Warning: Permanently added '[localhost]:25999' (ECDSA) to the list of known hosts. 2022/10/06 11:40:15 fuzzer started 2022/10/06 11:40:15 dialing manager at localhost:37161 syzkaller login: [ 44.088645] cgroup: Unknown subsys name 'net' [ 44.187490] cgroup: Unknown subsys name 'rlimit' 2022/10/06 11:40:30 syscalls: 2215 2022/10/06 11:40:30 code coverage: enabled 2022/10/06 11:40:30 comparison tracing: enabled 2022/10/06 11:40:30 extra coverage: enabled 2022/10/06 11:40:30 setuid sandbox: enabled 2022/10/06 11:40:30 namespace sandbox: enabled 2022/10/06 11:40:30 Android sandbox: enabled 2022/10/06 11:40:30 fault injection: enabled 2022/10/06 11:40:30 leak checking: enabled 2022/10/06 11:40:30 net packet injection: enabled 2022/10/06 11:40:30 net device setup: enabled 2022/10/06 11:40:30 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/10/06 11:40:30 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/10/06 11:40:30 USB emulation: enabled 2022/10/06 11:40:30 hci packet injection: enabled 2022/10/06 11:40:30 wifi device emulation: failed to parse kernel version (6.0.0-next-20221006) 2022/10/06 11:40:30 802.15.4 emulation: enabled 2022/10/06 11:40:30 fetching corpus: 0, signal 0/2000 (executing program) 2022/10/06 11:40:30 fetching corpus: 50, signal 22979/26416 (executing program) 2022/10/06 11:40:30 fetching corpus: 100, signal 35773/40423 (executing program) 2022/10/06 11:40:30 fetching corpus: 150, signal 41988/47865 (executing program) 2022/10/06 11:40:30 fetching corpus: 200, signal 49934/56792 (executing program) 2022/10/06 11:40:30 fetching corpus: 250, signal 54732/62611 (executing program) 2022/10/06 11:40:30 fetching corpus: 300, signal 59178/67966 (executing program) 2022/10/06 11:40:30 fetching corpus: 350, signal 61849/71669 (executing program) 2022/10/06 11:40:31 fetching corpus: 400, signal 65964/76574 (executing program) 2022/10/06 11:40:31 fetching corpus: 450, signal 68931/80367 (executing program) 2022/10/06 11:40:31 fetching corpus: 500, signal 71215/83531 (executing program) 2022/10/06 11:40:31 fetching corpus: 550, signal 74292/87290 (executing program) 2022/10/06 11:40:31 fetching corpus: 600, signal 77062/90692 (executing program) 2022/10/06 11:40:31 fetching corpus: 650, signal 79334/93598 (executing program) 2022/10/06 11:40:31 fetching corpus: 700, signal 82237/97005 (executing program) 2022/10/06 11:40:31 fetching corpus: 750, signal 84285/99651 (executing program) 2022/10/06 11:40:31 fetching corpus: 800, signal 87128/102883 (executing program) 2022/10/06 11:40:32 fetching corpus: 850, signal 88922/105181 (executing program) 2022/10/06 11:40:32 fetching corpus: 900, signal 90773/107468 (executing program) 2022/10/06 11:40:32 fetching corpus: 950, signal 92939/109957 (executing program) 2022/10/06 11:40:32 fetching corpus: 1000, signal 94522/112013 (executing program) 2022/10/06 11:40:32 fetching corpus: 1050, signal 95424/113477 (executing program) 2022/10/06 11:40:32 fetching corpus: 1100, signal 96683/115159 (executing program) 2022/10/06 11:40:32 fetching corpus: 1150, signal 98181/117052 (executing program) 2022/10/06 11:40:32 fetching corpus: 1200, signal 100461/119423 (executing program) 2022/10/06 11:40:32 fetching corpus: 1250, signal 101990/121171 (executing program) 2022/10/06 11:40:32 fetching corpus: 1300, signal 105133/123912 (executing program) 2022/10/06 11:40:33 fetching corpus: 1350, signal 106366/125464 (executing program) 2022/10/06 11:40:33 fetching corpus: 1400, signal 109025/127846 (executing program) 2022/10/06 11:40:33 fetching corpus: 1450, signal 109933/129071 (executing program) 2022/10/06 11:40:33 fetching corpus: 1500, signal 111231/130470 (executing program) 2022/10/06 11:40:33 fetching corpus: 1550, signal 112650/132038 (executing program) 2022/10/06 11:40:33 fetching corpus: 1600, signal 114674/133806 (executing program) 2022/10/06 11:40:33 fetching corpus: 1650, signal 115672/134964 (executing program) 2022/10/06 11:40:33 fetching corpus: 1700, signal 116522/136010 (executing program) 2022/10/06 11:40:34 fetching corpus: 1750, signal 117721/137241 (executing program) 2022/10/06 11:40:34 fetching corpus: 1800, signal 118703/138293 (executing program) 2022/10/06 11:40:34 fetching corpus: 1850, signal 119756/139367 (executing program) 2022/10/06 11:40:34 fetching corpus: 1900, signal 121056/140555 (executing program) 2022/10/06 11:40:34 fetching corpus: 1950, signal 121647/141403 (executing program) 2022/10/06 11:40:34 fetching corpus: 2000, signal 122318/142223 (executing program) 2022/10/06 11:40:34 fetching corpus: 2050, signal 123059/143055 (executing program) 2022/10/06 11:40:34 fetching corpus: 2100, signal 124103/144003 (executing program) 2022/10/06 11:40:34 fetching corpus: 2150, signal 124934/144877 (executing program) 2022/10/06 11:40:35 fetching corpus: 2200, signal 125947/145807 (executing program) 2022/10/06 11:40:35 fetching corpus: 2250, signal 127929/147127 (executing program) 2022/10/06 11:40:35 fetching corpus: 2300, signal 129335/148108 (executing program) 2022/10/06 11:40:35 fetching corpus: 2350, signal 131361/149332 (executing program) 2022/10/06 11:40:35 fetching corpus: 2400, signal 133094/150400 (executing program) 2022/10/06 11:40:35 fetching corpus: 2450, signal 134428/151202 (executing program) 2022/10/06 11:40:35 fetching corpus: 2500, signal 135822/152076 (executing program) 2022/10/06 11:40:35 fetching corpus: 2550, signal 136435/152617 (executing program) 2022/10/06 11:40:35 fetching corpus: 2600, signal 137481/153311 (executing program) 2022/10/06 11:40:36 fetching corpus: 2650, signal 138803/154087 (executing program) 2022/10/06 11:40:36 fetching corpus: 2700, signal 139481/154552 (executing program) 2022/10/06 11:40:36 fetching corpus: 2750, signal 140256/155121 (executing program) 2022/10/06 11:40:36 fetching corpus: 2800, signal 141748/155843 (executing program) 2022/10/06 11:40:36 fetching corpus: 2850, signal 142498/156313 (executing program) 2022/10/06 11:40:36 fetching corpus: 2900, signal 143135/156739 (executing program) 2022/10/06 11:40:36 fetching corpus: 2950, signal 143756/157116 (executing program) 2022/10/06 11:40:36 fetching corpus: 3000, signal 144508/157506 (executing program) 2022/10/06 11:40:36 fetching corpus: 3050, signal 145703/157984 (executing program) 2022/10/06 11:40:37 fetching corpus: 3100, signal 146948/158472 (executing program) 2022/10/06 11:40:37 fetching corpus: 3150, signal 147178/158700 (executing program) 2022/10/06 11:40:37 fetching corpus: 3200, signal 147961/159060 (executing program) 2022/10/06 11:40:37 fetching corpus: 3250, signal 148510/159328 (executing program) 2022/10/06 11:40:37 fetching corpus: 3300, signal 148897/159578 (executing program) 2022/10/06 11:40:37 fetching corpus: 3350, signal 149603/159838 (executing program) 2022/10/06 11:40:37 fetching corpus: 3400, signal 150388/160184 (executing program) 2022/10/06 11:40:37 fetching corpus: 3450, signal 151158/160399 (executing program) 2022/10/06 11:40:37 fetching corpus: 3500, signal 151713/160593 (executing program) 2022/10/06 11:40:37 fetching corpus: 3550, signal 152272/160840 (executing program) 2022/10/06 11:40:38 fetching corpus: 3600, signal 153279/161057 (executing program) 2022/10/06 11:40:38 fetching corpus: 3650, signal 153898/161217 (executing program) 2022/10/06 11:40:38 fetching corpus: 3700, signal 154837/161392 (executing program) 2022/10/06 11:40:38 fetching corpus: 3750, signal 155764/161534 (executing program) 2022/10/06 11:40:38 fetching corpus: 3800, signal 156717/161663 (executing program) 2022/10/06 11:40:38 fetching corpus: 3850, signal 157274/161779 (executing program) 2022/10/06 11:40:38 fetching corpus: 3900, signal 158215/161862 (executing program) 2022/10/06 11:40:38 fetching corpus: 3939, signal 158645/161914 (executing program) 2022/10/06 11:40:38 fetching corpus: 3939, signal 158645/161915 (executing program) 2022/10/06 11:40:38 fetching corpus: 3939, signal 158645/161915 (executing program) 2022/10/06 11:40:41 starting 8 fuzzer processes 11:40:41 executing program 0: syz_read_part_table(0x0, 0x2, &(0x7f0000000880)=[{&(0x7f0000000580)}, {0x0, 0x0, 0x80000000}]) 11:40:41 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8913, &(0x7f0000001300)={'wlan0\x00'}) 11:40:41 executing program 2: prctl$PR_MPX_DISABLE_MANAGEMENT(0x25) 11:40:41 executing program 3: clone3(&(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, {0x3f}, &(0x7f0000000500)=""/216, 0xd8, &(0x7f0000000600)=""/155, &(0x7f00000006c0)=[0x0, 0x0], 0x2}, 0x58) syz_open_procfs$namespace(0x0, &(0x7f0000000780)='ns/pid_for_children\x00') socket$unix(0x1, 0x0, 0x0) 11:40:41 executing program 4: setgroups(0x5, &(0x7f00000000c0)=[0xee00, 0xee00, 0x0, 0x0, 0x0]) 11:40:41 executing program 5: syz_io_uring_complete(0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000780), 0x121c02, 0x0) move_mount(r0, &(0x7f00000007c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x75) [ 69.857507] audit: type=1400 audit(1665056441.826:6): avc: denied { execmem } for pid=286 comm="syz-executor.3" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 11:40:41 executing program 6: timer_create(0x3, &(0x7f00000003c0)={0x0, 0x1f, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000400)) 11:40:41 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000019240)=[{{0x0, 0x0, &(0x7f0000014940)=[{0x0}, {0x0}], 0x2}}], 0x1, 0x0, 0x0) [ 71.105114] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 71.107248] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 71.109487] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 71.112736] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 71.115410] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 71.116821] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 71.122406] Bluetooth: hci0: HCI_REQ-0x0c1a [ 71.158899] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 71.160864] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 71.163589] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 71.164867] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 71.167569] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 71.168874] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 71.178576] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 71.180774] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 71.184264] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 71.185517] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 71.185609] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 71.188322] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 71.192477] Bluetooth: hci1: HCI_REQ-0x0c1a [ 71.194703] Bluetooth: hci2: HCI_REQ-0x0c1a [ 71.215377] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 71.216981] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 71.219190] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 71.222493] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 71.224207] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 71.226699] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 71.231127] Bluetooth: hci4: HCI_REQ-0x0c1a [ 71.247771] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 71.251596] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 71.252813] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 71.255493] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 71.257079] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 71.258248] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 71.262687] Bluetooth: hci3: HCI_REQ-0x0c1a [ 71.307815] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 71.310179] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 71.314309] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 71.319202] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 71.320549] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 71.328772] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 71.331076] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 71.334652] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 71.337709] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 71.342456] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 71.348010] Bluetooth: hci7: HCI_REQ-0x0c1a [ 71.348259] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 71.356126] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 71.362527] Bluetooth: hci5: HCI_REQ-0x0c1a [ 73.185410] Bluetooth: hci0: command 0x0409 tx timeout [ 73.249020] Bluetooth: hci4: command 0x0409 tx timeout [ 73.249188] Bluetooth: hci2: command 0x0409 tx timeout [ 73.249899] Bluetooth: hci1: command 0x0409 tx timeout [ 73.312286] Bluetooth: hci6: Opcode 0x c03 failed: -110 [ 73.312419] Bluetooth: hci3: command 0x0409 tx timeout [ 73.377063] Bluetooth: hci7: command 0x0409 tx timeout [ 73.377200] Bluetooth: hci5: command 0x0409 tx timeout [ 75.232095] Bluetooth: hci0: command 0x041b tx timeout [ 75.296618] Bluetooth: hci1: command 0x041b tx timeout [ 75.297000] Bluetooth: hci2: command 0x041b tx timeout [ 75.297346] Bluetooth: hci4: command 0x041b tx timeout [ 75.360084] Bluetooth: hci3: command 0x041b tx timeout [ 75.424051] Bluetooth: hci7: command 0x041b tx timeout [ 75.425207] Bluetooth: hci5: command 0x041b tx timeout [ 76.416344] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 76.423334] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 76.424519] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 76.431110] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 76.435739] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 76.439188] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 76.447276] Bluetooth: hci6: HCI_REQ-0x0c1a [ 77.279992] Bluetooth: hci0: command 0x040f tx timeout [ 77.344011] Bluetooth: hci4: command 0x040f tx timeout [ 77.345153] Bluetooth: hci2: command 0x040f tx timeout [ 77.345269] Bluetooth: hci1: command 0x040f tx timeout [ 77.407974] Bluetooth: hci3: command 0x040f tx timeout [ 77.471999] Bluetooth: hci5: command 0x040f tx timeout [ 77.472555] Bluetooth: hci7: command 0x040f tx timeout [ 78.496038] Bluetooth: hci6: command 0x0409 tx timeout [ 79.328018] Bluetooth: hci0: command 0x0419 tx timeout [ 79.391985] Bluetooth: hci2: command 0x0419 tx timeout [ 79.393136] Bluetooth: hci1: command 0x0419 tx timeout [ 79.393496] Bluetooth: hci4: command 0x0419 tx timeout [ 79.457014] Bluetooth: hci3: command 0x0419 tx timeout [ 79.520017] Bluetooth: hci7: command 0x0419 tx timeout [ 79.520599] Bluetooth: hci5: command 0x0419 tx timeout [ 80.544014] Bluetooth: hci6: command 0x041b tx timeout [ 82.593018] Bluetooth: hci6: command 0x040f tx timeout [ 84.640035] Bluetooth: hci6: command 0x0419 tx timeout 11:41:35 executing program 4: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000940), 0x0, 0x0) ioctl$CDROMSUBCHNL(r0, 0x530b, 0x0) 11:41:35 executing program 4: r0 = io_uring_setup(0x454c, &(0x7f0000000240)) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r0, 0x19, &(0x7f0000000480), 0x1) 11:41:36 executing program 5: set_mempolicy(0x8005, &(0x7f0000000080)=0xd5, 0xb9a) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x5b0, &(0x7f0000000100)=[{}]}) 11:41:36 executing program 4: getitimer(0x0, &(0x7f0000000040)) 11:41:36 executing program 5: set_mempolicy(0x8005, &(0x7f0000000080)=0xd5, 0xb9a) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x5b0, &(0x7f0000000100)=[{}]}) 11:41:36 executing program 5: set_mempolicy(0x8005, &(0x7f0000000080)=0xd5, 0xb9a) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x5b0, &(0x7f0000000100)=[{}]}) 11:41:36 executing program 4: set_mempolicy(0x8005, &(0x7f0000000080)=0xd5, 0xb9a) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x5b0, &(0x7f0000000100)=[{}]}) 11:41:36 executing program 5: set_mempolicy(0x8005, &(0x7f0000000080)=0xd5, 0xb9a) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x5b0, &(0x7f0000000100)=[{}]}) [ 124.775421] loop0: detected capacity change from 0 to 264192 [ 124.798675] loop0: detected capacity change from 0 to 264192 11:41:40 executing program 0: syz_read_part_table(0x0, 0x2, &(0x7f0000000880)=[{&(0x7f0000000580)}, {0x0, 0x0, 0x80000000}]) 11:41:40 executing program 6: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/sockcreate\x00', 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000040)={0x0, 0x2, 0x0, 0x0, 0xffffffffffffffff}) 11:41:40 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDDISABIO(r0, 0x4b37) 11:41:40 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000001380)) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000880)={0x28, r0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MAC={0xc, 0x6, @device_b}]}, 0x28}}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') preadv(r2, &(0x7f0000001140)=[{&(0x7f0000000140)=""/4096, 0x1000}], 0x1, 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000180)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000100)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18, r5, 0x301, 0x0, 0x0, {0x4}, [@ETHTOOL_A_PAUSE_HEADER={0x4}]}, 0x18}}, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r6, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r8, @remote, @broadcast}}}], 0x20}, 0x0) getsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000040)={@broadcast, @loopback, 0x0}, &(0x7f00000011c0)=0xc) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000001340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000001300)={&(0x7f0000001200)={0xe8, r5, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@ETHTOOL_A_PAUSE_HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}]}, @ETHTOOL_A_PAUSE_TX={0x5, 0x4, 0x1}, @ETHTOOL_A_PAUSE_HEADER={0x64, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xe8}}, 0x800) 11:41:40 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000019240)=[{{0x0, 0x0, &(0x7f0000014940)=[{0x0}, {0x0}], 0x2}}], 0x1, 0x0, 0x0) 11:41:40 executing program 4: set_mempolicy(0x8005, &(0x7f0000000080)=0xd5, 0xb9a) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x5b0, &(0x7f0000000100)=[{}]}) 11:41:40 executing program 3: prlimit64(0x0, 0x7, &(0x7f0000000080)={0x4, 0x6}, 0x0) r0 = fsopen(&(0x7f0000000180)='ramfs\x00', 0x0) dup(r0) 11:41:40 executing program 5: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRES32=0xffffffffffffffff, @ANYRESDEC=r1]) ioctl$SIOCGSTAMPNS(r3, 0x8907, &(0x7f0000000040)) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000080)=0x8) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r5) r6 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r5, r6) keyctl$search(0xa, r2, &(0x7f00000000c0)='.request_key_auth\x00', &(0x7f0000000180)={'syz', 0x3}, r6) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0xcb3, 0x0, 0x0, 0xfffffffffffffffd}) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000080), 0x0) [ 128.619644] audit: type=1400 audit(1665056500.588:7): avc: denied { open } for pid=3966 comm="syz-executor.1" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 128.622222] audit: type=1400 audit(1665056500.588:8): avc: denied { kernel } for pid=3966 comm="syz-executor.1" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 128.645351] loop0: detected capacity change from 0 to 264192 [ 128.648815] ------------[ cut here ]------------ [ 128.648848] [ 128.648853] ====================================================== [ 128.648859] WARNING: possible circular locking dependency detected [ 128.648866] 6.0.0-next-20221006 #1 Not tainted [ 128.648878] ------------------------------------------------------ [ 128.648884] syz-executor.1/3971 is trying to acquire lock: [ 128.648895] ffffffff853fac98 ((console_sem).lock){....}-{2:2}, at: down_trylock+0xe/0x70 [ 128.648970] [ 128.648970] but task is already holding lock: [ 128.648975] ffff888008966820 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 128.649022] [ 128.649022] which lock already depends on the new lock. [ 128.649022] [ 128.649028] [ 128.649028] the existing dependency chain (in reverse order) is: 11:41:40 executing program 4: set_mempolicy(0x8005, &(0x7f0000000080)=0xd5, 0xb9a) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x5b0, &(0x7f0000000100)=[{}]}) [ 128.649034] [ 128.649034] -> #3 (&ctx->lock){....}-{2:2}: [ 128.649059] _raw_spin_lock+0x2a/0x40 [ 128.649082] __perf_event_task_sched_out+0x53b/0x18d0 [ 128.649103] __schedule+0xedd/0x2470 11:41:40 executing program 6: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/sockcreate\x00', 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000040)={0x0, 0x2, 0x0, 0x0, 0xffffffffffffffff}) [ 128.649131] schedule+0xda/0x1b0 [ 128.649158] exit_to_user_mode_prepare+0x114/0x1a0 [ 128.649179] syscall_exit_to_user_mode+0x19/0x40 [ 128.649205] do_syscall_64+0x48/0x90 [ 128.649224] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 128.649250] [ 128.649250] -> #2 (&rq->__lock){-.-.}-{2:2}: [ 128.649275] _raw_spin_lock_nested+0x30/0x40 [ 128.649297] raw_spin_rq_lock_nested+0x1e/0x30 [ 128.649320] task_fork_fair+0x63/0x4d0 [ 128.649351] sched_cgroup_fork+0x3d0/0x540 [ 128.649377] copy_process+0x4183/0x6e20 11:41:40 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x24e1, 0x0) ioctl$EXT4_IOC_GETSTATE(r0, 0x40086607, &(0x7f0000002000)) [ 128.649396] kernel_clone+0xe7/0x890 [ 128.649414] user_mode_thread+0xad/0xf0 [ 128.649433] rest_init+0x24/0x250 [ 128.649456] arch_call_rest_init+0xf/0x14 [ 128.649477] start_kernel+0x4c6/0x4eb [ 128.649495] secondary_startup_64_no_verify+0xe0/0xeb [ 128.649521] [ 128.649521] -> #1 (&p->pi_lock){-.-.}-{2:2}: [ 128.649546] _raw_spin_lock_irqsave+0x39/0x60 [ 128.649568] try_to_wake_up+0xab/0x1930 [ 128.649593] up+0x75/0xb0 [ 128.649621] __up_console_sem+0x6e/0x80 [ 128.649650] console_unlock+0x46a/0x590 [ 128.649679] vprintk_emit+0x1bd/0x560 [ 128.649709] vprintk+0x84/0xa0 [ 128.649738] _printk+0xba/0xf1 [ 128.649761] kauditd_hold_skb.cold+0x3f/0x4e [ 128.649794] kauditd_send_queue+0x233/0x290 [ 128.649822] kauditd_thread+0x5f9/0x9c0 [ 128.649847] kthread+0x2ed/0x3a0 [ 128.649873] ret_from_fork+0x22/0x30 [ 128.649895] [ 128.649895] -> #0 ((console_sem).lock){....}-{2:2}: [ 128.649921] __lock_acquire+0x2a02/0x5e70 [ 128.649951] lock_acquire+0x1a2/0x530 [ 128.649980] _raw_spin_lock_irqsave+0x39/0x60 [ 128.650002] down_trylock+0xe/0x70 [ 128.650032] __down_trylock_console_sem+0x3b/0xd0 [ 128.650062] vprintk_emit+0x16b/0x560 [ 128.650091] vprintk+0x84/0xa0 [ 128.650120] _printk+0xba/0xf1 [ 128.650141] report_bug.cold+0x72/0xab [ 128.650159] handle_bug+0x3c/0x70 [ 128.650177] exc_invalid_op+0x14/0x50 [ 128.650196] asm_exc_invalid_op+0x16/0x20 [ 128.650220] group_sched_out.part.0+0x2c7/0x460 [ 128.650253] ctx_sched_out+0x8f1/0xc10 [ 128.650284] __perf_event_task_sched_out+0x6d0/0x18d0 [ 128.650304] __schedule+0xedd/0x2470 [ 128.650332] schedule+0xda/0x1b0 [ 128.650358] exit_to_user_mode_prepare+0x114/0x1a0 [ 128.650378] syscall_exit_to_user_mode+0x19/0x40 [ 128.650404] do_syscall_64+0x48/0x90 [ 128.650422] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 128.650448] [ 128.650448] other info that might help us debug this: [ 128.650448] [ 128.650452] Chain exists of: [ 128.650452] (console_sem).lock --> &rq->__lock --> &ctx->lock [ 128.650452] [ 128.650480] Possible unsafe locking scenario: [ 128.650480] [ 128.650485] CPU0 CPU1 [ 128.650489] ---- ---- [ 128.650493] lock(&ctx->lock); [ 128.650503] lock(&rq->__lock); [ 128.650515] lock(&ctx->lock); [ 128.650527] lock((console_sem).lock); [ 128.650537] [ 128.650537] *** DEADLOCK *** [ 128.650537] [ 128.650541] 2 locks held by syz-executor.1/3971: [ 128.650553] #0: ffff88806cf37e98 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x1cf/0x2470 [ 128.650610] #1: ffff888008966820 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 128.650659] [ 128.650659] stack backtrace: [ 128.650663] CPU: 1 PID: 3971 Comm: syz-executor.1 Not tainted 6.0.0-next-20221006 #1 [ 128.650686] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 128.650698] Call Trace: [ 128.650704] [ 128.650710] dump_stack_lvl+0x8b/0xb3 [ 128.650732] check_noncircular+0x263/0x2e0 [ 128.650762] ? format_decode+0x26c/0xb50 [ 128.650793] ? print_circular_bug+0x450/0x450 [ 128.650825] ? simple_strtoul+0x30/0x30 [ 128.650856] ? format_decode+0x26c/0xb50 [ 128.650890] ? alloc_chain_hlocks+0x1ec/0x5a0 [ 128.650923] __lock_acquire+0x2a02/0x5e70 [ 128.650963] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 128.651005] lock_acquire+0x1a2/0x530 [ 128.651035] ? down_trylock+0xe/0x70 [ 128.651069] ? lock_release+0x750/0x750 [ 128.651107] ? vprintk+0x84/0xa0 [ 128.651140] _raw_spin_lock_irqsave+0x39/0x60 [ 128.651163] ? down_trylock+0xe/0x70 [ 128.651195] down_trylock+0xe/0x70 [ 128.651227] ? vprintk+0x84/0xa0 [ 128.651258] __down_trylock_console_sem+0x3b/0xd0 [ 128.651290] vprintk_emit+0x16b/0x560 [ 128.651325] vprintk+0x84/0xa0 [ 128.651357] _printk+0xba/0xf1 [ 128.651380] ? record_print_text.cold+0x16/0x16 [ 128.651412] ? report_bug.cold+0x66/0xab [ 128.651432] ? group_sched_out.part.0+0x2c7/0x460 [ 128.651466] report_bug.cold+0x72/0xab [ 128.651488] handle_bug+0x3c/0x70 [ 128.651508] exc_invalid_op+0x14/0x50 [ 128.651529] asm_exc_invalid_op+0x16/0x20 [ 128.651555] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 128.651593] Code: 5e 41 5f e9 5b a5 ef ff e8 56 a5 ef ff 65 8b 1d 1b fe ab 7e 31 ff 89 de e8 f6 a1 ef ff 85 db 0f 84 8a 00 00 00 e8 39 a5 ef ff <0f> 0b e9 a5 fe ff ff e8 2d a5 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 128.651614] RSP: 0018:ffff88803ff67c48 EFLAGS: 00010006 [ 128.651630] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 128.651644] RDX: ffff888020a28000 RSI: ffffffff815677b7 RDI: 0000000000000005 [ 128.651658] RBP: ffff88803f778000 R08: 0000000000000005 R09: 0000000000000001 [ 128.651672] R10: 0000000000000000 R11: ffffffff865b605b R12: ffff888008966800 [ 128.651686] R13: ffff88806cf3d2c0 R14: ffffffff8547d200 R15: 0000000000000002 [ 128.651706] ? group_sched_out.part.0+0x2c7/0x460 [ 128.651743] ? group_sched_out.part.0+0x2c7/0x460 [ 128.651780] ctx_sched_out+0x8f1/0xc10 [ 128.651816] __perf_event_task_sched_out+0x6d0/0x18d0 [ 128.651842] ? lock_is_held_type+0xd7/0x130 [ 128.651871] ? __perf_cgroup_move+0x160/0x160 [ 128.651890] ? set_next_entity+0x304/0x550 [ 128.651923] ? update_curr+0x267/0x740 [ 128.651957] ? lock_is_held_type+0xd7/0x130 [ 128.651985] __schedule+0xedd/0x2470 [ 128.652020] ? io_schedule_timeout+0x150/0x150 [ 128.652053] ? rcu_read_lock_sched_held+0x3e/0x80 [ 128.652091] schedule+0xda/0x1b0 [ 128.652121] exit_to_user_mode_prepare+0x114/0x1a0 [ 128.652143] syscall_exit_to_user_mode+0x19/0x40 [ 128.652171] do_syscall_64+0x48/0x90 [ 128.652191] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 128.652218] RIP: 0033:0x7f6473fdab19 [ 128.652234] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 128.652254] RSP: 002b:00007f6471550218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 128.652274] RAX: 0000000000000001 RBX: 00007f64740edf68 RCX: 00007f6473fdab19 [ 128.652288] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f64740edf6c [ 128.652301] RBP: 00007f64740edf60 R08: 000000000000000e R09: 0000000000000000 [ 128.652314] R10: 0000000000000003 R11: 0000000000000246 R12: 00007f64740edf6c [ 128.652327] R13: 00007ffe9c1cd65f R14: 00007f6471550300 R15: 0000000000022000 [ 128.652351] [ 128.743581] WARNING: CPU: 1 PID: 3971 at kernel/events/core.c:2309 group_sched_out.part.0+0x2c7/0x460 [ 128.744670] Modules linked in: [ 128.745066] CPU: 1 PID: 3971 Comm: syz-executor.1 Not tainted 6.0.0-next-20221006 #1 [ 128.745978] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 128.746934] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 128.747598] Code: 5e 41 5f e9 5b a5 ef ff e8 56 a5 ef ff 65 8b 1d 1b fe ab 7e 31 ff 89 de e8 f6 a1 ef ff 85 db 0f 84 8a 00 00 00 e8 39 a5 ef ff <0f> 0b e9 a5 fe ff ff e8 2d a5 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 128.749706] RSP: 0018:ffff88803ff67c48 EFLAGS: 00010006 [ 128.750341] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 128.751185] RDX: ffff888020a28000 RSI: ffffffff815677b7 RDI: 0000000000000005 [ 128.752018] RBP: ffff88803f778000 R08: 0000000000000005 R09: 0000000000000001 [ 128.752872] R10: 0000000000000000 R11: ffffffff865b605b R12: ffff888008966800 [ 128.753713] R13: ffff88806cf3d2c0 R14: ffffffff8547d200 R15: 0000000000000002 [ 128.754555] FS: 00007f6471550700(0000) GS:ffff88806cf00000(0000) knlGS:0000000000000000 [ 128.755501] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 128.756192] CR2: 00007fb1afde0f28 CR3: 000000003d390000 CR4: 0000000000350ee0 [ 128.757036] Call Trace: [ 128.757352] [ 128.757633] ctx_sched_out+0x8f1/0xc10 [ 128.758122] __perf_event_task_sched_out+0x6d0/0x18d0 [ 128.758747] ? lock_is_held_type+0xd7/0x130 [ 128.759273] ? __perf_cgroup_move+0x160/0x160 [ 128.759813] ? set_next_entity+0x304/0x550 [ 128.760334] ? update_curr+0x267/0x740 [ 128.760836] ? lock_is_held_type+0xd7/0x130 [ 128.761372] __schedule+0xedd/0x2470 [ 128.761836] ? io_schedule_timeout+0x150/0x150 [ 128.762396] ? rcu_read_lock_sched_held+0x3e/0x80 [ 128.762990] schedule+0xda/0x1b0 [ 128.763417] exit_to_user_mode_prepare+0x114/0x1a0 [ 128.764008] syscall_exit_to_user_mode+0x19/0x40 [ 128.764586] do_syscall_64+0x48/0x90 [ 128.765038] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 128.765656] RIP: 0033:0x7f6473fdab19 [ 128.766103] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 128.768214] RSP: 002b:00007f6471550218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 128.769129] RAX: 0000000000000001 RBX: 00007f64740edf68 RCX: 00007f6473fdab19 [ 128.769970] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f64740edf6c [ 128.770810] RBP: 00007f64740edf60 R08: 000000000000000e R09: 0000000000000000 [ 128.771639] R10: 0000000000000003 R11: 0000000000000246 R12: 00007f64740edf6c [ 128.772633] R13: 00007ffe9c1cd65f R14: 00007f6471550300 R15: 0000000000022000 [ 128.773500] [ 128.773792] irq event stamp: 780 [ 128.774206] hardirqs last enabled at (779): [] exit_to_user_mode_prepare+0x109/0x1a0 [ 128.775308] hardirqs last disabled at (780): [] __schedule+0x1225/0x2470 [ 128.776307] softirqs last enabled at (560): [] __irq_exit_rcu+0x11b/0x180 [ 128.777353] softirqs last disabled at (471): [] __irq_exit_rcu+0x11b/0x180 [ 128.778374] ---[ end trace 0000000000000000 ]--- 11:41:40 executing program 6: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/sockcreate\x00', 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000040)={0x0, 0x2, 0x0, 0x0, 0xffffffffffffffff}) [ 129.036473] hrtimer: interrupt took 35306 ns [ 129.462400] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 129.506457] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=19 sclass=netlink_audit_socket pid=3971 comm=syz-executor.1 [ 129.508578] raw_sendmsg: syz-executor.1 forgot to set AF_INET. Fix it! 11:41:41 executing program 0: syz_read_part_table(0x0, 0x2, &(0x7f0000000880)=[{&(0x7f0000000580)}, {0x0, 0x0, 0x80000000}]) 11:41:41 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x24e1, 0x0) ioctl$EXT4_IOC_GETSTATE(r0, 0x40086607, &(0x7f0000002000)) 11:41:41 executing program 5: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRES32=0xffffffffffffffff, @ANYRESDEC=r1]) ioctl$SIOCGSTAMPNS(r3, 0x8907, &(0x7f0000000040)) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000080)=0x8) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r5) r6 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r5, r6) keyctl$search(0xa, r2, &(0x7f00000000c0)='.request_key_auth\x00', &(0x7f0000000180)={'syz', 0x3}, r6) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0xcb3, 0x0, 0x0, 0xfffffffffffffffd}) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000080), 0x0) 11:41:41 executing program 6: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/sockcreate\x00', 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000040)={0x0, 0x2, 0x0, 0x0, 0xffffffffffffffff}) 11:41:41 executing program 3: semtimedop(0x0, &(0x7f0000000440)=[{0x0, 0x8f62}], 0x1, 0x0) 11:41:41 executing program 4: socket$inet_icmp(0x2, 0x2, 0x1) 11:41:41 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000019240)=[{{0x0, 0x0, &(0x7f0000014940)=[{0x0}, {0x0}], 0x2}}], 0x1, 0x0, 0x0) 11:41:41 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000001380)) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000880)={0x28, r0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MAC={0xc, 0x6, @device_b}]}, 0x28}}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') preadv(r2, &(0x7f0000001140)=[{&(0x7f0000000140)=""/4096, 0x1000}], 0x1, 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000180)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000100)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18, r5, 0x301, 0x0, 0x0, {0x4}, [@ETHTOOL_A_PAUSE_HEADER={0x4}]}, 0x18}}, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r6, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r8, @remote, @broadcast}}}], 0x20}, 0x0) getsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000040)={@broadcast, @loopback, 0x0}, &(0x7f00000011c0)=0xc) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000001340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000001300)={&(0x7f0000001200)={0xe8, r5, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@ETHTOOL_A_PAUSE_HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}]}, @ETHTOOL_A_PAUSE_TX={0x5, 0x4, 0x1}, @ETHTOOL_A_PAUSE_HEADER={0x64, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xe8}}, 0x800) [ 129.583642] loop0: detected capacity change from 0 to 264192 11:41:41 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x24e1, 0x0) ioctl$EXT4_IOC_GETSTATE(r0, 0x40086607, &(0x7f0000002000)) 11:41:41 executing program 0: syz_read_part_table(0x0, 0x2, &(0x7f0000000880)=[{&(0x7f0000000580)}, {0x0, 0x0, 0x80000000}]) 11:41:41 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000001380)) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000880)={0x28, r0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MAC={0xc, 0x6, @device_b}]}, 0x28}}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') preadv(r2, &(0x7f0000001140)=[{&(0x7f0000000140)=""/4096, 0x1000}], 0x1, 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000180)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000100)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18, r5, 0x301, 0x0, 0x0, {0x4}, [@ETHTOOL_A_PAUSE_HEADER={0x4}]}, 0x18}}, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r6, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r8, @remote, @broadcast}}}], 0x20}, 0x0) getsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000040)={@broadcast, @loopback, 0x0}, &(0x7f00000011c0)=0xc) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000001340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000001300)={&(0x7f0000001200)={0xe8, r5, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@ETHTOOL_A_PAUSE_HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}]}, @ETHTOOL_A_PAUSE_TX={0x5, 0x4, 0x1}, @ETHTOOL_A_PAUSE_HEADER={0x64, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xe8}}, 0x800) 11:41:41 executing program 5: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRES32=0xffffffffffffffff, @ANYRESDEC=r1]) ioctl$SIOCGSTAMPNS(r3, 0x8907, &(0x7f0000000040)) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000080)=0x8) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r5) r6 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r5, r6) keyctl$search(0xa, r2, &(0x7f00000000c0)='.request_key_auth\x00', &(0x7f0000000180)={'syz', 0x3}, r6) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0xcb3, 0x0, 0x0, 0xfffffffffffffffd}) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000080), 0x0) [ 129.718833] loop0: detected capacity change from 0 to 264192 [ 129.783304] netlink: 'syz-executor.4': attribute type 11 has an invalid length. 11:41:42 executing program 3: syz_mount_image$vfat(&(0x7f0000001540), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f0000001680)={[{@numtail}, {@uni_xlateno}, {@utf8}]}) 11:41:42 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000001380)) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000880)={0x28, r0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MAC={0xc, 0x6, @device_b}]}, 0x28}}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') preadv(r2, &(0x7f0000001140)=[{&(0x7f0000000140)=""/4096, 0x1000}], 0x1, 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000180)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000100)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18, r5, 0x301, 0x0, 0x0, {0x4}, [@ETHTOOL_A_PAUSE_HEADER={0x4}]}, 0x18}}, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r6, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r8, @remote, @broadcast}}}], 0x20}, 0x0) getsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000040)={@broadcast, @loopback, 0x0}, &(0x7f00000011c0)=0xc) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000001340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000001300)={&(0x7f0000001200)={0xe8, r5, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@ETHTOOL_A_PAUSE_HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}]}, @ETHTOOL_A_PAUSE_TX={0x5, 0x4, 0x1}, @ETHTOOL_A_PAUSE_HEADER={0x64, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xe8}}, 0x800) 11:41:42 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x24e1, 0x0) ioctl$EXT4_IOC_GETSTATE(r0, 0x40086607, &(0x7f0000002000)) 11:41:42 executing program 5: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRES32=0xffffffffffffffff, @ANYRESDEC=r1]) ioctl$SIOCGSTAMPNS(r3, 0x8907, &(0x7f0000000040)) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000080)=0x8) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r5) r6 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r5, r6) keyctl$search(0xa, r2, &(0x7f00000000c0)='.request_key_auth\x00', &(0x7f0000000180)={'syz', 0x3}, r6) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0xcb3, 0x0, 0x0, 0xfffffffffffffffd}) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000080), 0x0) 11:41:42 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000001380)) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000880)={0x28, r0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MAC={0xc, 0x6, @device_b}]}, 0x28}}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') preadv(r2, &(0x7f0000001140)=[{&(0x7f0000000140)=""/4096, 0x1000}], 0x1, 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000180)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000100)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18, r5, 0x301, 0x0, 0x0, {0x4}, [@ETHTOOL_A_PAUSE_HEADER={0x4}]}, 0x18}}, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r6, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r8, @remote, @broadcast}}}], 0x20}, 0x0) getsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000040)={@broadcast, @loopback, 0x0}, &(0x7f00000011c0)=0xc) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000001340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000001300)={&(0x7f0000001200)={0xe8, r5, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@ETHTOOL_A_PAUSE_HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}]}, @ETHTOOL_A_PAUSE_TX={0x5, 0x4, 0x1}, @ETHTOOL_A_PAUSE_HEADER={0x64, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xe8}}, 0x800) 11:41:42 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000001380)) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000880)={0x28, r0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MAC={0xc, 0x6, @device_b}]}, 0x28}}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') preadv(r2, &(0x7f0000001140)=[{&(0x7f0000000140)=""/4096, 0x1000}], 0x1, 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000180)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000100)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18, r5, 0x301, 0x0, 0x0, {0x4}, [@ETHTOOL_A_PAUSE_HEADER={0x4}]}, 0x18}}, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r6, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r8, @remote, @broadcast}}}], 0x20}, 0x0) getsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000040)={@broadcast, @loopback, 0x0}, &(0x7f00000011c0)=0xc) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000001340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000001300)={&(0x7f0000001200)={0xe8, r5, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@ETHTOOL_A_PAUSE_HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}]}, @ETHTOOL_A_PAUSE_TX={0x5, 0x4, 0x1}, @ETHTOOL_A_PAUSE_HEADER={0x64, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xe8}}, 0x800) 11:41:42 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000019240)=[{{0x0, 0x0, &(0x7f0000014940)=[{0x0}, {0x0}], 0x2}}], 0x1, 0x0, 0x0) 11:41:42 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000001380)) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000880)={0x28, r0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MAC={0xc, 0x6, @device_b}]}, 0x28}}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') preadv(r2, &(0x7f0000001140)=[{&(0x7f0000000140)=""/4096, 0x1000}], 0x1, 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000180)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000100)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18, r5, 0x301, 0x0, 0x0, {0x4}, [@ETHTOOL_A_PAUSE_HEADER={0x4}]}, 0x18}}, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r6, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r8, @remote, @broadcast}}}], 0x20}, 0x0) getsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000040)={@broadcast, @loopback, 0x0}, &(0x7f00000011c0)=0xc) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000001340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000001300)={&(0x7f0000001200)={0xe8, r5, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@ETHTOOL_A_PAUSE_HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}]}, @ETHTOOL_A_PAUSE_TX={0x5, 0x4, 0x1}, @ETHTOOL_A_PAUSE_HEADER={0x64, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xe8}}, 0x800) [ 130.479993] FAT-fs (loop3): bogus number of reserved sectors [ 130.480557] FAT-fs (loop3): Can't find a valid FAT filesystem [ 130.539068] FAT-fs (loop3): bogus number of reserved sectors [ 130.539673] FAT-fs (loop3): Can't find a valid FAT filesystem [ 130.544152] netlink: 'syz-executor.6': attribute type 11 has an invalid length. [ 130.547600] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 130.565316] netlink: 'syz-executor.0': attribute type 11 has an invalid length. 11:41:42 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) 11:41:42 executing program 5: r0 = socket$inet(0x2, 0x3, 0x8) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, &(0x7f0000000980)) 11:41:42 executing program 2: openat$urandom(0xffffffffffffff9c, &(0x7f0000000780), 0x2e000, 0x0) 11:41:42 executing program 5: r0 = socket$inet(0x2, 0x3, 0x8) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, &(0x7f0000000980)) 11:41:43 executing program 3: eventfd2(0x0, 0x803) 11:41:43 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='fdinfo/3\x00') read$hiddev(r0, &(0x7f0000000200)=""/114, 0x72) 11:41:43 executing program 5: r0 = socket$inet(0x2, 0x3, 0x8) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, &(0x7f0000000980)) 11:41:43 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000001380)) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000880)={0x28, r0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MAC={0xc, 0x6, @device_b}]}, 0x28}}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') preadv(r2, &(0x7f0000001140)=[{&(0x7f0000000140)=""/4096, 0x1000}], 0x1, 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000180)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000100)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18, r5, 0x301, 0x0, 0x0, {0x4}, [@ETHTOOL_A_PAUSE_HEADER={0x4}]}, 0x18}}, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r6, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r8, @remote, @broadcast}}}], 0x20}, 0x0) getsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000040)={@broadcast, @loopback, 0x0}, &(0x7f00000011c0)=0xc) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000001340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000001300)={&(0x7f0000001200)={0xe8, r5, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@ETHTOOL_A_PAUSE_HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}]}, @ETHTOOL_A_PAUSE_TX={0x5, 0x4, 0x1}, @ETHTOOL_A_PAUSE_HEADER={0x64, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xe8}}, 0x800) 11:41:43 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000001380)) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000880)={0x28, r0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MAC={0xc, 0x6, @device_b}]}, 0x28}}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') preadv(r2, &(0x7f0000001140)=[{&(0x7f0000000140)=""/4096, 0x1000}], 0x1, 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000180)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000100)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18, r5, 0x301, 0x0, 0x0, {0x4}, [@ETHTOOL_A_PAUSE_HEADER={0x4}]}, 0x18}}, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r6, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r8, @remote, @broadcast}}}], 0x20}, 0x0) getsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000040)={@broadcast, @loopback, 0x0}, &(0x7f00000011c0)=0xc) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000001340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000001300)={&(0x7f0000001200)={0xe8, r5, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@ETHTOOL_A_PAUSE_HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}]}, @ETHTOOL_A_PAUSE_TX={0x5, 0x4, 0x1}, @ETHTOOL_A_PAUSE_HEADER={0x64, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xe8}}, 0x800) 11:41:43 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000001380)) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000880)={0x28, r0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MAC={0xc, 0x6, @device_b}]}, 0x28}}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') preadv(r2, &(0x7f0000001140)=[{&(0x7f0000000140)=""/4096, 0x1000}], 0x1, 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000180)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000100)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18, r5, 0x301, 0x0, 0x0, {0x4}, [@ETHTOOL_A_PAUSE_HEADER={0x4}]}, 0x18}}, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r6, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r8, @remote, @broadcast}}}], 0x20}, 0x0) getsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000040)={@broadcast, @loopback, 0x0}, &(0x7f00000011c0)=0xc) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000001340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000001300)={&(0x7f0000001200)={0xe8, r5, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@ETHTOOL_A_PAUSE_HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}]}, @ETHTOOL_A_PAUSE_TX={0x5, 0x4, 0x1}, @ETHTOOL_A_PAUSE_HEADER={0x64, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xe8}}, 0x800) 11:41:43 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000001380)) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000880)={0x28, r0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MAC={0xc, 0x6, @device_b}]}, 0x28}}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') preadv(r2, &(0x7f0000001140)=[{&(0x7f0000000140)=""/4096, 0x1000}], 0x1, 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000180)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000100)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18, r5, 0x301, 0x0, 0x0, {0x4}, [@ETHTOOL_A_PAUSE_HEADER={0x4}]}, 0x18}}, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r6, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r8, @remote, @broadcast}}}], 0x20}, 0x0) getsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000040)={@broadcast, @loopback, 0x0}, &(0x7f00000011c0)=0xc) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000001340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000001300)={&(0x7f0000001200)={0xe8, r5, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@ETHTOOL_A_PAUSE_HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}]}, @ETHTOOL_A_PAUSE_TX={0x5, 0x4, 0x1}, @ETHTOOL_A_PAUSE_HEADER={0x64, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xe8}}, 0x800) 11:41:43 executing program 7: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000), 0x6) ioctl$sock_bt_hci(r0, 0x800448d5, &(0x7f0000000100)) 11:41:43 executing program 3: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) 11:41:43 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='fdinfo/3\x00') read$hiddev(r0, &(0x7f0000000200)=""/114, 0x72) 11:41:43 executing program 5: r0 = socket$inet(0x2, 0x3, 0x8) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, &(0x7f0000000980)) 11:41:43 executing program 7: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000), 0x6) ioctl$sock_bt_hci(r0, 0x800448d5, &(0x7f0000000100)) 11:41:43 executing program 5: rt_sigqueueinfo(0xffffffffffffffff, 0x1d, &(0x7f0000000400)={0x0, 0x0, 0x3}) 11:41:43 executing program 7: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000), 0x6) ioctl$sock_bt_hci(r0, 0x800448d5, &(0x7f0000000100)) 11:41:43 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='fdinfo/3\x00') read$hiddev(r0, &(0x7f0000000200)=""/114, 0x72) 11:41:43 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000b00), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000180)=ANY=[@ANYBLOB="010000000100000018", @ANYRES32=r0]) [ 131.820096] autofs4:pid:4107:validate_dev_ioctl: invalid path supplied for cmd(0xc0189375) [ 131.947002] autofs4:pid:4112:validate_dev_ioctl: invalid path supplied for cmd(0xc0189375) 11:41:44 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x41) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x0, @time={0x9}, {}, {}, @control}], 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x1bb, @time}) 11:41:44 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000001380)) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000880)={0x28, r0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MAC={0xc, 0x6, @device_b}]}, 0x28}}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') preadv(r2, &(0x7f0000001140)=[{&(0x7f0000000140)=""/4096, 0x1000}], 0x1, 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000180)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000100)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18, r5, 0x301, 0x0, 0x0, {0x4}, [@ETHTOOL_A_PAUSE_HEADER={0x4}]}, 0x18}}, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r6, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r8, @remote, @broadcast}}}], 0x20}, 0x0) getsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000040)={@broadcast, @loopback, 0x0}, &(0x7f00000011c0)=0xc) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000001340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000001300)={&(0x7f0000001200)={0xe8, r5, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@ETHTOOL_A_PAUSE_HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}]}, @ETHTOOL_A_PAUSE_TX={0x5, 0x4, 0x1}, @ETHTOOL_A_PAUSE_HEADER={0x64, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xe8}}, 0x800) 11:41:44 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000b00), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000180)=ANY=[@ANYBLOB="010000000100000018", @ANYRES32=r0]) 11:41:44 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000001380)) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000880)={0x28, r0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MAC={0xc, 0x6, @device_b}]}, 0x28}}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') preadv(r2, &(0x7f0000001140)=[{&(0x7f0000000140)=""/4096, 0x1000}], 0x1, 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000180)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000100)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18, r5, 0x301, 0x0, 0x0, {0x4}, [@ETHTOOL_A_PAUSE_HEADER={0x4}]}, 0x18}}, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r6, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r8, @remote, @broadcast}}}], 0x20}, 0x0) getsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000040)={@broadcast, @loopback, 0x0}, &(0x7f00000011c0)=0xc) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000001340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000001300)={&(0x7f0000001200)={0xe8, r5, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@ETHTOOL_A_PAUSE_HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}]}, @ETHTOOL_A_PAUSE_TX={0x5, 0x4, 0x1}, @ETHTOOL_A_PAUSE_HEADER={0x64, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xe8}}, 0x800) 11:41:44 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f00000002c0), 0x6) ioctl$sock_bt_hci(r0, 0x0, 0x0) 11:41:44 executing program 7: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000), 0x6) ioctl$sock_bt_hci(r0, 0x800448d5, &(0x7f0000000100)) 11:41:44 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='fdinfo/3\x00') read$hiddev(r0, &(0x7f0000000200)=""/114, 0x72) [ 132.537293] autofs4:pid:4126:validate_dev_ioctl: invalid path supplied for cmd(0xc0189375) [ 132.679677] autofs4:pid:4141:validate_dev_ioctl: invalid path supplied for cmd(0xc0189375) 11:41:44 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000ac0), 0x0, 0x0) ioctl$EVIOCRMFF(r0, 0x40044581, 0x0) 11:41:44 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f00000002c0), 0x6) ioctl$sock_bt_hci(r0, 0x0, 0x0) 11:41:44 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000b00), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000180)=ANY=[@ANYBLOB="010000000100000018", @ANYRES32=r0]) 11:41:44 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f00000002c0), 0x6) ioctl$sock_bt_hci(r0, 0x0, 0x0) 11:41:44 executing program 5: setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) r0 = socket(0x2, 0x80000, 0x9) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000040)=[@window={0x3, 0x80, 0x3}], 0x1) sendmsg$BATADV_CMD_GET_HARDIF(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, 0x0, 0x2, 0x70bd26, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x9}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x81}, 0x24000001) fork() 11:41:44 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000b00), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000180)=ANY=[@ANYBLOB="010000000100000018", @ANYRES32=r0]) 11:41:44 executing program 1: syz_mount_image$vfat(&(0x7f0000008700), &(0x7f0000008740)='./file0\x00', 0x0, 0x1, &(0x7f0000008c80)=[{&(0x7f0000008780)='1', 0x1}], 0x0, &(0x7f0000008d40)) 11:41:44 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) pwritev2(r0, &(0x7f0000001840)=[{&(0x7f00000017c0)="04", 0x1}], 0x1, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0xc020662a, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x0, 0x2, [{}, {}]}) 11:41:44 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x42) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@rthdrdstopts={{0x18}}, @flowinfo={{0x14, 0x29, 0xb, 0x5b14}}], 0x30}}], 0x1, 0x0) [ 132.791464] FAT-fs (loop1): bogus number of reserved sectors [ 132.792169] FAT-fs (loop1): Can't find a valid FAT filesystem [ 132.804742] FAT-fs (loop1): bogus number of reserved sectors [ 132.805401] FAT-fs (loop1): Can't find a valid FAT filesystem [ 132.807377] autofs4:pid:4156:validate_dev_ioctl: invalid path supplied for cmd(0xc0189375) 11:41:44 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) pwritev2(r0, &(0x7f0000001840)=[{&(0x7f00000017c0)="04", 0x1}], 0x1, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0xc020662a, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x0, 0x2, [{}, {}]}) 11:41:45 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f00000002c0), 0x6) ioctl$sock_bt_hci(r0, 0x0, 0x0) 11:41:45 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) pwritev2(r0, &(0x7f0000001840)=[{&(0x7f00000017c0)="04", 0x1}], 0x1, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0xc020662a, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x0, 0x2, [{}, {}]}) 11:41:45 executing program 2: mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) 11:41:45 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) pwritev2(r0, &(0x7f0000001840)=[{&(0x7f00000017c0)="04", 0x1}], 0x1, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0xc020662a, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x0, 0x2, [{}, {}]}) 11:41:45 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000002f40)) 11:41:45 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x1c, 0x2, 0x1, 0x201, 0x0, 0x0, {0x2, 0x2}, [@CTA_MARK={0x8}]}, 0x1c}}, 0x0) 11:41:45 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "9ce326fd36d22f886656430c24da160784af9e"}) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000040)) r1 = socket$packet(0x11, 0x3, 0x300) dup2(r1, r1) r2 = socket$packet(0x11, 0x3, 0x300) r3 = dup2(r2, r2) ioctl$sock_inet6_udp_SIOCINQ(r3, 0x541b, &(0x7f0000001a00)) socketpair(0x11, 0xa, 0xfffffffa, &(0x7f0000000100)={0xffffffffffffffff}) r5 = socket$packet(0x11, 0x3, 0x300) r6 = dup2(r5, r5) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f0000001a00)) recvmmsg$unix(r4, &(0x7f0000000c80)=[{{&(0x7f00000001c0)=@abs, 0x6e, &(0x7f00000005c0)=[{&(0x7f0000000240)=""/65, 0x41}, {&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/84, 0x54}, {&(0x7f00000003c0)=""/106, 0x6a}, {&(0x7f0000000440)=""/217, 0xd9}, {&(0x7f0000000540)=""/101, 0x65}], 0x6}}, {{&(0x7f0000000640), 0x6e, &(0x7f0000000b40)=[{&(0x7f00000006c0)=""/100, 0x64}, {&(0x7f0000000740)=""/198, 0xc6}, {&(0x7f0000000140)=""/38, 0x26}, {&(0x7f0000000840)=""/54, 0x36}, {&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000000940)=""/247, 0xf7}, {&(0x7f0000000a40)=""/229, 0xe5}], 0x7, &(0x7f0000000bc0)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xa8}}], 0x2, 0x2020, &(0x7f0000000d00)={0x77359400}) r7 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x881) write$binfmt_elf32(r7, &(0x7f0000000180)=ANY=[], 0xfffffecb) 11:41:45 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="232109c1"], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) 11:41:45 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) pwritev2(r0, &(0x7f0000001840)=[{&(0x7f00000017c0)="04", 0x1}], 0x1, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0xc020662a, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x0, 0x2, [{}, {}]}) 11:41:45 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) pwritev2(r0, &(0x7f0000001840)=[{&(0x7f00000017c0)="04", 0x1}], 0x1, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0xc020662a, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x0, 0x2, [{}, {}]}) [ 133.327463] process 'syz-executor.5' launched './file1' with NULL argv: empty string added 11:41:45 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x40b01, 0x0) write(r0, 0x0, 0x0) 11:41:45 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) pwritev2(r0, &(0x7f0000001840)=[{&(0x7f00000017c0)="04", 0x1}], 0x1, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0xc020662a, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x0, 0x2, [{}, {}]}) 11:41:45 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f0000000d00)={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x8) 11:41:45 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents(r0, &(0x7f0000000000)=""/94, 0x20000018) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents(r1, &(0x7f0000000000)=""/94, 0x20000018) 11:41:45 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f95010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f000000000000040040", 0x1d, 0x2080}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) r1 = open_tree(r0, &(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x6, 0x20, 0x9, 0x81, 0x0, 0x400, 0x18000, 0xc, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x80000001, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x440, 0x7712, 0x4, 0x5, 0x93b, 0x4, 0xfff, 0x0, 0x7fff, 0x0, 0x4}, r0, 0xa, r1, 0x2) 11:41:45 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_COALESCE(r0, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x2c, r1, 0x215, 0x0, 0x0, {{}, {@void, @val={0xc, 0x99, {0x0, 0x11}}}}, [@NL80211_ATTR_COALESCE_RULE_PKT_PATTERN={0xc, 0x3, 0x0, 0x1, [{0x8, 0x0, 0x0, 0x1, @NL80211_PKTPAT_PATTERN={0x4}}]}]}, 0x2c}}, 0x0) 11:41:45 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup.net/syz1\x00', 0x200002, 0x0) 11:41:45 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "9ce326fd36d22f886656430c24da160784af9e"}) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000040)) r1 = socket$packet(0x11, 0x3, 0x300) dup2(r1, r1) r2 = socket$packet(0x11, 0x3, 0x300) r3 = dup2(r2, r2) ioctl$sock_inet6_udp_SIOCINQ(r3, 0x541b, &(0x7f0000001a00)) socketpair(0x11, 0xa, 0xfffffffa, &(0x7f0000000100)={0xffffffffffffffff}) r5 = socket$packet(0x11, 0x3, 0x300) r6 = dup2(r5, r5) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f0000001a00)) recvmmsg$unix(r4, &(0x7f0000000c80)=[{{&(0x7f00000001c0)=@abs, 0x6e, &(0x7f00000005c0)=[{&(0x7f0000000240)=""/65, 0x41}, {&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/84, 0x54}, {&(0x7f00000003c0)=""/106, 0x6a}, {&(0x7f0000000440)=""/217, 0xd9}, {&(0x7f0000000540)=""/101, 0x65}], 0x6}}, {{&(0x7f0000000640), 0x6e, &(0x7f0000000b40)=[{&(0x7f00000006c0)=""/100, 0x64}, {&(0x7f0000000740)=""/198, 0xc6}, {&(0x7f0000000140)=""/38, 0x26}, {&(0x7f0000000840)=""/54, 0x36}, {&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000000940)=""/247, 0xf7}, {&(0x7f0000000a40)=""/229, 0xe5}], 0x7, &(0x7f0000000bc0)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xa8}}], 0x2, 0x2020, &(0x7f0000000d00)={0x77359400}) r7 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x881) write$binfmt_elf32(r7, &(0x7f0000000180)=ANY=[], 0xfffffecb) [ 133.472118] netlink: 'syz-executor.7': attribute type 3 has an invalid length. 11:41:45 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents(r0, &(0x7f0000000000)=""/94, 0x20000018) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents(r1, &(0x7f0000000000)=""/94, 0x20000018) [ 133.496171] netlink: 'syz-executor.7': attribute type 3 has an invalid length. 11:41:45 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents(r0, &(0x7f0000000000)=""/94, 0x20000018) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents(r1, &(0x7f0000000000)=""/94, 0x20000018) 11:41:45 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x28, 0x0, 0x0, 0xfffffffd}]}) [ 133.681107] loop3: detected capacity change from 0 to 2048 [ 134.200425] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: none. [ 134.222191] ext4 filesystem being mounted at /syzkaller-testdir568096328/syzkaller.HZFpzP/11/file0 supports timestamps until 2038 (0x7fffffff) [ 134.267796] EXT4-fs (loop3): unmounting filesystem. 11:41:46 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f95010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f000000000000040040", 0x1d, 0x2080}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) r1 = open_tree(r0, &(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x6, 0x20, 0x9, 0x81, 0x0, 0x400, 0x18000, 0xc, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x80000001, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x440, 0x7712, 0x4, 0x5, 0x93b, 0x4, 0xfff, 0x0, 0x7fff, 0x0, 0x4}, r0, 0xa, r1, 0x2) 11:41:46 executing program 7: mknod(&(0x7f0000008d80)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1a901e, 0x0) acct(&(0x7f0000000280)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 11:41:46 executing program 4: io_setup(0x9, &(0x7f0000000000)=0x0) r1 = signalfd(0xffffffffffffffff, &(0x7f00000011c0), 0x8) io_submit(r0, 0x1, &(0x7f00000010c0)=[&(0x7f0000001080)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) 11:41:46 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "9ce326fd36d22f886656430c24da160784af9e"}) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000040)) r1 = socket$packet(0x11, 0x3, 0x300) dup2(r1, r1) r2 = socket$packet(0x11, 0x3, 0x300) r3 = dup2(r2, r2) ioctl$sock_inet6_udp_SIOCINQ(r3, 0x541b, &(0x7f0000001a00)) socketpair(0x11, 0xa, 0xfffffffa, &(0x7f0000000100)={0xffffffffffffffff}) r5 = socket$packet(0x11, 0x3, 0x300) r6 = dup2(r5, r5) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f0000001a00)) recvmmsg$unix(r4, &(0x7f0000000c80)=[{{&(0x7f00000001c0)=@abs, 0x6e, &(0x7f00000005c0)=[{&(0x7f0000000240)=""/65, 0x41}, {&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/84, 0x54}, {&(0x7f00000003c0)=""/106, 0x6a}, {&(0x7f0000000440)=""/217, 0xd9}, {&(0x7f0000000540)=""/101, 0x65}], 0x6}}, {{&(0x7f0000000640), 0x6e, &(0x7f0000000b40)=[{&(0x7f00000006c0)=""/100, 0x64}, {&(0x7f0000000740)=""/198, 0xc6}, {&(0x7f0000000140)=""/38, 0x26}, {&(0x7f0000000840)=""/54, 0x36}, {&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000000940)=""/247, 0xf7}, {&(0x7f0000000a40)=""/229, 0xe5}], 0x7, &(0x7f0000000bc0)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xa8}}], 0x2, 0x2020, &(0x7f0000000d00)={0x77359400}) r7 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x881) write$binfmt_elf32(r7, &(0x7f0000000180)=ANY=[], 0xfffffecb) 11:41:46 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={&(0x7f0000000040)={0x2, 0x0, @local}, 0x10, 0x0}, 0x2000c040) listen(r0, 0x0) 11:41:46 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents(r0, &(0x7f0000000000)=""/94, 0x20000018) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents(r1, &(0x7f0000000000)=""/94, 0x20000018) 11:41:46 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents(r0, &(0x7f0000000000)=""/94, 0x20000018) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents(r1, &(0x7f0000000000)=""/94, 0x20000018) 11:41:46 executing program 1: close(0xffffffffffffffff) clone3(&(0x7f0000000640)={0x123363500, &(0x7f0000000080), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) 11:41:46 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={&(0x7f0000000040)={0x2, 0x0, @local}, 0x10, 0x0}, 0x2000c040) listen(r0, 0x0) [ 134.519530] Process accounting resumed [ 134.559316] loop3: detected capacity change from 0 to 2048 [ 134.645397] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: none. [ 134.650527] ext4 filesystem being mounted at /syzkaller-testdir568096328/syzkaller.HZFpzP/12/file0 supports timestamps until 2038 (0x7fffffff) [ 134.669570] Process accounting resumed [ 134.683320] EXT4-fs (loop3): unmounting filesystem. 11:41:46 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents(r0, &(0x7f0000000000)=""/94, 0x20000018) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents(r1, &(0x7f0000000000)=""/94, 0x20000018) 11:41:46 executing program 1: close(0xffffffffffffffff) clone3(&(0x7f0000000640)={0x123363500, &(0x7f0000000080), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) 11:41:46 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents(r0, &(0x7f0000000000)=""/94, 0x20000018) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents(r1, &(0x7f0000000000)=""/94, 0x20000018) 11:41:46 executing program 4: io_setup(0x9, &(0x7f0000000000)=0x0) r1 = signalfd(0xffffffffffffffff, &(0x7f00000011c0), 0x8) io_submit(r0, 0x1, &(0x7f00000010c0)=[&(0x7f0000001080)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) 11:41:46 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={&(0x7f0000000040)={0x2, 0x0, @local}, 0x10, 0x0}, 0x2000c040) listen(r0, 0x0) 11:41:46 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "9ce326fd36d22f886656430c24da160784af9e"}) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000040)) r1 = socket$packet(0x11, 0x3, 0x300) dup2(r1, r1) r2 = socket$packet(0x11, 0x3, 0x300) r3 = dup2(r2, r2) ioctl$sock_inet6_udp_SIOCINQ(r3, 0x541b, &(0x7f0000001a00)) socketpair(0x11, 0xa, 0xfffffffa, &(0x7f0000000100)={0xffffffffffffffff}) r5 = socket$packet(0x11, 0x3, 0x300) r6 = dup2(r5, r5) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f0000001a00)) recvmmsg$unix(r4, &(0x7f0000000c80)=[{{&(0x7f00000001c0)=@abs, 0x6e, &(0x7f00000005c0)=[{&(0x7f0000000240)=""/65, 0x41}, {&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/84, 0x54}, {&(0x7f00000003c0)=""/106, 0x6a}, {&(0x7f0000000440)=""/217, 0xd9}, {&(0x7f0000000540)=""/101, 0x65}], 0x6}}, {{&(0x7f0000000640), 0x6e, &(0x7f0000000b40)=[{&(0x7f00000006c0)=""/100, 0x64}, {&(0x7f0000000740)=""/198, 0xc6}, {&(0x7f0000000140)=""/38, 0x26}, {&(0x7f0000000840)=""/54, 0x36}, {&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000000940)=""/247, 0xf7}, {&(0x7f0000000a40)=""/229, 0xe5}], 0x7, &(0x7f0000000bc0)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xa8}}], 0x2, 0x2020, &(0x7f0000000d00)={0x77359400}) r7 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x881) write$binfmt_elf32(r7, &(0x7f0000000180)=ANY=[], 0xfffffecb) 11:41:46 executing program 7: mknod(&(0x7f0000008d80)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1a901e, 0x0) acct(&(0x7f0000000280)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 11:41:46 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f95010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f000000000000040040", 0x1d, 0x2080}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) r1 = open_tree(r0, &(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x6, 0x20, 0x9, 0x81, 0x0, 0x400, 0x18000, 0xc, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x80000001, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x440, 0x7712, 0x4, 0x5, 0x93b, 0x4, 0xfff, 0x0, 0x7fff, 0x0, 0x4}, r0, 0xa, r1, 0x2) [ 134.774809] Process accounting resumed 11:41:46 executing program 1: close(0xffffffffffffffff) clone3(&(0x7f0000000640)={0x123363500, &(0x7f0000000080), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) 11:41:46 executing program 4: io_setup(0x9, &(0x7f0000000000)=0x0) r1 = signalfd(0xffffffffffffffff, &(0x7f00000011c0), 0x8) io_submit(r0, 0x1, &(0x7f00000010c0)=[&(0x7f0000001080)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) 11:41:46 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={&(0x7f0000000040)={0x2, 0x0, @local}, 0x10, 0x0}, 0x2000c040) listen(r0, 0x0) 11:41:46 executing program 7: mknod(&(0x7f0000008d80)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1a901e, 0x0) acct(&(0x7f0000000280)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 11:41:46 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={&(0x7f0000000040)={0x2, 0x0, @local}, 0x10, 0x0}, 0x2000c040) listen(r0, 0x0) 11:41:46 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000200)=0x13) 11:41:46 executing program 1: close(0xffffffffffffffff) clone3(&(0x7f0000000640)={0x123363500, &(0x7f0000000080), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) 11:41:46 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={&(0x7f0000000040)={0x2, 0x0, @local}, 0x10, 0x0}, 0x2000c040) listen(r0, 0x0) 11:41:46 executing program 2: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f0000000080)='system_u:object_r:autofs_device_t:s0\x00', 0x25) r1 = fsopen(&(0x7f0000000000)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000080)='./file0\x00', r2, &(0x7f0000000040)='./file0\x00') 11:41:46 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)=ANY=[@ANYBLOB="1c00000018003f05000000000000000002000000d8c93106"], 0x1c}], 0x1}, 0x0) [ 134.942717] audit: type=1400 audit(1665056506.912:9): avc: denied { create } for pid=4282 comm="syz-executor.2" name="file0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:autofs_device_t:s0 tclass=lnk_file permissive=1 11:41:46 executing program 4: io_setup(0x9, &(0x7f0000000000)=0x0) r1 = signalfd(0xffffffffffffffff, &(0x7f00000011c0), 0x8) io_submit(r0, 0x1, &(0x7f00000010c0)=[&(0x7f0000001080)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) [ 134.948039] audit: type=1400 audit(1665056506.912:10): avc: denied { associate } for pid=4282 comm="syz-executor.2" name="file0" scontext=system_u:object_r:autofs_device_t:s0 tcontext=system_u:object_r:hugetlbfs_t:s0 tclass=filesystem permissive=1 [ 134.955469] Process accounting resumed [ 135.000012] loop3: detected capacity change from 0 to 2048 [ 135.015618] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: none. [ 135.019684] ext4 filesystem being mounted at /syzkaller-testdir568096328/syzkaller.HZFpzP/13/file0 supports timestamps until 2038 (0x7fffffff) 11:41:47 executing program 0: r0 = getpid() kcmp(r0, 0x0, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_init() perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 11:41:47 executing program 7: mknod(&(0x7f0000008d80)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1a901e, 0x0) acct(&(0x7f0000000280)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 11:41:47 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)=ANY=[@ANYBLOB="1c00000018003f05000000000000000002000000d8c93106"], 0x1c}], 0x1}, 0x0) 11:41:47 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000200)=@v1={0x1000000, [{0x3, 0x40}]}, 0xc, 0x3) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) r3 = dup3(0xffffffffffffffff, r2, 0x0) writev(r3, &(0x7f0000000040)=[{&(0x7f0000000540)="bd04b6e78286fa9b6d2d78ac298542be700e31ad8d4bf191125e543aacf0538a5c71acde8cb724a57fb0506a9a70ddf405ba6207bd61ab8ffb79e8229ceb9c1d3b0733a61431c37818fa6039f420e826db081d2ad98a8e789cd9fdc06611c37ca68b391e22fcc28ba768fabd7e5bd7aa09f95e15f1420cd5457bb66633bec2be5ce94ad2603aff5015bcf474daf88581d0abb6f66560622ecbdb0e8ef9a0b4160f6020cec75e090c7226609836acce88b8da5b14b61882db296212527bd281d6961ad0e53b822bfa14e0befc5f89894d68943a572bcc4c8e86d71c2abfd3c4ae03b0fa390749cbe355bf997faa54874ef993a1c7ef8a6e23e413714267d9f8f12c4a89bcf692820dea04fdd6243e66441a8edeb7d8c3d65b00f8d60889b2bb42e29b2f71144aab787f324ab98e72d0351053863b6e6ada661ef73c7d3e551a1d593a19f6644ed0a3c277ddefa1289465ea194b7baef73adbec66cdd0c0291bd9af4f8d15e8", 0x165}], 0x1) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x52, 0x7f, 0xef, 0xd8, 0x0, 0x7ff, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0x8, 0x5e}, 0x4000, 0x8, 0x323, 0x5, 0x8, 0x200, 0x40, 0x0, 0x100, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, r3, 0x12) syncfs(r1) 11:41:47 executing program 2: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f0000000080)='system_u:object_r:autofs_device_t:s0\x00', 0x25) r1 = fsopen(&(0x7f0000000000)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000080)='./file0\x00', r2, &(0x7f0000000040)='./file0\x00') 11:41:47 executing program 4: setgroups(0x0, 0x0) getgroups(0x1, &(0x7f0000003400)=[0x0]) [ 135.092462] EXT4-fs (loop3): unmounting filesystem. [ 135.095299] loop0: detected capacity change from 0 to 256 11:41:47 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f95010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f000000000000040040", 0x1d, 0x2080}, {0x0}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x20000}, {0x0}], 0x0, &(0x7f0000012f00)) r1 = open_tree(r0, &(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x6, 0x20, 0x9, 0x81, 0x0, 0x400, 0x18000, 0xc, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x80000001, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x440, 0x7712, 0x4, 0x5, 0x93b, 0x4, 0xfff, 0x0, 0x7fff, 0x0, 0x4}, r0, 0xa, r1, 0x2) 11:41:47 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={&(0x7f0000000040)={0x2, 0x0, @local}, 0x10, 0x0}, 0x2000c040) listen(r0, 0x0) [ 135.111342] Process accounting resumed 11:41:47 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)=ANY=[@ANYBLOB="1c00000018003f05000000000000000002000000d8c93106"], 0x1c}], 0x1}, 0x0) [ 135.140967] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 135.160797] loop3: detected capacity change from 0 to 2048 11:41:47 executing program 2: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f0000000080)='system_u:object_r:autofs_device_t:s0\x00', 0x25) r1 = fsopen(&(0x7f0000000000)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000080)='./file0\x00', r2, &(0x7f0000000040)='./file0\x00') 11:41:47 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x6, &(0x7f0000000000), 0x4) [ 135.242790] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: none. [ 135.244257] ext4 filesystem being mounted at /syzkaller-testdir568096328/syzkaller.HZFpzP/14/file0 supports timestamps until 2038 (0x7fffffff) [ 135.268548] EXT4-fs (loop3): unmounting filesystem. 11:41:47 executing program 7: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0xfffffffffffffffc, 0x0) 11:41:47 executing program 0: r0 = getpid() kcmp(r0, 0x0, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_init() perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 11:41:47 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)={0x20, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @pid=0xffffffffffffffff}]}, 0x20}], 0x1}, 0x0) 11:41:47 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)=ANY=[@ANYBLOB="1c00000018003f05000000000000000002000000d8c93106"], 0x1c}], 0x1}, 0x0) 11:41:47 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000200)=@v1={0x1000000, [{0x3, 0x40}]}, 0xc, 0x3) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) r3 = dup3(0xffffffffffffffff, r2, 0x0) writev(r3, &(0x7f0000000040)=[{&(0x7f0000000540)="bd04b6e78286fa9b6d2d78ac298542be700e31ad8d4bf191125e543aacf0538a5c71acde8cb724a57fb0506a9a70ddf405ba6207bd61ab8ffb79e8229ceb9c1d3b0733a61431c37818fa6039f420e826db081d2ad98a8e789cd9fdc06611c37ca68b391e22fcc28ba768fabd7e5bd7aa09f95e15f1420cd5457bb66633bec2be5ce94ad2603aff5015bcf474daf88581d0abb6f66560622ecbdb0e8ef9a0b4160f6020cec75e090c7226609836acce88b8da5b14b61882db296212527bd281d6961ad0e53b822bfa14e0befc5f89894d68943a572bcc4c8e86d71c2abfd3c4ae03b0fa390749cbe355bf997faa54874ef993a1c7ef8a6e23e413714267d9f8f12c4a89bcf692820dea04fdd6243e66441a8edeb7d8c3d65b00f8d60889b2bb42e29b2f71144aab787f324ab98e72d0351053863b6e6ada661ef73c7d3e551a1d593a19f6644ed0a3c277ddefa1289465ea194b7baef73adbec66cdd0c0291bd9af4f8d15e8", 0x165}], 0x1) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x52, 0x7f, 0xef, 0xd8, 0x0, 0x7ff, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0x8, 0x5e}, 0x4000, 0x8, 0x323, 0x5, 0x8, 0x200, 0x40, 0x0, 0x100, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, r3, 0x12) syncfs(r1) 11:41:47 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x6, &(0x7f0000000000), 0x4) 11:41:47 executing program 2: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f0000000080)='system_u:object_r:autofs_device_t:s0\x00', 0x25) r1 = fsopen(&(0x7f0000000000)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000080)='./file0\x00', r2, &(0x7f0000000040)='./file0\x00') 11:41:47 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)={0x20, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @pid=0xffffffffffffffff}]}, 0x20}], 0x1}, 0x0) 11:41:47 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000200)=@v1={0x1000000, [{0x3, 0x40}]}, 0xc, 0x3) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) r3 = dup3(0xffffffffffffffff, r2, 0x0) writev(r3, &(0x7f0000000040)=[{&(0x7f0000000540)="bd04b6e78286fa9b6d2d78ac298542be700e31ad8d4bf191125e543aacf0538a5c71acde8cb724a57fb0506a9a70ddf405ba6207bd61ab8ffb79e8229ceb9c1d3b0733a61431c37818fa6039f420e826db081d2ad98a8e789cd9fdc06611c37ca68b391e22fcc28ba768fabd7e5bd7aa09f95e15f1420cd5457bb66633bec2be5ce94ad2603aff5015bcf474daf88581d0abb6f66560622ecbdb0e8ef9a0b4160f6020cec75e090c7226609836acce88b8da5b14b61882db296212527bd281d6961ad0e53b822bfa14e0befc5f89894d68943a572bcc4c8e86d71c2abfd3c4ae03b0fa390749cbe355bf997faa54874ef993a1c7ef8a6e23e413714267d9f8f12c4a89bcf692820dea04fdd6243e66441a8edeb7d8c3d65b00f8d60889b2bb42e29b2f71144aab787f324ab98e72d0351053863b6e6ada661ef73c7d3e551a1d593a19f6644ed0a3c277ddefa1289465ea194b7baef73adbec66cdd0c0291bd9af4f8d15e8", 0x165}], 0x1) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x52, 0x7f, 0xef, 0xd8, 0x0, 0x7ff, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0x8, 0x5e}, 0x4000, 0x8, 0x323, 0x5, 0x8, 0x200, 0x40, 0x0, 0x100, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, r3, 0x12) syncfs(r1) [ 135.438251] loop0: detected capacity change from 0 to 256 11:41:47 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x6, &(0x7f0000000000), 0x4) [ 135.492607] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:41:47 executing program 7: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0xfffffffffffffffc, 0x0) 11:41:47 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000200)=@v1={0x1000000, [{0x3, 0x40}]}, 0xc, 0x3) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) r3 = dup3(0xffffffffffffffff, r2, 0x0) writev(r3, &(0x7f0000000040)=[{&(0x7f0000000540)="bd04b6e78286fa9b6d2d78ac298542be700e31ad8d4bf191125e543aacf0538a5c71acde8cb724a57fb0506a9a70ddf405ba6207bd61ab8ffb79e8229ceb9c1d3b0733a61431c37818fa6039f420e826db081d2ad98a8e789cd9fdc06611c37ca68b391e22fcc28ba768fabd7e5bd7aa09f95e15f1420cd5457bb66633bec2be5ce94ad2603aff5015bcf474daf88581d0abb6f66560622ecbdb0e8ef9a0b4160f6020cec75e090c7226609836acce88b8da5b14b61882db296212527bd281d6961ad0e53b822bfa14e0befc5f89894d68943a572bcc4c8e86d71c2abfd3c4ae03b0fa390749cbe355bf997faa54874ef993a1c7ef8a6e23e413714267d9f8f12c4a89bcf692820dea04fdd6243e66441a8edeb7d8c3d65b00f8d60889b2bb42e29b2f71144aab787f324ab98e72d0351053863b6e6ada661ef73c7d3e551a1d593a19f6644ed0a3c277ddefa1289465ea194b7baef73adbec66cdd0c0291bd9af4f8d15e8", 0x165}], 0x1) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x52, 0x7f, 0xef, 0xd8, 0x0, 0x7ff, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0x8, 0x5e}, 0x4000, 0x8, 0x323, 0x5, 0x8, 0x200, 0x40, 0x0, 0x100, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, r3, 0x12) syncfs(r1) 11:41:47 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)={0x20, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @pid=0xffffffffffffffff}]}, 0x20}], 0x1}, 0x0) 11:41:47 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x6, &(0x7f0000000000), 0x4) 11:41:47 executing program 0: r0 = getpid() kcmp(r0, 0x0, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_init() perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 11:41:47 executing program 7: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0xfffffffffffffffc, 0x0) 11:41:47 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000200)=@v1={0x1000000, [{0x3, 0x40}]}, 0xc, 0x3) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) r3 = dup3(0xffffffffffffffff, r2, 0x0) writev(r3, &(0x7f0000000040)=[{&(0x7f0000000540)="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", 0x165}], 0x1) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x52, 0x7f, 0xef, 0xd8, 0x0, 0x7ff, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0x8, 0x5e}, 0x4000, 0x8, 0x323, 0x5, 0x8, 0x200, 0x40, 0x0, 0x100, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, r3, 0x12) syncfs(r1) 11:41:47 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000200)=@v1={0x1000000, [{0x3, 0x40}]}, 0xc, 0x3) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) r3 = dup3(0xffffffffffffffff, r2, 0x0) writev(r3, &(0x7f0000000040)=[{&(0x7f0000000540)="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", 0x165}], 0x1) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x52, 0x7f, 0xef, 0xd8, 0x0, 0x7ff, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0x8, 0x5e}, 0x4000, 0x8, 0x323, 0x5, 0x8, 0x200, 0x40, 0x0, 0x100, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, r3, 0x12) syncfs(r1) 11:41:47 executing program 6: linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f00000010c0)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f0000001100), &(0x7f0000001140)='./file0\x00', 0x0, 0x3, &(0x7f0000002540)=[{&(0x7f0000001180)="8bf49f08b182cae762ad457135235e15aa400904aa95435051a8321c78aca3b00d13c9f6084a689408876795f7f2fb5ac7753d515397", 0x36, 0x3}, {0x0, 0x0, 0x56}, {0x0}], 0x0, &(0x7f0000002600)={[{@huge_never}, {@huge_advise}, {@huge_within_size}, {@huge_never}], [{@seclabel}, {@measure}]}) 11:41:47 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)={0x20, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @pid=0xffffffffffffffff}]}, 0x20}], 0x1}, 0x0) [ 135.587015] tmpfs: Unsupported parameter 'huge' [ 135.599886] tmpfs: Unsupported parameter 'huge' [ 135.633272] loop0: detected capacity change from 0 to 256 11:41:47 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000001880), 0x0, 0x0) read$snapshot(r0, 0x0, 0x0) 11:41:47 executing program 6: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0) ioctl$MON_IOCQ_RING_SIZE(r0, 0x9205) [ 135.674113] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:41:47 executing program 7: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0xfffffffffffffffc, 0x0) 11:41:47 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000200)=@v1={0x1000000, [{0x3, 0x40}]}, 0xc, 0x3) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) r3 = dup3(0xffffffffffffffff, r2, 0x0) writev(r3, &(0x7f0000000040)=[{&(0x7f0000000540)="bd04b6e78286fa9b6d2d78ac298542be700e31ad8d4bf191125e543aacf0538a5c71acde8cb724a57fb0506a9a70ddf405ba6207bd61ab8ffb79e8229ceb9c1d3b0733a61431c37818fa6039f420e826db081d2ad98a8e789cd9fdc06611c37ca68b391e22fcc28ba768fabd7e5bd7aa09f95e15f1420cd5457bb66633bec2be5ce94ad2603aff5015bcf474daf88581d0abb6f66560622ecbdb0e8ef9a0b4160f6020cec75e090c7226609836acce88b8da5b14b61882db296212527bd281d6961ad0e53b822bfa14e0befc5f89894d68943a572bcc4c8e86d71c2abfd3c4ae03b0fa390749cbe355bf997faa54874ef993a1c7ef8a6e23e413714267d9f8f12c4a89bcf692820dea04fdd6243e66441a8edeb7d8c3d65b00f8d60889b2bb42e29b2f71144aab787f324ab98e72d0351053863b6e6ada661ef73c7d3e551a1d593a19f6644ed0a3c277ddefa1289465ea194b7baef73adbec66cdd0c0291bd9af4f8d15e8", 0x165}], 0x1) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x52, 0x7f, 0xef, 0xd8, 0x0, 0x7ff, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0x8, 0x5e}, 0x4000, 0x8, 0x323, 0x5, 0x8, 0x200, 0x40, 0x0, 0x100, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, r3, 0x12) syncfs(r1) 11:41:47 executing program 1: syz_io_uring_setup(0x0, &(0x7f0000000100), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000180), 0xfffffffffffffffc) 11:41:47 executing program 5: syz_emit_ethernet(0x3a, &(0x7f00000000c0)={@local, @empty, @void, {@ipv4={0x800, @tipc={{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x2f, 0x0, @dev, @remote}, @payload_conn={{{0x18, 0x0, 0x0, 0x0, 0x0, 0x6}}}}}}}, 0x0) 11:41:47 executing program 6: timer_create(0x0, 0x0, &(0x7f0000000040)) timer_gettime(0x0, &(0x7f0000000180)) 11:41:47 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000001880), 0x0, 0x0) read$snapshot(r0, 0x0, 0x0) 11:41:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000003400)={[{@journal_path}]}) 11:41:47 executing program 5: syz_emit_ethernet(0x3a, &(0x7f00000000c0)={@local, @empty, @void, {@ipv4={0x800, @tipc={{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x2f, 0x0, @dev, @remote}, @payload_conn={{{0x18, 0x0, 0x0, 0x0, 0x0, 0x6}}}}}}}, 0x0) 11:41:47 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000200)=@v1={0x1000000, [{0x3, 0x40}]}, 0xc, 0x3) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) r3 = dup3(0xffffffffffffffff, r2, 0x0) writev(r3, &(0x7f0000000040)=[{&(0x7f0000000540)="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", 0x165}], 0x1) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x52, 0x7f, 0xef, 0xd8, 0x0, 0x7ff, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0x8, 0x5e}, 0x4000, 0x8, 0x323, 0x5, 0x8, 0x200, 0x40, 0x0, 0x100, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, r3, 0x12) syncfs(r1) 11:41:47 executing program 7: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockname(r0, 0x0, &(0x7f0000000140)) [ 135.895343] journal_path: Non-blockdev passed as '' [ 135.895752] EXT4-fs: error: could not find journal device path 11:41:47 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000200)=@v1={0x1000000, [{0x3, 0x40}]}, 0xc, 0x3) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) r3 = dup3(0xffffffffffffffff, r2, 0x0) writev(r3, &(0x7f0000000040)=[{&(0x7f0000000540)="bd04b6e78286fa9b6d2d78ac298542be700e31ad8d4bf191125e543aacf0538a5c71acde8cb724a57fb0506a9a70ddf405ba6207bd61ab8ffb79e8229ceb9c1d3b0733a61431c37818fa6039f420e826db081d2ad98a8e789cd9fdc06611c37ca68b391e22fcc28ba768fabd7e5bd7aa09f95e15f1420cd5457bb66633bec2be5ce94ad2603aff5015bcf474daf88581d0abb6f66560622ecbdb0e8ef9a0b4160f6020cec75e090c7226609836acce88b8da5b14b61882db296212527bd281d6961ad0e53b822bfa14e0befc5f89894d68943a572bcc4c8e86d71c2abfd3c4ae03b0fa390749cbe355bf997faa54874ef993a1c7ef8a6e23e413714267d9f8f12c4a89bcf692820dea04fdd6243e66441a8edeb7d8c3d65b00f8d60889b2bb42e29b2f71144aab787f324ab98e72d0351053863b6e6ada661ef73c7d3e551a1d593a19f6644ed0a3c277ddefa1289465ea194b7baef73adbec66cdd0c0291bd9af4f8d15e8", 0x165}], 0x1) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x52, 0x7f, 0xef, 0xd8, 0x0, 0x7ff, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0x8, 0x5e}, 0x4000, 0x8, 0x323, 0x5, 0x8, 0x200, 0x40, 0x0, 0x100, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, r3, 0x12) syncfs(r1) 11:41:47 executing program 6: timer_create(0x3, 0x0, &(0x7f0000000180)) 11:41:47 executing program 0: r0 = getpid() kcmp(r0, 0x0, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_init() perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 135.904651] journal_path: Non-blockdev passed as '' [ 135.905066] EXT4-fs: error: could not find journal device path [ 135.911530] loop0: detected capacity change from 0 to 256 11:41:47 executing program 5: syz_emit_ethernet(0x3a, &(0x7f00000000c0)={@local, @empty, @void, {@ipv4={0x800, @tipc={{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x2f, 0x0, @dev, @remote}, @payload_conn={{{0x18, 0x0, 0x0, 0x0, 0x0, 0x6}}}}}}}, 0x0) 11:41:47 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000001880), 0x0, 0x0) read$snapshot(r0, 0x0, 0x0) [ 135.991500] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 136.005420] SELinux: security_context_str_to_sid (user_u) failed with errno=-22 [ 136.008735] journal_path: Non-blockdev passed as '' [ 136.009297] EXT4-fs: error: could not find journal device path 11:41:47 executing program 6: futex(&(0x7f0000000000), 0x5, 0x0, 0x0, &(0x7f00000001c0), 0x2000000) 11:41:47 executing program 7: syz_mount_image$nfs4(&(0x7f0000000f80), &(0x7f0000000fc0)='./file0\x00', 0x0, 0x0, &(0x7f00000013c0), 0x0, &(0x7f0000001440)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}]}) 11:41:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000003400)={[{@journal_path}]}) [ 136.015315] SELinux: security_context_str_to_sid (user_u) failed with errno=-22 11:41:48 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000200)=@v1={0x1000000, [{0x3, 0x40}]}, 0xc, 0x3) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) r3 = dup3(0xffffffffffffffff, r2, 0x0) writev(r3, &(0x7f0000000040)=[{&(0x7f0000000540)="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", 0x165}], 0x1) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x52, 0x7f, 0xef, 0xd8, 0x0, 0x7ff, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0x8, 0x5e}, 0x4000, 0x8, 0x323, 0x5, 0x8, 0x200, 0x40, 0x0, 0x100, 0x0, 0x7fffffff}, VM DIAGNOSIS: 11:41:40 Registers: info registers vcpu 0 RAX=0000000000000000 RBX=ffff88803f09fa30 RCX=0000000000000000 RDX=ffff88800f660000 RSI=00000000000001fe RDI=0000000000000136 RBP=00000000000001fe RSP=ffff88803f09f608 R8 =0000000000000004 R9 =0000000000000136 R10=00000000000001fe R11=0000000000000001 R12=0000000000000000 R13=ffffea0000cc9d80 R14=ffff88803f09fa58 R15=0000000000000136 RIP=ffffffff81461920 RFL=00000246 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000001b2dd22000 CR3=000000001d458000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=ffffffffffffffffffffffffffffffff XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000 XMM04=000000000000000000000000000000ff XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=000000000000002d RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff823c0801 RDI=ffffffff8765c9e0 RBP=ffffffff8765c9a0 RSP=ffff88803ff67690 R8 =0000000000000001 R9 =000000000000000a R10=000000000000002d R11=0000000000000001 R12=000000000000002d R13=ffffffff8765c9a0 R14=0000000000000010 R15=ffffffff823c07f0 RIP=ffffffff823c0859 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f6471550700 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fb1afde0f28 CR3=000000003d390000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00007f64740c17c000007f64740c17c8 XMM02=00007f64740c17e000007f64740c17c0 XMM03=00007f64740c17c800007f64740c17c0 XMM04=ffffffffffffffffffffffff00000000 XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000