd2676be0d915c48ed566e5d8743d2c167b933987defb533809cbed260d31349cc7f659813f1bd0d6f01", 0xea, 0x4, 0x0, 0x3}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x5, 0x0, r0, &(0x7f00000006c0)="fc37e85c843e79a6ffc7e301b786b7e045305f2f99202a5fa15b8a19c705a1f9c3e01ffecd6ff747418b45cc2d9c4bf9dee67b9bc5d9d24b85ca7a44dab871d8dbc69e233eeb577ecb3d4044136540a157fd6b7747069bed5622f6d1290e925784322e7ffeccc5e0ca9c4ffd1ab2741c73d7a5a389ce70b39a6af482d5bf556f6b0e7c1869dc834de6a2a5e03eaff803bf665789d44fc2b1dc330a2ffd4ac661ba8e0976e15514fbb9a95ea07b1808779a43842fd04ecde2c67e4b8abc728fb38739e49791ab23b3bc0972a1930ed1a6fb862c3cd316b80c3ab59755f37d97f7d9a281afeb2b1ee1", 0xe8, 0x3, 0x0, 0x3}]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x3, 0x0, 0x3f, 0x5d, 0x0, 0x9, 0x80000, 0x8, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80000009, 0x4, @perf_config_ext={0x3, 0xfc0000000}, 0x12198, 0x1000, 0x0, 0x0, 0x8, 0x2, 0x9, 0x0, 0x9, 0x0, 0x5}, r3, 0x2, 0xffffffffffffffff, 0x3) getpid() lchown(&(0x7f0000000140)='./file0\x00', 0xee01, 0xee01) 11:48:22 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSTI(r2, 0x5412, &(0x7f00000000c0)=0x11) io_submit(0x0, 0x5, &(0x7f0000000480)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x3, 0x9, r0, &(0x7f0000000180)="799f2fbd19cdb4078cad1921c0329c09ec57535ea52c20d7ddf70ffb1eea83433373911b4f81dab308fdf2495f101055e55fa4c3f8ef3a6b920d7ebc550f1a9a06f6e564b80b65357588a6ea", 0x4c, 0xfff}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xb, 0x78, r1, &(0x7f0000000240)="74027e7c08583aac9b80a839c3471a", 0xf, 0x5, 0x0, 0x3}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x3, 0x4, r2, &(0x7f0000000340)="c22589004fdac6659a141a503b0f3e415293bfe461848b9df6c5f4206a4e2b593ce89cf96d1172c59ab9396e6619504e0112a0cd53dcfbd74e8b63dfbc552d4aaa08da0cd14cd7eafa462591b800b6b78e6b50c206f4203c866b158cd22ebc312f", 0x61, 0x0, 0x0, 0x1}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x6, 0x8, r0, &(0x7f00000005c0)="feb1a716c04ab705f3a5fdfe78e875b051a1eb5da100389d307ca8a9dba87e7ddd850987c9a1d951dbb1224d07be0c4ee44f88759344ecc702c4570785deb68aefebd638873c319557167e7672babc438ab615636b0a9f5931d5c5ce90c4f67918e138322355e5afe957f29c746c6fde8ea60556edad99c1fac0965deb12f303d659dd8443a60591a375a331c5b30d8b8d79a6681344746b25a9f350518c90a1cd0f4c01224aa242774e4288c6b29e266e0bc2b358001c25462671ac847508f7fd2676be0d915c48ed566e5d8743d2c167b933987defb533809cbed260d31349cc7f659813f1bd0d6f01", 0xea, 0x4, 0x0, 0x3}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x5, 0x0, r0, &(0x7f00000006c0)="fc37e85c843e79a6ffc7e301b786b7e045305f2f99202a5fa15b8a19c705a1f9c3e01ffecd6ff747418b45cc2d9c4bf9dee67b9bc5d9d24b85ca7a44dab871d8dbc69e233eeb577ecb3d4044136540a157fd6b7747069bed5622f6d1290e925784322e7ffeccc5e0ca9c4ffd1ab2741c73d7a5a389ce70b39a6af482d5bf556f6b0e7c1869dc834de6a2a5e03eaff803bf665789d44fc2b1dc330a2ffd4ac661ba8e0976e15514fbb9a95ea07b1808779a43842fd04ecde2c67e4b8abc728fb38739e49791ab23b3bc0972a1930ed1a6fb862c3cd316b80c3ab59755f37d97f7d9a281afeb2b1ee1", 0xe8, 0x3, 0x0, 0x3}]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x3, 0x0, 0x3f, 0x5d, 0x0, 0x9, 0x80000, 0x8, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80000009, 0x4, @perf_config_ext={0x3, 0xfc0000000}, 0x12198, 0x1000, 0x0, 0x0, 0x8, 0x2, 0x9, 0x0, 0x9, 0x0, 0x5}, r3, 0x2, 0xffffffffffffffff, 0x3) getpid() lchown(&(0x7f0000000140)='./file0\x00', 0xee01, 0xee01) 11:48:22 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSTI(r2, 0x5412, &(0x7f00000000c0)=0x11) io_submit(0x0, 0x5, &(0x7f0000000480)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x3, 0x9, r0, &(0x7f0000000180)="799f2fbd19cdb4078cad1921c0329c09ec57535ea52c20d7ddf70ffb1eea83433373911b4f81dab308fdf2495f101055e55fa4c3f8ef3a6b920d7ebc550f1a9a06f6e564b80b65357588a6ea", 0x4c, 0xfff}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xb, 0x78, r1, &(0x7f0000000240)="74027e7c08583aac9b80a839c3471a", 0xf, 0x5, 0x0, 0x3}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x3, 0x4, r2, &(0x7f0000000340)="c22589004fdac6659a141a503b0f3e415293bfe461848b9df6c5f4206a4e2b593ce89cf96d1172c59ab9396e6619504e0112a0cd53dcfbd74e8b63dfbc552d4aaa08da0cd14cd7eafa462591b800b6b78e6b50c206f4203c866b158cd22ebc312f", 0x61, 0x0, 0x0, 0x1}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x6, 0x8, r0, &(0x7f00000005c0)="feb1a716c04ab705f3a5fdfe78e875b051a1eb5da100389d307ca8a9dba87e7ddd850987c9a1d951dbb1224d07be0c4ee44f88759344ecc702c4570785deb68aefebd638873c319557167e7672babc438ab615636b0a9f5931d5c5ce90c4f67918e138322355e5afe957f29c746c6fde8ea60556edad99c1fac0965deb12f303d659dd8443a60591a375a331c5b30d8b8d79a6681344746b25a9f350518c90a1cd0f4c01224aa242774e4288c6b29e266e0bc2b358001c25462671ac847508f7fd2676be0d915c48ed566e5d8743d2c167b933987defb533809cbed260d31349cc7f659813f1bd0d6f01", 0xea, 0x4, 0x0, 0x3}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x5, 0x0, r0, &(0x7f00000006c0)="fc37e85c843e79a6ffc7e301b786b7e045305f2f99202a5fa15b8a19c705a1f9c3e01ffecd6ff747418b45cc2d9c4bf9dee67b9bc5d9d24b85ca7a44dab871d8dbc69e233eeb577ecb3d4044136540a157fd6b7747069bed5622f6d1290e925784322e7ffeccc5e0ca9c4ffd1ab2741c73d7a5a389ce70b39a6af482d5bf556f6b0e7c1869dc834de6a2a5e03eaff803bf665789d44fc2b1dc330a2ffd4ac661ba8e0976e15514fbb9a95ea07b1808779a43842fd04ecde2c67e4b8abc728fb38739e49791ab23b3bc0972a1930ed1a6fb862c3cd316b80c3ab59755f37d97f7d9a281afeb2b1ee1", 0xe8, 0x3, 0x0, 0x3}]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x3, 0x0, 0x3f, 0x5d, 0x0, 0x9, 0x80000, 0x8, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80000009, 0x4, @perf_config_ext={0x3, 0xfc0000000}, 0x12198, 0x1000, 0x0, 0x0, 0x8, 0x2, 0x9, 0x0, 0x9, 0x0, 0x5}, r3, 0x2, 0xffffffffffffffff, 0x3) getpid() lchown(&(0x7f0000000140)='./file0\x00', 0xee01, 0xee01) 11:48:22 executing program 1: rseq(&(0x7f0000000340), 0x20, 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000900)={'wpan3\x00'}) 11:48:22 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSTI(r2, 0x5412, &(0x7f00000000c0)=0x11) io_submit(0x0, 0x5, &(0x7f0000000480)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x3, 0x9, r0, &(0x7f0000000180)="799f2fbd19cdb4078cad1921c0329c09ec57535ea52c20d7ddf70ffb1eea83433373911b4f81dab308fdf2495f101055e55fa4c3f8ef3a6b920d7ebc550f1a9a06f6e564b80b65357588a6ea", 0x4c, 0xfff}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xb, 0x78, r1, &(0x7f0000000240)="74027e7c08583aac9b80a839c3471a", 0xf, 0x5, 0x0, 0x3}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x3, 0x4, r2, &(0x7f0000000340)="c22589004fdac6659a141a503b0f3e415293bfe461848b9df6c5f4206a4e2b593ce89cf96d1172c59ab9396e6619504e0112a0cd53dcfbd74e8b63dfbc552d4aaa08da0cd14cd7eafa462591b800b6b78e6b50c206f4203c866b158cd22ebc312f", 0x61, 0x0, 0x0, 0x1}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x6, 0x8, r0, &(0x7f00000005c0)="feb1a716c04ab705f3a5fdfe78e875b051a1eb5da100389d307ca8a9dba87e7ddd850987c9a1d951dbb1224d07be0c4ee44f88759344ecc702c4570785deb68aefebd638873c319557167e7672babc438ab615636b0a9f5931d5c5ce90c4f67918e138322355e5afe957f29c746c6fde8ea60556edad99c1fac0965deb12f303d659dd8443a60591a375a331c5b30d8b8d79a6681344746b25a9f350518c90a1cd0f4c01224aa242774e4288c6b29e266e0bc2b358001c25462671ac847508f7fd2676be0d915c48ed566e5d8743d2c167b933987defb533809cbed260d31349cc7f659813f1bd0d6f01", 0xea, 0x4, 0x0, 0x3}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x5, 0x0, r0, &(0x7f00000006c0)="fc37e85c843e79a6ffc7e301b786b7e045305f2f99202a5fa15b8a19c705a1f9c3e01ffecd6ff747418b45cc2d9c4bf9dee67b9bc5d9d24b85ca7a44dab871d8dbc69e233eeb577ecb3d4044136540a157fd6b7747069bed5622f6d1290e925784322e7ffeccc5e0ca9c4ffd1ab2741c73d7a5a389ce70b39a6af482d5bf556f6b0e7c1869dc834de6a2a5e03eaff803bf665789d44fc2b1dc330a2ffd4ac661ba8e0976e15514fbb9a95ea07b1808779a43842fd04ecde2c67e4b8abc728fb38739e49791ab23b3bc0972a1930ed1a6fb862c3cd316b80c3ab59755f37d97f7d9a281afeb2b1ee1", 0xe8, 0x3, 0x0, 0x3}]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x3, 0x0, 0x3f, 0x5d, 0x0, 0x9, 0x80000, 0x8, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80000009, 0x4, @perf_config_ext={0x3, 0xfc0000000}, 0x12198, 0x1000, 0x0, 0x0, 0x8, 0x2, 0x9, 0x0, 0x9, 0x0, 0x5}, r3, 0x2, 0xffffffffffffffff, 0x3) getpid() lchown(&(0x7f0000000140)='./file0\x00', 0xee01, 0xee01) 11:48:22 executing program 7: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366cef82e00080820000200008000f80000200040000000000000000000010000000000000002000000010006000000000000000000000000008000"/96, 0x60}, {&(0x7f0000010100)='RRaA\x00'/32, 0x20, 0x800}, {&(0x7f0000010200)="00000000727241610500000007000000000000000000000000000000000055aa", 0x20, 0x9e0}, {&(0x7f0000010300)="601c6d6b646f7366cef82e00080820000200008000f80000200040000000000000000000010000000000000002000000010006000000000000000000000000008000"/96, 0x60, 0x3000}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0fffffff0fffffff0fffffff0fffffff0fffffff0f", 0x20, 0x10000}, {&(0x7f0000010500)="f8ffff0fffffff0fffffff0fffffff0fffffff0fffffff0fffffff0fffffff0f", 0x20, 0x10800}, {&(0x7f0000010600)="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", 0x120, 0x11000}, {&(0x7f0000010800)="2e2020202020202020202010007ae770325132510000e77032510300000000002e2e20202020202020202010007ae770325132510000e770325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c453020202020202020007ae770325132510000e770325104001a040000", 0x80, 0x15000}, {&(0x7f0000010900)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x19000}, {&(0x7f0000010e00)='syzkallers\x00'/32, 0x20, 0x1d000}, {&(0x7f0000010f00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x25000}], 0x0, &(0x7f0000011000)) 11:48:22 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/locks\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) fcntl$setlease(r1, 0x400, 0x2) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f00000005c0)='net/protocols\x00') prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000700)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000006c0)}, 0x68) sendfile(0xffffffffffffffff, r0, 0x0, 0xd7) perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x3, 0x7, 0x3f, 0xcf, 0x0, 0x12000, 0x10009, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7f, 0x1, @perf_config_ext={0x1}, 0x8000, 0x9, 0x7, 0x7, 0x8000, 0x6, 0x6, 0x0, 0x7, 0x0, 0xadc}, 0x0, 0x7, 0xffffffffffffffff, 0x8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000780)=ANY=[@ANYBLOB="5e86055208c76b659d48ec2b9476260f12789c1567866fb1bb1c937a789ee55575adc7a85afd4f3795ca060d900f96d1d928d9a777966836dc6fed05c17ca9d5df00cf408eacff4be721287e051772e0df31fcb79599e7ffb3d0f1b611500325e43144cb", @ANYRES16=r2, @ANYBLOB="010600000000000000002a00000008002f0000000000080002001d9a84996501", @ANYRES32, @ANYBLOB], 0x24}}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/90, 0x5a}, {&(0x7f0000000400)=""/208, 0xd0}], 0x2, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}, 0x3) read$hiddev(0xffffffffffffffff, &(0x7f0000002b80)=""/251, 0xfb) [ 119.944102] loop7: detected capacity change from 0 to 592 [ 119.962589] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 11:48:22 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/locks\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) fcntl$setlease(r1, 0x400, 0x2) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f00000005c0)='net/protocols\x00') prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000700)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000006c0)}, 0x68) sendfile(0xffffffffffffffff, r0, 0x0, 0xd7) perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x3, 0x7, 0x3f, 0xcf, 0x0, 0x12000, 0x10009, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7f, 0x1, @perf_config_ext={0x1}, 0x8000, 0x9, 0x7, 0x7, 0x8000, 0x6, 0x6, 0x0, 0x7, 0x0, 0xadc}, 0x0, 0x7, 0xffffffffffffffff, 0x8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000780)=ANY=[@ANYBLOB="5e86055208c76b659d48ec2b9476260f12789c1567866fb1bb1c937a789ee55575adc7a85afd4f3795ca060d900f96d1d928d9a777966836dc6fed05c17ca9d5df00cf408eacff4be721287e051772e0df31fcb79599e7ffb3d0f1b611500325e43144cb", @ANYRES16=r2, @ANYBLOB="010600000000000000002a00000008002f0000000000080002001d9a84996501", @ANYRES32, @ANYBLOB], 0x24}}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/90, 0x5a}, {&(0x7f0000000400)=""/208, 0xd0}], 0x2, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}, 0x3) read$hiddev(0xffffffffffffffff, &(0x7f0000002b80)=""/251, 0xfb) 11:48:22 executing program 7: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366cef82e00080820000200008000f80000200040000000000000000000010000000000000002000000010006000000000000000000000000008000"/96, 0x60}, {&(0x7f0000010100)='RRaA\x00'/32, 0x20, 0x800}, {&(0x7f0000010200)="00000000727241610500000007000000000000000000000000000000000055aa", 0x20, 0x9e0}, {&(0x7f0000010300)="601c6d6b646f7366cef82e00080820000200008000f80000200040000000000000000000010000000000000002000000010006000000000000000000000000008000"/96, 0x60, 0x3000}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0fffffff0fffffff0fffffff0fffffff0fffffff0f", 0x20, 0x10000}, {&(0x7f0000010500)="f8ffff0fffffff0fffffff0fffffff0fffffff0fffffff0fffffff0fffffff0f", 0x20, 0x10800}, {&(0x7f0000010600)="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", 0x120, 0x11000}, {&(0x7f0000010800)="2e2020202020202020202010007ae770325132510000e77032510300000000002e2e20202020202020202010007ae770325132510000e770325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c453020202020202020007ae770325132510000e770325104001a040000", 0x80, 0x15000}, {&(0x7f0000010900)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x19000}, {&(0x7f0000010e00)='syzkallers\x00'/32, 0x20, 0x1d000}, {&(0x7f0000010f00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x25000}], 0x0, &(0x7f0000011000)) 11:48:22 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSTI(r2, 0x5412, &(0x7f00000000c0)=0x11) io_submit(0x0, 0x5, &(0x7f0000000480)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x3, 0x9, r0, &(0x7f0000000180)="799f2fbd19cdb4078cad1921c0329c09ec57535ea52c20d7ddf70ffb1eea83433373911b4f81dab308fdf2495f101055e55fa4c3f8ef3a6b920d7ebc550f1a9a06f6e564b80b65357588a6ea", 0x4c, 0xfff}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xb, 0x78, r1, &(0x7f0000000240)="74027e7c08583aac9b80a839c3471a", 0xf, 0x5, 0x0, 0x3}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x3, 0x4, r2, &(0x7f0000000340)="c22589004fdac6659a141a503b0f3e415293bfe461848b9df6c5f4206a4e2b593ce89cf96d1172c59ab9396e6619504e0112a0cd53dcfbd74e8b63dfbc552d4aaa08da0cd14cd7eafa462591b800b6b78e6b50c206f4203c866b158cd22ebc312f", 0x61, 0x0, 0x0, 0x1}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x6, 0x8, r0, &(0x7f00000005c0)="feb1a716c04ab705f3a5fdfe78e875b051a1eb5da100389d307ca8a9dba87e7ddd850987c9a1d951dbb1224d07be0c4ee44f88759344ecc702c4570785deb68aefebd638873c319557167e7672babc438ab615636b0a9f5931d5c5ce90c4f67918e138322355e5afe957f29c746c6fde8ea60556edad99c1fac0965deb12f303d659dd8443a60591a375a331c5b30d8b8d79a6681344746b25a9f350518c90a1cd0f4c01224aa242774e4288c6b29e266e0bc2b358001c25462671ac847508f7fd2676be0d915c48ed566e5d8743d2c167b933987defb533809cbed260d31349cc7f659813f1bd0d6f01", 0xea, 0x4, 0x0, 0x3}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x5, 0x0, r0, &(0x7f00000006c0)="fc37e85c843e79a6ffc7e301b786b7e045305f2f99202a5fa15b8a19c705a1f9c3e01ffecd6ff747418b45cc2d9c4bf9dee67b9bc5d9d24b85ca7a44dab871d8dbc69e233eeb577ecb3d4044136540a157fd6b7747069bed5622f6d1290e925784322e7ffeccc5e0ca9c4ffd1ab2741c73d7a5a389ce70b39a6af482d5bf556f6b0e7c1869dc834de6a2a5e03eaff803bf665789d44fc2b1dc330a2ffd4ac661ba8e0976e15514fbb9a95ea07b1808779a43842fd04ecde2c67e4b8abc728fb38739e49791ab23b3bc0972a1930ed1a6fb862c3cd316b80c3ab59755f37d97f7d9a281afeb2b1ee1", 0xe8, 0x3, 0x0, 0x3}]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x3, 0x0, 0x3f, 0x5d, 0x0, 0x9, 0x80000, 0x8, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80000009, 0x4, @perf_config_ext={0x3, 0xfc0000000}, 0x12198, 0x1000, 0x0, 0x0, 0x8, 0x2, 0x9, 0x0, 0x9, 0x0, 0x5}, r3, 0x2, 0xffffffffffffffff, 0x3) getpid() lchown(&(0x7f0000000140)='./file0\x00', 0xee01, 0xee01) 11:48:22 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSTI(r2, 0x5412, &(0x7f00000000c0)=0x11) io_submit(0x0, 0x5, &(0x7f0000000480)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x3, 0x9, r0, &(0x7f0000000180)="799f2fbd19cdb4078cad1921c0329c09ec57535ea52c20d7ddf70ffb1eea83433373911b4f81dab308fdf2495f101055e55fa4c3f8ef3a6b920d7ebc550f1a9a06f6e564b80b65357588a6ea", 0x4c, 0xfff}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xb, 0x78, r1, &(0x7f0000000240)="74027e7c08583aac9b80a839c3471a", 0xf, 0x5, 0x0, 0x3}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x3, 0x4, r2, &(0x7f0000000340)="c22589004fdac6659a141a503b0f3e415293bfe461848b9df6c5f4206a4e2b593ce89cf96d1172c59ab9396e6619504e0112a0cd53dcfbd74e8b63dfbc552d4aaa08da0cd14cd7eafa462591b800b6b78e6b50c206f4203c866b158cd22ebc312f", 0x61, 0x0, 0x0, 0x1}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x6, 0x8, r0, &(0x7f00000005c0)="feb1a716c04ab705f3a5fdfe78e875b051a1eb5da100389d307ca8a9dba87e7ddd850987c9a1d951dbb1224d07be0c4ee44f88759344ecc702c4570785deb68aefebd638873c319557167e7672babc438ab615636b0a9f5931d5c5ce90c4f67918e138322355e5afe957f29c746c6fde8ea60556edad99c1fac0965deb12f303d659dd8443a60591a375a331c5b30d8b8d79a6681344746b25a9f350518c90a1cd0f4c01224aa242774e4288c6b29e266e0bc2b358001c25462671ac847508f7fd2676be0d915c48ed566e5d8743d2c167b933987defb533809cbed260d31349cc7f659813f1bd0d6f01", 0xea, 0x4, 0x0, 0x3}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x5, 0x0, r0, &(0x7f00000006c0)="fc37e85c843e79a6ffc7e301b786b7e045305f2f99202a5fa15b8a19c705a1f9c3e01ffecd6ff747418b45cc2d9c4bf9dee67b9bc5d9d24b85ca7a44dab871d8dbc69e233eeb577ecb3d4044136540a157fd6b7747069bed5622f6d1290e925784322e7ffeccc5e0ca9c4ffd1ab2741c73d7a5a389ce70b39a6af482d5bf556f6b0e7c1869dc834de6a2a5e03eaff803bf665789d44fc2b1dc330a2ffd4ac661ba8e0976e15514fbb9a95ea07b1808779a43842fd04ecde2c67e4b8abc728fb38739e49791ab23b3bc0972a1930ed1a6fb862c3cd316b80c3ab59755f37d97f7d9a281afeb2b1ee1", 0xe8, 0x3, 0x0, 0x3}]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x3, 0x0, 0x3f, 0x5d, 0x0, 0x9, 0x80000, 0x8, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80000009, 0x4, @perf_config_ext={0x3, 0xfc0000000}, 0x12198, 0x1000, 0x0, 0x0, 0x8, 0x2, 0x9, 0x0, 0x9, 0x0, 0x5}, r3, 0x2, 0xffffffffffffffff, 0x3) getpid() lchown(&(0x7f0000000140)='./file0\x00', 0xee01, 0xee01) 11:48:22 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSTI(r2, 0x5412, &(0x7f00000000c0)=0x11) io_submit(0x0, 0x5, &(0x7f0000000480)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x3, 0x9, r0, &(0x7f0000000180)="799f2fbd19cdb4078cad1921c0329c09ec57535ea52c20d7ddf70ffb1eea83433373911b4f81dab308fdf2495f101055e55fa4c3f8ef3a6b920d7ebc550f1a9a06f6e564b80b65357588a6ea", 0x4c, 0xfff}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xb, 0x78, r1, &(0x7f0000000240)="74027e7c08583aac9b80a839c3471a", 0xf, 0x5, 0x0, 0x3}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x3, 0x4, r2, &(0x7f0000000340)="c22589004fdac6659a141a503b0f3e415293bfe461848b9df6c5f4206a4e2b593ce89cf96d1172c59ab9396e6619504e0112a0cd53dcfbd74e8b63dfbc552d4aaa08da0cd14cd7eafa462591b800b6b78e6b50c206f4203c866b158cd22ebc312f", 0x61, 0x0, 0x0, 0x1}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x6, 0x8, r0, &(0x7f00000005c0)="feb1a716c04ab705f3a5fdfe78e875b051a1eb5da100389d307ca8a9dba87e7ddd850987c9a1d951dbb1224d07be0c4ee44f88759344ecc702c4570785deb68aefebd638873c319557167e7672babc438ab615636b0a9f5931d5c5ce90c4f67918e138322355e5afe957f29c746c6fde8ea60556edad99c1fac0965deb12f303d659dd8443a60591a375a331c5b30d8b8d79a6681344746b25a9f350518c90a1cd0f4c01224aa242774e4288c6b29e266e0bc2b358001c25462671ac847508f7fd2676be0d915c48ed566e5d8743d2c167b933987defb533809cbed260d31349cc7f659813f1bd0d6f01", 0xea, 0x4, 0x0, 0x3}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x5, 0x0, r0, &(0x7f00000006c0)="fc37e85c843e79a6ffc7e301b786b7e045305f2f99202a5fa15b8a19c705a1f9c3e01ffecd6ff747418b45cc2d9c4bf9dee67b9bc5d9d24b85ca7a44dab871d8dbc69e233eeb577ecb3d4044136540a157fd6b7747069bed5622f6d1290e925784322e7ffeccc5e0ca9c4ffd1ab2741c73d7a5a389ce70b39a6af482d5bf556f6b0e7c1869dc834de6a2a5e03eaff803bf665789d44fc2b1dc330a2ffd4ac661ba8e0976e15514fbb9a95ea07b1808779a43842fd04ecde2c67e4b8abc728fb38739e49791ab23b3bc0972a1930ed1a6fb862c3cd316b80c3ab59755f37d97f7d9a281afeb2b1ee1", 0xe8, 0x3, 0x0, 0x3}]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x3, 0x0, 0x3f, 0x5d, 0x0, 0x9, 0x80000, 0x8, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80000009, 0x4, @perf_config_ext={0x3, 0xfc0000000}, 0x12198, 0x1000, 0x0, 0x0, 0x8, 0x2, 0x9, 0x0, 0x9, 0x0, 0x5}, r3, 0x2, 0xffffffffffffffff, 0x3) getpid() lchown(&(0x7f0000000140)='./file0\x00', 0xee01, 0xee01) 11:48:22 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSTI(r2, 0x5412, &(0x7f00000000c0)=0x11) [ 120.114252] loop7: detected capacity change from 0 to 592 io_submit(0x0, 0x5, &(0x7f0000000480)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x3, 0x9, r0, &(0x7f0000000180)="799f2fbd19cdb4078cad1921c0329c09ec57535ea52c20d7ddf70ffb1eea83433373911b4f81dab308fdf2495f101055e55fa4c3f8ef3a6b920d7ebc550f1a9a06f6e564b80b65357588a6ea", 0x4c, 0xfff}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xb, 0x78, r1, &(0x7f0000000240)="74027e7c08583aac9b80a839c3471a", 0xf, 0x5, 0x0, 0x3}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x3, 0x4, r2, &(0x7f0000000340)="c22589004fdac6659a141a503b0f3e415293bfe461848b9df6c5f4206a4e2b593ce89cf96d1172c59ab9396e6619504e0112a0cd53dcfbd74e8b63dfbc552d4aaa08da0cd14cd7eafa462591b800b6b78e6b50c206f4203c866b158cd22ebc312f", 0x61, 0x0, 0x0, 0x1}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x6, 0x8, r0, &(0x7f00000005c0)="feb1a716c04ab705f3a5fdfe78e875b051a1eb5da100389d307ca8a9dba87e7ddd850987c9a1d951dbb1224d07be0c4ee44f88759344ecc702c4570785deb68aefebd638873c319557167e7672babc438ab615636b0a9f5931d5c5ce90c4f67918e138322355e5afe957f29c746c6fde8ea60556edad99c1fac0965deb12f303d659dd8443a60591a375a331c5b30d8b8d79a6681344746b25a9f350518c90a1cd0f4c01224aa242774e4288c6b29e266e0bc2b358001c25462671ac847508f7fd2676be0d915c48ed566e5d8743d2c167b933987defb533809cbed260d31349cc7f659813f1bd0d6f01", 0xea, 0x4, 0x0, 0x3}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x5, 0x0, r0, &(0x7f00000006c0)="fc37e85c843e79a6ffc7e301b786b7e045305f2f99202a5fa15b8a19c705a1f9c3e01ffecd6ff747418b45cc2d9c4bf9dee67b9bc5d9d24b85ca7a44dab871d8dbc69e233eeb577ecb3d4044136540a157fd6b7747069bed5622f6d1290e925784322e7ffeccc5e0ca9c4ffd1ab2741c73d7a5a389ce70b39a6af482d5bf556f6b0e7c1869dc834de6a2a5e03eaff803bf665789d44fc2b1dc330a2ffd4ac661ba8e0976e15514fbb9a95ea07b1808779a43842fd04ecde2c67e4b8abc728fb38739e49791ab23b3bc0972a1930ed1a6fb862c3cd316b80c3ab59755f37d97f7d9a281afeb2b1ee1", 0xe8, 0x3, 0x0, 0x3}]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x3, 0x0, 0x3f, 0x5d, 0x0, 0x9, 0x80000, 0x8, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80000009, 0x4, @perf_config_ext={0x3, 0xfc0000000}, 0x12198, 0x1000, 0x0, 0x0, 0x8, 0x2, 0x9, 0x0, 0x9, 0x0, 0x5}, r3, 0x2, 0xffffffffffffffff, 0x3) getpid() lchown(&(0x7f0000000140)='./file0\x00', 0xee01, 0xee01) 11:48:22 executing program 1: rseq(&(0x7f0000000340), 0x20, 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000900)={'wpan3\x00'}) 11:48:22 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/locks\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) fcntl$setlease(r1, 0x400, 0x2) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f00000005c0)='net/protocols\x00') prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000700)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000006c0)}, 0x68) sendfile(0xffffffffffffffff, r0, 0x0, 0xd7) perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x3, 0x7, 0x3f, 0xcf, 0x0, 0x12000, 0x10009, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7f, 0x1, @perf_config_ext={0x1}, 0x8000, 0x9, 0x7, 0x7, 0x8000, 0x6, 0x6, 0x0, 0x7, 0x0, 0xadc}, 0x0, 0x7, 0xffffffffffffffff, 0x8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000780)=ANY=[@ANYBLOB="5e86055208c76b659d48ec2b9476260f12789c1567866fb1bb1c937a789ee55575adc7a85afd4f3795ca060d900f96d1d928d9a777966836dc6fed05c17ca9d5df00cf408eacff4be721287e051772e0df31fcb79599e7ffb3d0f1b611500325e43144cb", @ANYRES16=r2, @ANYBLOB="010600000000000000002a00000008002f0000000000080002001d9a84996501", @ANYRES32, @ANYBLOB], 0x24}}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/90, 0x5a}, {&(0x7f0000000400)=""/208, 0xd0}], 0x2, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}, 0x3) read$hiddev(0xffffffffffffffff, &(0x7f0000002b80)=""/251, 0xfb) 11:48:22 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSTI(r2, 0x5412, &(0x7f00000000c0)=0x11) io_submit(0x0, 0x5, &(0x7f0000000480)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x3, 0x9, r0, &(0x7f0000000180)="799f2fbd19cdb4078cad1921c0329c09ec57535ea52c20d7ddf70ffb1eea83433373911b4f81dab308fdf2495f101055e55fa4c3f8ef3a6b920d7ebc550f1a9a06f6e564b80b65357588a6ea", 0x4c, 0xfff}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xb, 0x78, r1, &(0x7f0000000240)="74027e7c08583aac9b80a839c3471a", 0xf, 0x5, 0x0, 0x3}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x3, 0x4, r2, &(0x7f0000000340)="c22589004fdac6659a141a503b0f3e415293bfe461848b9df6c5f4206a4e2b593ce89cf96d1172c59ab9396e6619504e0112a0cd53dcfbd74e8b63dfbc552d4aaa08da0cd14cd7eafa462591b800b6b78e6b50c206f4203c866b158cd22ebc312f", 0x61, 0x0, 0x0, 0x1}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x6, 0x8, r0, &(0x7f00000005c0)="feb1a716c04ab705f3a5fdfe78e875b051a1eb5da100389d307ca8a9dba87e7ddd850987c9a1d951dbb1224d07be0c4ee44f88759344ecc702c4570785deb68aefebd638873c319557167e7672babc438ab615636b0a9f5931d5c5ce90c4f67918e138322355e5afe957f29c746c6fde8ea60556edad99c1fac0965deb12f303d659dd8443a60591a375a331c5b30d8b8d79a6681344746b25a9f350518c90a1cd0f4c01224aa242774e4288c6b29e266e0bc2b358001c25462671ac847508f7fd2676be0d915c48ed566e5d8743d2c167b933987defb533809cbed260d31349cc7f659813f1bd0d6f01", 0xea, 0x4, 0x0, 0x3}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x5, 0x0, r0, &(0x7f00000006c0)="fc37e85c843e79a6ffc7e301b786b7e045305f2f99202a5fa15b8a19c705a1f9c3e01ffecd6ff747418b45cc2d9c4bf9dee67b9bc5d9d24b85ca7a44dab871d8dbc69e233eeb577ecb3d4044136540a157fd6b7747069bed5622f6d1290e925784322e7ffeccc5e0ca9c4ffd1ab2741c73d7a5a389ce70b39a6af482d5bf556f6b0e7c1869dc834de6a2a5e03eaff803bf665789d44fc2b1dc330a2ffd4ac661ba8e0976e15514fbb9a95ea07b1808779a43842fd04ecde2c67e4b8abc728fb38739e49791ab23b3bc0972a1930ed1a6fb862c3cd316b80c3ab59755f37d97f7d9a281afeb2b1ee1", 0xe8, 0x3, 0x0, 0x3}]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x3, 0x0, 0x3f, 0x5d, 0x0, 0x9, 0x80000, 0x8, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80000009, 0x4, @perf_config_ext={0x3, 0xfc0000000}, 0x12198, 0x1000, 0x0, 0x0, 0x8, 0x2, 0x9, 0x0, 0x9, 0x0, 0x5}, r3, 0x2, 0xffffffffffffffff, 0x3) getpid() lchown(&(0x7f0000000140)='./file0\x00', 0xee01, 0xee01) 11:48:22 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSTI(r2, 0x5412, &(0x7f00000000c0)=0x11) io_submit(0x0, 0x5, &(0x7f0000000480)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x3, 0x9, r0, &(0x7f0000000180)="799f2fbd19cdb4078cad1921c0329c09ec57535ea52c20d7ddf70ffb1eea83433373911b4f81dab308fdf2495f101055e55fa4c3f8ef3a6b920d7ebc550f1a9a06f6e564b80b65357588a6ea", 0x4c, 0xfff}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xb, 0x78, r1, &(0x7f0000000240)="74027e7c08583aac9b80a839c3471a", 0xf, 0x5, 0x0, 0x3}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x3, 0x4, r2, &(0x7f0000000340)="c22589004fdac6659a141a503b0f3e415293bfe461848b9df6c5f4206a4e2b593ce89cf96d1172c59ab9396e6619504e0112a0cd53dcfbd74e8b63dfbc552d4aaa08da0cd14cd7eafa462591b800b6b78e6b50c206f4203c866b158cd22ebc312f", 0x61, 0x0, 0x0, 0x1}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x6, 0x8, r0, &(0x7f00000005c0)="feb1a716c04ab705f3a5fdfe78e875b051a1eb5da100389d307ca8a9dba87e7ddd850987c9a1d951dbb1224d07be0c4ee44f88759344ecc702c4570785deb68aefebd638873c319557167e7672babc438ab615636b0a9f5931d5c5ce90c4f67918e138322355e5afe957f29c746c6fde8ea60556edad99c1fac0965deb12f303d659dd8443a60591a375a331c5b30d8b8d79a6681344746b25a9f350518c90a1cd0f4c01224aa242774e4288c6b29e266e0bc2b358001c25462671ac847508f7fd2676be0d915c48ed566e5d8743d2c167b933987defb533809cbed260d31349cc7f659813f1bd0d6f01", 0xea, 0x4, 0x0, 0x3}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x5, 0x0, r0, &(0x7f00000006c0)="fc37e85c843e79a6ffc7e301b786b7e045305f2f99202a5fa15b8a19c705a1f9c3e01ffecd6ff747418b45cc2d9c4bf9dee67b9bc5d9d24b85ca7a44dab871d8dbc69e233eeb577ecb3d4044136540a157fd6b7747069bed5622f6d1290e925784322e7ffeccc5e0ca9c4ffd1ab2741c73d7a5a389ce70b39a6af482d5bf556f6b0e7c1869dc834de6a2a5e03eaff803bf665789d44fc2b1dc330a2ffd4ac661ba8e0976e15514fbb9a95ea07b1808779a43842fd04ecde2c67e4b8abc728fb38739e49791ab23b3bc0972a1930ed1a6fb862c3cd316b80c3ab59755f37d97f7d9a281afeb2b1ee1", 0xe8, 0x3, 0x0, 0x3}]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x3, 0x0, 0x3f, 0x5d, 0x0, 0x9, 0x80000, 0x8, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80000009, 0x4, @perf_config_ext={0x3, 0xfc0000000}, 0x12198, 0x1000, 0x0, 0x0, 0x8, 0x2, 0x9, 0x0, 0x9, 0x0, 0x5}, r3, 0x2, 0xffffffffffffffff, 0x3) getpid() lchown(&(0x7f0000000140)='./file0\x00', 0xee01, 0xee01) 11:48:22 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSTI(r2, 0x5412, &(0x7f00000000c0)=0x11) io_submit(0x0, 0x5, &(0x7f0000000480)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x3, 0x9, r0, &(0x7f0000000180)="799f2fbd19cdb4078cad1921c0329c09ec57535ea52c20d7ddf70ffb1eea83433373911b4f81dab308fdf2495f101055e55fa4c3f8ef3a6b920d7ebc550f1a9a06f6e564b80b65357588a6ea", 0x4c, 0xfff}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xb, 0x78, r1, &(0x7f0000000240)="74027e7c08583aac9b80a839c3471a", 0xf, 0x5, 0x0, 0x3}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x3, 0x4, r2, &(0x7f0000000340)="c22589004fdac6659a141a503b0f3e415293bfe461848b9df6c5f4206a4e2b593ce89cf96d1172c59ab9396e6619504e0112a0cd53dcfbd74e8b63dfbc552d4aaa08da0cd14cd7eafa462591b800b6b78e6b50c206f4203c866b158cd22ebc312f", 0x61, 0x0, 0x0, 0x1}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x6, 0x8, r0, &(0x7f00000005c0)="feb1a716c04ab705f3a5fdfe78e875b051a1eb5da100389d307ca8a9dba87e7ddd850987c9a1d951dbb1224d07be0c4ee44f88759344ecc702c4570785deb68aefebd638873c319557167e7672babc438ab615636b0a9f5931d5c5ce90c4f67918e138322355e5afe957f29c746c6fde8ea60556edad99c1fac0965deb12f303d659dd8443a60591a375a331c5b30d8b8d79a6681344746b25a9f350518c90a1cd0f4c01224aa242774e4288c6b29e266e0bc2b358001c25462671ac847508f7fd2676be0d915c48ed566e5d8743d2c167b933987defb533809cbed260d31349cc7f659813f1bd0d6f01", 0xea, 0x4, 0x0, 0x3}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x5, 0x0, r0, &(0x7f00000006c0)="fc37e85c843e79a6ffc7e301b786b7e045305f2f99202a5fa15b8a19c705a1f9c3e01ffecd6ff747418b45cc2d9c4bf9dee67b9bc5d9d24b85ca7a44dab871d8dbc69e233eeb577ecb3d4044136540a157fd6b7747069bed5622f6d1290e925784322e7ffeccc5e0ca9c4ffd1ab2741c73d7a5a389ce70b39a6af482d5bf556f6b0e7c1869dc834de6a2a5e03eaff803bf665789d44fc2b1dc330a2ffd4ac661ba8e0976e15514fbb9a95ea07b1808779a43842fd04ecde2c67e4b8abc728fb38739e49791ab23b3bc0972a1930ed1a6fb862c3cd316b80c3ab59755f37d97f7d9a281afeb2b1ee1", 0xe8, 0x3, 0x0, 0x3}]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x3, 0x0, 0x3f, 0x5d, 0x0, 0x9, 0x80000, 0x8, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80000009, 0x4, @perf_config_ext={0x3, 0xfc0000000}, 0x12198, 0x1000, 0x0, 0x0, 0x8, 0x2, 0x9, 0x0, 0x9, 0x0, 0x5}, r3, 0x2, 0xffffffffffffffff, 0x3) getpid() lchown(&(0x7f0000000140)='./file0\x00', 0xee01, 0xee01) 11:48:22 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSTI(r2, 0x5412, &(0x7f00000000c0)=0x11) io_submit(0x0, 0x5, &(0x7f0000000480)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x3, 0x9, r0, &(0x7f0000000180)="799f2fbd19cdb4078cad1921c0329c09ec57535ea52c20d7ddf70ffb1eea83433373911b4f81dab308fdf2495f101055e55fa4c3f8ef3a6b920d7ebc550f1a9a06f6e564b80b65357588a6ea", 0x4c, 0xfff}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xb, 0x78, r1, &(0x7f0000000240)="74027e7c08583aac9b80a839c3471a", 0xf, 0x5, 0x0, 0x3}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x3, 0x4, r2, &(0x7f0000000340)="c22589004fdac6659a141a503b0f3e415293bfe461848b9df6c5f4206a4e2b593ce89cf96d1172c59ab9396e6619504e0112a0cd53dcfbd74e8b63dfbc552d4aaa08da0cd14cd7eafa462591b800b6b78e6b50c206f4203c866b158cd22ebc312f", 0x61, 0x0, 0x0, 0x1}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x6, 0x8, r0, &(0x7f00000005c0)="feb1a716c04ab705f3a5fdfe78e875b051a1eb5da100389d307ca8a9dba87e7ddd850987c9a1d951dbb1224d07be0c4ee44f88759344ecc702c4570785deb68aefebd638873c319557167e7672babc438ab615636b0a9f5931d5c5ce90c4f67918e138322355e5afe957f29c746c6fde8ea60556edad99c1fac0965deb12f303d659dd8443a60591a375a331c5b30d8b8d79a6681344746b25a9f350518c90a1cd0f4c01224aa242774e4288c6b29e266e0bc2b358001c25462671ac847508f7fd2676be0d915c48ed566e5d8743d2c167b933987defb533809cbed260d31349cc7f659813f1bd0d6f01", 0xea, 0x4, 0x0, 0x3}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x5, 0x0, r0, &(0x7f00000006c0)="fc37e85c843e79a6ffc7e301b786b7e045305f2f99202a5fa15b8a19c705a1f9c3e01ffecd6ff747418b45cc2d9c4bf9dee67b9bc5d9d24b85ca7a44dab871d8dbc69e233eeb577ecb3d4044136540a157fd6b7747069bed5622f6d1290e925784322e7ffeccc5e0ca9c4ffd1ab2741c73d7a5a389ce70b39a6af482d5bf556f6b0e7c1869dc834de6a2a5e03eaff803bf665789d44fc2b1dc330a2ffd4ac661ba8e0976e15514fbb9a95ea07b1808779a43842fd04ecde2c67e4b8abc728fb38739e49791ab23b3bc0972a1930ed1a6fb862c3cd316b80c3ab59755f37d97f7d9a281afeb2b1ee1", 0xe8, 0x3, 0x0, 0x3}]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x3, 0x0, 0x3f, 0x5d, 0x0, 0x9, 0x80000, 0x8, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80000009, 0x4, @perf_config_ext={0x3, 0xfc0000000}, 0x12198, 0x1000, 0x0, 0x0, 0x8, 0x2, 0x9, 0x0, 0x9, 0x0, 0x5}, r3, 0x2, 0xffffffffffffffff, 0x3) getpid() lchown(&(0x7f0000000140)='./file0\x00', 0xee01, 0xee01) 11:48:22 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/locks\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) fcntl$setlease(r1, 0x400, 0x2) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f00000005c0)='net/protocols\x00') prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000700)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000006c0)}, 0x68) sendfile(0xffffffffffffffff, r0, 0x0, 0xd7) perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x3, 0x7, 0x3f, 0xcf, 0x0, 0x12000, 0x10009, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7f, 0x1, @perf_config_ext={0x1}, 0x8000, 0x9, 0x7, 0x7, 0x8000, 0x6, 0x6, 0x0, 0x7, 0x0, 0xadc}, 0x0, 0x7, 0xffffffffffffffff, 0x8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000780)=ANY=[@ANYBLOB="5e86055208c76b659d48ec2b9476260f12789c1567866fb1bb1c937a789ee55575adc7a85afd4f3795ca060d900f96d1d928d9a777966836dc6fed05c17ca9d5df00cf408eacff4be721287e051772e0df31fcb79599e7ffb3d0f1b611500325e43144cb", @ANYRES16=r2, @ANYBLOB="010600000000000000002a00000008002f0000000000080002001d9a84996501", @ANYRES32, @ANYBLOB], 0x24}}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/90, 0x5a}, {&(0x7f0000000400)=""/208, 0xd0}], 0x2, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}, 0x3) read$hiddev(0xffffffffffffffff, &(0x7f0000002b80)=""/251, 0xfb) 11:48:22 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/locks\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) fcntl$setlease(r1, 0x400, 0x2) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f00000005c0)='net/protocols\x00') prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000700)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000006c0)}, 0x68) sendfile(0xffffffffffffffff, r0, 0x0, 0xd7) perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x3, 0x7, 0x3f, 0xcf, 0x0, 0x12000, 0x10009, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7f, 0x1, @perf_config_ext={0x1}, 0x8000, 0x9, 0x7, 0x7, 0x8000, 0x6, 0x6, 0x0, 0x7, 0x0, 0xadc}, 0x0, 0x7, 0xffffffffffffffff, 0x8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000780)=ANY=[@ANYBLOB="5e86055208c76b659d48ec2b9476260f12789c1567866fb1bb1c937a789ee55575adc7a85afd4f3795ca060d900f96d1d928d9a777966836dc6fed05c17ca9d5df00cf408eacff4be721287e051772e0df31fcb79599e7ffb3d0f1b611500325e43144cb", @ANYRES16=r2, @ANYBLOB="010600000000000000002a00000008002f0000000000080002001d9a84996501", @ANYRES32, @ANYBLOB], 0x24}}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/90, 0x5a}, {&(0x7f0000000400)=""/208, 0xd0}], 0x2, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}, 0x3) read$hiddev(0xffffffffffffffff, &(0x7f0000002b80)=""/251, 0xfb) 11:48:23 executing program 1: rseq(&(0x7f0000000340), 0x20, 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000900)={'wpan3\x00'}) 11:48:23 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/locks\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) fcntl$setlease(r1, 0x400, 0x2) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f00000005c0)='net/protocols\x00') prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000700)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000006c0)}, 0x68) sendfile(0xffffffffffffffff, r0, 0x0, 0xd7) perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x3, 0x7, 0x3f, 0xcf, 0x0, 0x12000, 0x10009, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7f, 0x1, @perf_config_ext={0x1}, 0x8000, 0x9, 0x7, 0x7, 0x8000, 0x6, 0x6, 0x0, 0x7, 0x0, 0xadc}, 0x0, 0x7, 0xffffffffffffffff, 0x8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000780)=ANY=[@ANYBLOB="5e86055208c76b659d48ec2b9476260f12789c1567866fb1bb1c937a789ee55575adc7a85afd4f3795ca060d900f96d1d928d9a777966836dc6fed05c17ca9d5df00cf408eacff4be721287e051772e0df31fcb79599e7ffb3d0f1b611500325e43144cb", @ANYRES16=r2, @ANYBLOB="010600000000000000002a00000008002f0000000000080002001d9a84996501", @ANYRES32, @ANYBLOB], 0x24}}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/90, 0x5a}, {&(0x7f0000000400)=""/208, 0xd0}], 0x2, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}, 0x3) read$hiddev(0xffffffffffffffff, &(0x7f0000002b80)=""/251, 0xfb) 11:48:23 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/locks\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) fcntl$setlease(r1, 0x400, 0x2) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f00000005c0)='net/protocols\x00') prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000700)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000006c0)}, 0x68) sendfile(0xffffffffffffffff, r0, 0x0, 0xd7) perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x3, 0x7, 0x3f, 0xcf, 0x0, 0x12000, 0x10009, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7f, 0x1, @perf_config_ext={0x1}, 0x8000, 0x9, 0x7, 0x7, 0x8000, 0x6, 0x6, 0x0, 0x7, 0x0, 0xadc}, 0x0, 0x7, 0xffffffffffffffff, 0x8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000780)=ANY=[@ANYBLOB="5e86055208c76b659d48ec2b9476260f12789c1567866fb1bb1c937a789ee55575adc7a85afd4f3795ca060d900f96d1d928d9a777966836dc6fed05c17ca9d5df00cf408eacff4be721287e051772e0df31fcb79599e7ffb3d0f1b611500325e43144cb", @ANYRES16=r2, @ANYBLOB="010600000000000000002a00000008002f0000000000080002001d9a84996501", @ANYRES32, @ANYBLOB], 0x24}}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/90, 0x5a}, {&(0x7f0000000400)=""/208, 0xd0}], 0x2, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}, 0x3) read$hiddev(0xffffffffffffffff, &(0x7f0000002b80)=""/251, 0xfb) 11:48:23 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/locks\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) fcntl$setlease(r1, 0x400, 0x2) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f00000005c0)='net/protocols\x00') prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000700)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000006c0)}, 0x68) sendfile(0xffffffffffffffff, r0, 0x0, 0xd7) perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x3, 0x7, 0x3f, 0xcf, 0x0, 0x12000, 0x10009, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7f, 0x1, @perf_config_ext={0x1}, 0x8000, 0x9, 0x7, 0x7, 0x8000, 0x6, 0x6, 0x0, 0x7, 0x0, 0xadc}, 0x0, 0x7, 0xffffffffffffffff, 0x8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000780)=ANY=[@ANYBLOB="5e86055208c76b659d48ec2b9476260f12789c1567866fb1bb1c937a789ee55575adc7a85afd4f3795ca060d900f96d1d928d9a777966836dc6fed05c17ca9d5df00cf408eacff4be721287e051772e0df31fcb79599e7ffb3d0f1b611500325e43144cb", @ANYRES16=r2, @ANYBLOB="010600000000000000002a00000008002f0000000000080002001d9a84996501", @ANYRES32, @ANYBLOB], 0x24}}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/90, 0x5a}, {&(0x7f0000000400)=""/208, 0xd0}], 0x2, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}, 0x3) read$hiddev(0xffffffffffffffff, &(0x7f0000002b80)=""/251, 0xfb) 11:48:23 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/locks\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) fcntl$setlease(r1, 0x400, 0x2) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f00000005c0)='net/protocols\x00') prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000700)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000006c0)}, 0x68) sendfile(0xffffffffffffffff, r0, 0x0, 0xd7) perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x3, 0x7, 0x3f, 0xcf, 0x0, 0x12000, 0x10009, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7f, 0x1, @perf_config_ext={0x1}, 0x8000, 0x9, 0x7, 0x7, 0x8000, 0x6, 0x6, 0x0, 0x7, 0x0, 0xadc}, 0x0, 0x7, 0xffffffffffffffff, 0x8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000780)=ANY=[@ANYBLOB="5e86055208c76b659d48ec2b9476260f12789c1567866fb1bb1c937a789ee55575adc7a85afd4f3795ca060d900f96d1d928d9a777966836dc6fed05c17ca9d5df00cf408eacff4be721287e051772e0df31fcb79599e7ffb3d0f1b611500325e43144cb", @ANYRES16=r2, @ANYBLOB="010600000000000000002a00000008002f0000000000080002001d9a84996501", @ANYRES32, @ANYBLOB], 0x24}}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/90, 0x5a}, {&(0x7f0000000400)=""/208, 0xd0}], 0x2, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}, 0x3) read$hiddev(0xffffffffffffffff, &(0x7f0000002b80)=""/251, 0xfb) 11:48:23 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/locks\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) fcntl$setlease(r1, 0x400, 0x2) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f00000005c0)='net/protocols\x00') prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000700)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000006c0)}, 0x68) sendfile(0xffffffffffffffff, r0, 0x0, 0xd7) perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x3, 0x7, 0x3f, 0xcf, 0x0, 0x12000, 0x10009, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7f, 0x1, @perf_config_ext={0x1}, 0x8000, 0x9, 0x7, 0x7, 0x8000, 0x6, 0x6, 0x0, 0x7, 0x0, 0xadc}, 0x0, 0x7, 0xffffffffffffffff, 0x8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000780)=ANY=[@ANYBLOB="5e86055208c76b659d48ec2b9476260f12789c1567866fb1bb1c937a789ee55575adc7a85afd4f3795ca060d900f96d1d928d9a777966836dc6fed05c17ca9d5df00cf408eacff4be721287e051772e0df31fcb79599e7ffb3d0f1b611500325e43144cb", @ANYRES16=r2, @ANYBLOB="010600000000000000002a00000008002f0000000000080002001d9a84996501", @ANYRES32, @ANYBLOB], 0x24}}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/90, 0x5a}, {&(0x7f0000000400)=""/208, 0xd0}], 0x2, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}, 0x3) read$hiddev(0xffffffffffffffff, &(0x7f0000002b80)=""/251, 0xfb) 11:48:23 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/locks\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) fcntl$setlease(r1, 0x400, 0x2) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f00000005c0)='net/protocols\x00') prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000700)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000006c0)}, 0x68) sendfile(0xffffffffffffffff, r0, 0x0, 0xd7) perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x3, 0x7, 0x3f, 0xcf, 0x0, 0x12000, 0x10009, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7f, 0x1, @perf_config_ext={0x1}, 0x8000, 0x9, 0x7, 0x7, 0x8000, 0x6, 0x6, 0x0, 0x7, 0x0, 0xadc}, 0x0, 0x7, 0xffffffffffffffff, 0x8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000780)=ANY=[@ANYBLOB="5e86055208c76b659d48ec2b9476260f12789c1567866fb1bb1c937a789ee55575adc7a85afd4f3795ca060d900f96d1d928d9a777966836dc6fed05c17ca9d5df00cf408eacff4be721287e051772e0df31fcb79599e7ffb3d0f1b611500325e43144cb", @ANYRES16=r2, @ANYBLOB="010600000000000000002a00000008002f0000000000080002001d9a84996501", @ANYRES32, @ANYBLOB], 0x24}}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/90, 0x5a}, {&(0x7f0000000400)=""/208, 0xd0}], 0x2, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}, 0x3) read$hiddev(0xffffffffffffffff, &(0x7f0000002b80)=""/251, 0xfb) 11:48:23 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/locks\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) fcntl$setlease(r1, 0x400, 0x2) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f00000005c0)='net/protocols\x00') prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000700)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000006c0)}, 0x68) sendfile(0xffffffffffffffff, r0, 0x0, 0xd7) perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x3, 0x7, 0x3f, 0xcf, 0x0, 0x12000, 0x10009, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7f, 0x1, @perf_config_ext={0x1}, 0x8000, 0x9, 0x7, 0x7, 0x8000, 0x6, 0x6, 0x0, 0x7, 0x0, 0xadc}, 0x0, 0x7, 0xffffffffffffffff, 0x8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000780)=ANY=[@ANYBLOB="5e86055208c76b659d48ec2b9476260f12789c1567866fb1bb1c937a789ee55575adc7a85afd4f3795ca060d900f96d1d928d9a777966836dc6fed05c17ca9d5df00cf408eacff4be721287e051772e0df31fcb79599e7ffb3d0f1b611500325e43144cb", @ANYRES16=r2, @ANYBLOB="010600000000000000002a00000008002f0000000000080002001d9a84996501", @ANYRES32, @ANYBLOB], 0x24}}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/90, 0x5a}, {&(0x7f0000000400)=""/208, 0xd0}], 0x2, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}, 0x3) read$hiddev(0xffffffffffffffff, &(0x7f0000002b80)=""/251, 0xfb) 11:48:23 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/locks\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) fcntl$setlease(r1, 0x400, 0x2) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f00000005c0)='net/protocols\x00') prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000700)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000006c0)}, 0x68) sendfile(0xffffffffffffffff, r0, 0x0, 0xd7) perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x3, 0x7, 0x3f, 0xcf, 0x0, 0x12000, 0x10009, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7f, 0x1, @perf_config_ext={0x1}, 0x8000, 0x9, 0x7, 0x7, 0x8000, 0x6, 0x6, 0x0, 0x7, 0x0, 0xadc}, 0x0, 0x7, 0xffffffffffffffff, 0x8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000780)=ANY=[@ANYBLOB="5e86055208c76b659d48ec2b9476260f12789c1567866fb1bb1c937a789ee55575adc7a85afd4f3795ca060d900f96d1d928d9a777966836dc6fed05c17ca9d5df00cf408eacff4be721287e051772e0df31fcb79599e7ffb3d0f1b611500325e43144cb", @ANYRES16=r2, @ANYBLOB="010600000000000000002a00000008002f0000000000080002001d9a84996501", @ANYRES32, @ANYBLOB], 0x24}}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/90, 0x5a}, {&(0x7f0000000400)=""/208, 0xd0}], 0x2, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}, 0x3) read$hiddev(0xffffffffffffffff, &(0x7f0000002b80)=""/251, 0xfb) 11:48:23 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/locks\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) fcntl$setlease(r1, 0x400, 0x2) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f00000005c0)='net/protocols\x00') prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000700)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000006c0)}, 0x68) sendfile(0xffffffffffffffff, r0, 0x0, 0xd7) perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x3, 0x7, 0x3f, 0xcf, 0x0, 0x12000, 0x10009, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7f, 0x1, @perf_config_ext={0x1}, 0x8000, 0x9, 0x7, 0x7, 0x8000, 0x6, 0x6, 0x0, 0x7, 0x0, 0xadc}, 0x0, 0x7, 0xffffffffffffffff, 0x8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000780)=ANY=[@ANYBLOB="5e86055208c76b659d48ec2b9476260f12789c1567866fb1bb1c937a789ee55575adc7a85afd4f3795ca060d900f96d1d928d9a777966836dc6fed05c17ca9d5df00cf408eacff4be721287e051772e0df31fcb79599e7ffb3d0f1b611500325e43144cb", @ANYRES16=r2, @ANYBLOB="010600000000000000002a00000008002f0000000000080002001d9a84996501", @ANYRES32, @ANYBLOB], 0x24}}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/90, 0x5a}, {&(0x7f0000000400)=""/208, 0xd0}], 0x2, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}, 0x3) read$hiddev(0xffffffffffffffff, &(0x7f0000002b80)=""/251, 0xfb) 11:48:23 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/locks\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) fcntl$setlease(r1, 0x400, 0x2) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f00000005c0)='net/protocols\x00') prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000700)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000006c0)}, 0x68) sendfile(0xffffffffffffffff, r0, 0x0, 0xd7) perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x3, 0x7, 0x3f, 0xcf, 0x0, 0x12000, 0x10009, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7f, 0x1, @perf_config_ext={0x1}, 0x8000, 0x9, 0x7, 0x7, 0x8000, 0x6, 0x6, 0x0, 0x7, 0x0, 0xadc}, 0x0, 0x7, 0xffffffffffffffff, 0x8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000780)=ANY=[@ANYBLOB="5e86055208c76b659d48ec2b9476260f12789c1567866fb1bb1c937a789ee55575adc7a85afd4f3795ca060d900f96d1d928d9a777966836dc6fed05c17ca9d5df00cf408eacff4be721287e051772e0df31fcb79599e7ffb3d0f1b611500325e43144cb", @ANYRES16=r2, @ANYBLOB="010600000000000000002a00000008002f0000000000080002001d9a84996501", @ANYRES32, @ANYBLOB], 0x24}}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/90, 0x5a}, {&(0x7f0000000400)=""/208, 0xd0}], 0x2, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}, 0x3) read$hiddev(0xffffffffffffffff, &(0x7f0000002b80)=""/251, 0xfb) [ 120.582464] hrtimer: interrupt took 18595 ns 11:48:23 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/locks\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) fcntl$setlease(r1, 0x400, 0x2) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f00000005c0)='net/protocols\x00') prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000700)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000006c0)}, 0x68) sendfile(0xffffffffffffffff, r0, 0x0, 0xd7) perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x3, 0x7, 0x3f, 0xcf, 0x0, 0x12000, 0x10009, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7f, 0x1, @perf_config_ext={0x1}, 0x8000, 0x9, 0x7, 0x7, 0x8000, 0x6, 0x6, 0x0, 0x7, 0x0, 0xadc}, 0x0, 0x7, 0xffffffffffffffff, 0x8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000780)=ANY=[@ANYBLOB="5e86055208c76b659d48ec2b9476260f12789c1567866fb1bb1c937a789ee55575adc7a85afd4f3795ca060d900f96d1d928d9a777966836dc6fed05c17ca9d5df00cf408eacff4be721287e051772e0df31fcb79599e7ffb3d0f1b611500325e43144cb", @ANYRES16=r2, @ANYBLOB="010600000000000000002a00000008002f0000000000080002001d9a84996501", @ANYRES32, @ANYBLOB], 0x24}}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/90, 0x5a}, {&(0x7f0000000400)=""/208, 0xd0}], 0x2, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}, 0x3) read$hiddev(0xffffffffffffffff, &(0x7f0000002b80)=""/251, 0xfb) 11:48:23 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/locks\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) fcntl$setlease(r1, 0x400, 0x2) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f00000005c0)='net/protocols\x00') prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000700)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000006c0)}, 0x68) sendfile(0xffffffffffffffff, r0, 0x0, 0xd7) perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x3, 0x7, 0x3f, 0xcf, 0x0, 0x12000, 0x10009, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7f, 0x1, @perf_config_ext={0x1}, 0x8000, 0x9, 0x7, 0x7, 0x8000, 0x6, 0x6, 0x0, 0x7, 0x0, 0xadc}, 0x0, 0x7, 0xffffffffffffffff, 0x8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000780)=ANY=[@ANYBLOB="5e86055208c76b659d48ec2b9476260f12789c1567866fb1bb1c937a789ee55575adc7a85afd4f3795ca060d900f96d1d928d9a777966836dc6fed05c17ca9d5df00cf408eacff4be721287e051772e0df31fcb79599e7ffb3d0f1b611500325e43144cb", @ANYRES16=r2, @ANYBLOB="010600000000000000002a00000008002f0000000000080002001d9a84996501", @ANYRES32, @ANYBLOB], 0x24}}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/90, 0x5a}, {&(0x7f0000000400)=""/208, 0xd0}], 0x2, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}, 0x3) read$hiddev(0xffffffffffffffff, &(0x7f0000002b80)=""/251, 0xfb) 11:48:23 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/locks\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) fcntl$setlease(r1, 0x400, 0x2) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f00000005c0)='net/protocols\x00') prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000700)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000006c0)}, 0x68) sendfile(0xffffffffffffffff, r0, 0x0, 0xd7) perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x3, 0x7, 0x3f, 0xcf, 0x0, 0x12000, 0x10009, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7f, 0x1, @perf_config_ext={0x1}, 0x8000, 0x9, 0x7, 0x7, 0x8000, 0x6, 0x6, 0x0, 0x7, 0x0, 0xadc}, 0x0, 0x7, 0xffffffffffffffff, 0x8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000780)=ANY=[@ANYBLOB="5e86055208c76b659d48ec2b9476260f12789c1567866fb1bb1c937a789ee55575adc7a85afd4f3795ca060d900f96d1d928d9a777966836dc6fed05c17ca9d5df00cf408eacff4be721287e051772e0df31fcb79599e7ffb3d0f1b611500325e43144cb", @ANYRES16=r2, @ANYBLOB="010600000000000000002a00000008002f0000000000080002001d9a84996501", @ANYRES32, @ANYBLOB], 0x24}}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/90, 0x5a}, {&(0x7f0000000400)=""/208, 0xd0}], 0x2, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}, 0x3) read$hiddev(0xffffffffffffffff, &(0x7f0000002b80)=""/251, 0xfb) 11:48:23 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/locks\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) fcntl$setlease(r1, 0x400, 0x2) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f00000005c0)='net/protocols\x00') prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000700)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000006c0)}, 0x68) sendfile(0xffffffffffffffff, r0, 0x0, 0xd7) perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x3, 0x7, 0x3f, 0xcf, 0x0, 0x12000, 0x10009, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7f, 0x1, @perf_config_ext={0x1}, 0x8000, 0x9, 0x7, 0x7, 0x8000, 0x6, 0x6, 0x0, 0x7, 0x0, 0xadc}, 0x0, 0x7, 0xffffffffffffffff, 0x8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000780)=ANY=[@ANYBLOB="5e86055208c76b659d48ec2b9476260f12789c1567866fb1bb1c937a789ee55575adc7a85afd4f3795ca060d900f96d1d928d9a777966836dc6fed05c17ca9d5df00cf408eacff4be721287e051772e0df31fcb79599e7ffb3d0f1b611500325e43144cb", @ANYRES16=r2, @ANYBLOB="010600000000000000002a00000008002f0000000000080002001d9a84996501", @ANYRES32, @ANYBLOB], 0x24}}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/90, 0x5a}, {&(0x7f0000000400)=""/208, 0xd0}], 0x2, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}, 0x3) read$hiddev(0xffffffffffffffff, &(0x7f0000002b80)=""/251, 0xfb) 11:48:23 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/locks\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) fcntl$setlease(r1, 0x400, 0x2) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f00000005c0)='net/protocols\x00') prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000700)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000006c0)}, 0x68) sendfile(0xffffffffffffffff, r0, 0x0, 0xd7) perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x3, 0x7, 0x3f, 0xcf, 0x0, 0x12000, 0x10009, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7f, 0x1, @perf_config_ext={0x1}, 0x8000, 0x9, 0x7, 0x7, 0x8000, 0x6, 0x6, 0x0, 0x7, 0x0, 0xadc}, 0x0, 0x7, 0xffffffffffffffff, 0x8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000780)=ANY=[@ANYBLOB="5e86055208c76b659d48ec2b9476260f12789c1567866fb1bb1c937a789ee55575adc7a85afd4f3795ca060d900f96d1d928d9a777966836dc6fed05c17ca9d5df00cf408eacff4be721287e051772e0df31fcb79599e7ffb3d0f1b611500325e43144cb", @ANYRES16=r2, @ANYBLOB="010600000000000000002a00000008002f0000000000080002001d9a84996501", @ANYRES32, @ANYBLOB], 0x24}}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/90, 0x5a}, {&(0x7f0000000400)=""/208, 0xd0}], 0x2, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}, 0x3) read$hiddev(0xffffffffffffffff, &(0x7f0000002b80)=""/251, 0xfb) 11:48:23 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/locks\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) fcntl$setlease(r1, 0x400, 0x2) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f00000005c0)='net/protocols\x00') prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000700)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000006c0)}, 0x68) sendfile(0xffffffffffffffff, r0, 0x0, 0xd7) perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x3, 0x7, 0x3f, 0xcf, 0x0, 0x12000, 0x10009, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7f, 0x1, @perf_config_ext={0x1}, 0x8000, 0x9, 0x7, 0x7, 0x8000, 0x6, 0x6, 0x0, 0x7, 0x0, 0xadc}, 0x0, 0x7, 0xffffffffffffffff, 0x8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000780)=ANY=[@ANYBLOB="5e86055208c76b659d48ec2b9476260f12789c1567866fb1bb1c937a789ee55575adc7a85afd4f3795ca060d900f96d1d928d9a777966836dc6fed05c17ca9d5df00cf408eacff4be721287e051772e0df31fcb79599e7ffb3d0f1b611500325e43144cb", @ANYRES16=r2, @ANYBLOB="010600000000000000002a00000008002f0000000000080002001d9a84996501", @ANYRES32, @ANYBLOB], 0x24}}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/90, 0x5a}, {&(0x7f0000000400)=""/208, 0xd0}], 0x2, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}, 0x3) read$hiddev(0xffffffffffffffff, &(0x7f0000002b80)=""/251, 0xfb) 11:48:23 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/locks\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) fcntl$setlease(r1, 0x400, 0x2) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f00000005c0)='net/protocols\x00') prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000700)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000006c0)}, 0x68) sendfile(0xffffffffffffffff, r0, 0x0, 0xd7) perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x3, 0x7, 0x3f, 0xcf, 0x0, 0x12000, 0x10009, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7f, 0x1, @perf_config_ext={0x1}, 0x8000, 0x9, 0x7, 0x7, 0x8000, 0x6, 0x6, 0x0, 0x7, 0x0, 0xadc}, 0x0, 0x7, 0xffffffffffffffff, 0x8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000780)=ANY=[@ANYBLOB="5e86055208c76b659d48ec2b9476260f12789c1567866fb1bb1c937a789ee55575adc7a85afd4f3795ca060d900f96d1d928d9a777966836dc6fed05c17ca9d5df00cf408eacff4be721287e051772e0df31fcb79599e7ffb3d0f1b611500325e43144cb", @ANYRES16=r2, @ANYBLOB="010600000000000000002a00000008002f0000000000080002001d9a84996501", @ANYRES32, @ANYBLOB], 0x24}}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/90, 0x5a}, {&(0x7f0000000400)=""/208, 0xd0}], 0x2, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}, 0x3) read$hiddev(0xffffffffffffffff, &(0x7f0000002b80)=""/251, 0xfb) 11:48:23 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/locks\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) fcntl$setlease(r1, 0x400, 0x2) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f00000005c0)='net/protocols\x00') prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000700)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000006c0)}, 0x68) sendfile(0xffffffffffffffff, r0, 0x0, 0xd7) perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x3, 0x7, 0x3f, 0xcf, 0x0, 0x12000, 0x10009, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7f, 0x1, @perf_config_ext={0x1}, 0x8000, 0x9, 0x7, 0x7, 0x8000, 0x6, 0x6, 0x0, 0x7, 0x0, 0xadc}, 0x0, 0x7, 0xffffffffffffffff, 0x8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000780)=ANY=[@ANYBLOB="5e86055208c76b659d48ec2b9476260f12789c1567866fb1bb1c937a789ee55575adc7a85afd4f3795ca060d900f96d1d928d9a777966836dc6fed05c17ca9d5df00cf408eacff4be721287e051772e0df31fcb79599e7ffb3d0f1b611500325e43144cb", @ANYRES16=r2, @ANYBLOB="010600000000000000002a00000008002f0000000000080002001d9a84996501", @ANYRES32, @ANYBLOB], 0x24}}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/90, 0x5a}, {&(0x7f0000000400)=""/208, 0xd0}], 0x2, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}, 0x3) read$hiddev(0xffffffffffffffff, &(0x7f0000002b80)=""/251, 0xfb) 11:48:23 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/locks\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) fcntl$setlease(r1, 0x400, 0x2) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f00000005c0)='net/protocols\x00') prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000700)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000006c0)}, 0x68) sendfile(0xffffffffffffffff, r0, 0x0, 0xd7) perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x3, 0x7, 0x3f, 0xcf, 0x0, 0x12000, 0x10009, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7f, 0x1, @perf_config_ext={0x1}, 0x8000, 0x9, 0x7, 0x7, 0x8000, 0x6, 0x6, 0x0, 0x7, 0x0, 0xadc}, 0x0, 0x7, 0xffffffffffffffff, 0x8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000780)=ANY=[@ANYBLOB="5e86055208c76b659d48ec2b9476260f12789c1567866fb1bb1c937a789ee55575adc7a85afd4f3795ca060d900f96d1d928d9a777966836dc6fed05c17ca9d5df00cf408eacff4be721287e051772e0df31fcb79599e7ffb3d0f1b611500325e43144cb", @ANYRES16=r2, @ANYBLOB="010600000000000000002a00000008002f0000000000080002001d9a84996501", @ANYRES32, @ANYBLOB], 0x24}}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/90, 0x5a}, {&(0x7f0000000400)=""/208, 0xd0}], 0x2, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}, 0x3) read$hiddev(0xffffffffffffffff, &(0x7f0000002b80)=""/251, 0xfb) 11:48:23 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/locks\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) fcntl$setlease(r1, 0x400, 0x2) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f00000005c0)='net/protocols\x00') prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000700)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000006c0)}, 0x68) sendfile(0xffffffffffffffff, r0, 0x0, 0xd7) perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x3, 0x7, 0x3f, 0xcf, 0x0, 0x12000, 0x10009, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7f, 0x1, @perf_config_ext={0x1}, 0x8000, 0x9, 0x7, 0x7, 0x8000, 0x6, 0x6, 0x0, 0x7, 0x0, 0xadc}, 0x0, 0x7, 0xffffffffffffffff, 0x8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000780)=ANY=[@ANYBLOB="5e86055208c76b659d48ec2b9476260f12789c1567866fb1bb1c937a789ee55575adc7a85afd4f3795ca060d900f96d1d928d9a777966836dc6fed05c17ca9d5df00cf408eacff4be721287e051772e0df31fcb79599e7ffb3d0f1b611500325e43144cb", @ANYRES16=r2, @ANYBLOB="010600000000000000002a00000008002f0000000000080002001d9a84996501", @ANYRES32, @ANYBLOB], 0x24}}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/90, 0x5a}, {&(0x7f0000000400)=""/208, 0xd0}], 0x2, &(0x7f0000000540)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}, 0x3) read$hiddev(0xffffffffffffffff, &(0x7f0000002b80)=""/251, 0xfb) 11:48:24 executing program 5: move_pages(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 11:48:24 executing program 1: pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r0, &(0x7f0000000b40), &(0x7f0000000b80)='system_u:object_r:selinux_config_t:s0\x00', 0x26, 0x0) 11:48:24 executing program 7: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@multicast, @dev, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote}, @echo_reply={0x1c}}}}}, 0x0) 11:48:24 executing program 0: r0 = fsopen(&(0x7f0000000040)='tracefs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) openat(r1, &(0x7f0000000100)='./file1\x00', 0x141040, 0x0) 11:48:24 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x90083, &(0x7f0000001380)) execveat(0xffffffffffffffff, &(0x7f0000001440)='./file0\x00', 0x0, &(0x7f0000001680)=[0x0], 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000001740)='./file0\x00', 0x0, 0x4, &(0x7f0000001cc0)=[{0x0}, {&(0x7f0000001880)="90", 0x1, 0x2}, {0x0}, {0x0, 0x0, 0x8000}], 0x0, 0x0) 11:48:24 executing program 6: move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 11:48:24 executing program 2: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000001a00), 0x0, 0x0) 11:48:24 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f00000008c0)={'wpan4\x00'}) syz_genetlink_get_family_id$nl802154(&(0x7f0000000b00), 0xffffffffffffffff) [ 121.887070] audit: type=1400 audit(1664970504.570:9): avc: denied { relabelfrom } for pid=4071 comm="syz-executor.1" name="" dev="pipefs" ino=14090 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=fifo_file permissive=1 [ 121.897837] process 'syz-executor.3' launched '/dev/fd/-1/./file0' with NULL argv: empty string added [ 121.915682] loop3: detected capacity change from 0 to 128 [ 121.935115] loop3: detected capacity change from 0 to 128 11:48:24 executing program 5: move_pages(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 11:48:24 executing program 7: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@multicast, @dev, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote}, @echo_reply={0x1c}}}}}, 0x0) 11:48:24 executing program 0: r0 = perf_event_open$cgroup(&(0x7f00000000c0)={0x2, 0x80, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close_range(r0, 0xffffffffffffffff, 0x4) 11:48:24 executing program 2: mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) io_uring_setup(0x0, 0x0) socketpair(0x1, 0x0, 0x7, &(0x7f00000013c0)) syz_genetlink_get_family_id$ipvs(0x0 VM DIAGNOSIS: 11:48:21 Registers: info registers vcpu 0 RAX=0000000000000032 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff823bda91 RDI=ffffffff8765c9a0 RBP=ffffffff8765c960 RSP=ffff8880400e7690 R8 =0000000000000001 R9 =000000000000000a R10=0000000000000032 R11=0000000000000001 R12=0000000000000032 R13=ffffffff8765c960 R14=0000000000000010 R15=ffffffff823bda80 RIP=ffffffff823bdae9 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fbb976ce700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f46f740e008 CR3=0000000037850000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=000000000000000000000000000000ff XMM01=25252525252525252525252525252525 XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000 XMM04=000000000000000000000000000000ff XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=0000000000000000 RBX=0000000000000001 RCX=ffffffff842786a7 RDX=ffffed100d9c6fd1 RSI=0000000000000004 RDI=ffff88806ce37e80 RBP=ffff88806ce37e80 RSP=ffff88801bc7fab0 R8 =0000000000000000 R9 =ffff88806ce37e83 R10=ffffed100d9c6fd0 R11=0000000000000001 R12=0000000000000003 R13=ffffed100d9c6fd0 R14=0000000000000001 R15=1ffff1100378ff57 RIP=ffffffff84278724 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00005555572ed400 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f9f91ec8620 CR3=0000000017ec4000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=0000ffff00000000000000000000ffff XMM01=25252525252525252525252525252525 XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000 XMM04=000000ff0000000000000000000000ff XMM05=00000000000000000000000000000000 XMM06=00000000000000000000000000000000 XMM07=00000000000000000000000000000000 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000