Warning: Permanently added '[localhost]:27809' (ECDSA) to the list of known hosts. 2022/09/14 12:56:41 fuzzer started 2022/09/14 12:56:41 dialing manager at localhost:33849 syzkaller login: [ 47.101046] cgroup: Unknown subsys name 'net' [ 47.202690] cgroup: Unknown subsys name 'rlimit' 2022/09/14 12:56:56 syscalls: 2215 2022/09/14 12:56:56 code coverage: enabled 2022/09/14 12:56:56 comparison tracing: enabled 2022/09/14 12:56:56 extra coverage: enabled 2022/09/14 12:56:56 setuid sandbox: enabled 2022/09/14 12:56:56 namespace sandbox: enabled 2022/09/14 12:56:56 Android sandbox: enabled 2022/09/14 12:56:56 fault injection: enabled 2022/09/14 12:56:56 leak checking: enabled 2022/09/14 12:56:56 net packet injection: enabled 2022/09/14 12:56:56 net device setup: enabled 2022/09/14 12:56:56 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/09/14 12:56:56 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/09/14 12:56:56 USB emulation: enabled 2022/09/14 12:56:56 hci packet injection: enabled 2022/09/14 12:56:56 wifi device emulation: failed to parse kernel version (6.0.0-rc5-next-20220914) 2022/09/14 12:56:56 802.15.4 emulation: enabled 2022/09/14 12:56:56 fetching corpus: 0, signal 0/2000 (executing program) 2022/09/14 12:56:56 fetching corpus: 50, signal 34755/38184 (executing program) 2022/09/14 12:56:56 fetching corpus: 100, signal 47447/52303 (executing program) 2022/09/14 12:56:57 fetching corpus: 150, signal 54780/60948 (executing program) 2022/09/14 12:56:57 fetching corpus: 200, signal 60785/68271 (executing program) 2022/09/14 12:56:57 fetching corpus: 250, signal 69994/78410 (executing program) 2022/09/14 12:56:57 fetching corpus: 300, signal 73505/83133 (executing program) 2022/09/14 12:56:57 fetching corpus: 350, signal 80996/91478 (executing program) 2022/09/14 12:56:57 fetching corpus: 400, signal 83453/95042 (executing program) 2022/09/14 12:56:57 fetching corpus: 450, signal 88502/100940 (executing program) 2022/09/14 12:56:57 fetching corpus: 500, signal 92280/105619 (executing program) 2022/09/14 12:56:58 fetching corpus: 550, signal 95425/109624 (executing program) 2022/09/14 12:56:58 fetching corpus: 600, signal 99746/114598 (executing program) 2022/09/14 12:56:58 fetching corpus: 650, signal 103265/118745 (executing program) 2022/09/14 12:56:58 fetching corpus: 700, signal 106903/122941 (executing program) 2022/09/14 12:56:58 fetching corpus: 750, signal 108735/125586 (executing program) 2022/09/14 12:56:58 fetching corpus: 800, signal 111958/129345 (executing program) 2022/09/14 12:56:58 fetching corpus: 850, signal 114449/132476 (executing program) 2022/09/14 12:56:59 fetching corpus: 900, signal 117307/135905 (executing program) 2022/09/14 12:56:59 fetching corpus: 950, signal 119584/138751 (executing program) 2022/09/14 12:56:59 fetching corpus: 1000, signal 122804/142278 (executing program) 2022/09/14 12:56:59 fetching corpus: 1050, signal 124773/144808 (executing program) 2022/09/14 12:56:59 fetching corpus: 1100, signal 126967/147487 (executing program) 2022/09/14 12:56:59 fetching corpus: 1150, signal 129248/150195 (executing program) 2022/09/14 12:56:59 fetching corpus: 1200, signal 130909/152331 (executing program) 2022/09/14 12:57:00 fetching corpus: 1250, signal 133796/155311 (executing program) 2022/09/14 12:57:00 fetching corpus: 1300, signal 134967/156990 (executing program) 2022/09/14 12:57:00 fetching corpus: 1350, signal 136650/159000 (executing program) 2022/09/14 12:57:00 fetching corpus: 1400, signal 138538/161162 (executing program) 2022/09/14 12:57:00 fetching corpus: 1450, signal 140053/163037 (executing program) 2022/09/14 12:57:00 fetching corpus: 1500, signal 142173/165313 (executing program) 2022/09/14 12:57:00 fetching corpus: 1550, signal 143392/166900 (executing program) 2022/09/14 12:57:00 fetching corpus: 1600, signal 144798/168677 (executing program) 2022/09/14 12:57:01 fetching corpus: 1650, signal 145687/169984 (executing program) 2022/09/14 12:57:01 fetching corpus: 1699, signal 147483/171933 (executing program) 2022/09/14 12:57:01 fetching corpus: 1749, signal 148742/173488 (executing program) 2022/09/14 12:57:01 fetching corpus: 1799, signal 150280/175192 (executing program) 2022/09/14 12:57:01 fetching corpus: 1849, signal 151292/176557 (executing program) 2022/09/14 12:57:01 fetching corpus: 1899, signal 152175/177757 (executing program) 2022/09/14 12:57:01 fetching corpus: 1949, signal 154268/179714 (executing program) 2022/09/14 12:57:02 fetching corpus: 1999, signal 155414/181070 (executing program) 2022/09/14 12:57:02 fetching corpus: 2049, signal 156430/182318 (executing program) 2022/09/14 12:57:02 fetching corpus: 2099, signal 157868/183790 (executing program) 2022/09/14 12:57:02 fetching corpus: 2148, signal 158912/185012 (executing program) 2022/09/14 12:57:02 fetching corpus: 2198, signal 159855/186180 (executing program) 2022/09/14 12:57:02 fetching corpus: 2248, signal 161941/188030 (executing program) 2022/09/14 12:57:02 fetching corpus: 2298, signal 163222/189337 (executing program) 2022/09/14 12:57:02 fetching corpus: 2348, signal 164357/190496 (executing program) 2022/09/14 12:57:02 fetching corpus: 2398, signal 165307/191580 (executing program) 2022/09/14 12:57:03 fetching corpus: 2447, signal 166437/192725 (executing program) 2022/09/14 12:57:03 fetching corpus: 2497, signal 167541/194058 (executing program) 2022/09/14 12:57:03 fetching corpus: 2547, signal 169003/195356 (executing program) 2022/09/14 12:57:03 fetching corpus: 2597, signal 170727/196734 (executing program) 2022/09/14 12:57:03 fetching corpus: 2647, signal 171431/197569 (executing program) 2022/09/14 12:57:03 fetching corpus: 2697, signal 172774/198682 (executing program) 2022/09/14 12:57:03 fetching corpus: 2747, signal 174785/200136 (executing program) 2022/09/14 12:57:03 fetching corpus: 2797, signal 175940/201154 (executing program) 2022/09/14 12:57:04 fetching corpus: 2847, signal 177066/202147 (executing program) 2022/09/14 12:57:04 fetching corpus: 2895, signal 178319/203179 (executing program) 2022/09/14 12:57:04 fetching corpus: 2945, signal 178934/203875 (executing program) 2022/09/14 12:57:04 fetching corpus: 2995, signal 179967/204764 (executing program) 2022/09/14 12:57:04 fetching corpus: 3044, signal 181062/205650 (executing program) 2022/09/14 12:57:04 fetching corpus: 3094, signal 181950/206407 (executing program) 2022/09/14 12:57:04 fetching corpus: 3144, signal 182670/207059 (executing program) 2022/09/14 12:57:05 fetching corpus: 3194, signal 183634/207803 (executing program) 2022/09/14 12:57:05 fetching corpus: 3244, signal 184483/208610 (executing program) 2022/09/14 12:57:05 fetching corpus: 3293, signal 185840/209494 (executing program) 2022/09/14 12:57:05 fetching corpus: 3343, signal 186951/210232 (executing program) 2022/09/14 12:57:05 fetching corpus: 3393, signal 188038/211004 (executing program) 2022/09/14 12:57:05 fetching corpus: 3443, signal 189028/211867 (executing program) 2022/09/14 12:57:05 fetching corpus: 3493, signal 190351/212631 (executing program) 2022/09/14 12:57:06 fetching corpus: 3543, signal 192217/213562 (executing program) 2022/09/14 12:57:06 fetching corpus: 3593, signal 192677/214007 (executing program) 2022/09/14 12:57:06 fetching corpus: 3643, signal 193448/214551 (executing program) 2022/09/14 12:57:06 fetching corpus: 3693, signal 194437/215132 (executing program) 2022/09/14 12:57:06 fetching corpus: 3743, signal 194880/215524 (executing program) 2022/09/14 12:57:06 fetching corpus: 3793, signal 196243/216192 (executing program) 2022/09/14 12:57:06 fetching corpus: 3843, signal 197352/216775 (executing program) 2022/09/14 12:57:07 fetching corpus: 3893, signal 198521/217576 (executing program) 2022/09/14 12:57:07 fetching corpus: 3943, signal 199830/218182 (executing program) 2022/09/14 12:57:07 fetching corpus: 3993, signal 200988/218716 (executing program) 2022/09/14 12:57:07 fetching corpus: 4043, signal 201809/219154 (executing program) 2022/09/14 12:57:07 fetching corpus: 4093, signal 202274/219530 (executing program) 2022/09/14 12:57:07 fetching corpus: 4143, signal 202961/219997 (executing program) 2022/09/14 12:57:07 fetching corpus: 4193, signal 203882/220373 (executing program) 2022/09/14 12:57:07 fetching corpus: 4243, signal 204867/220737 (executing program) 2022/09/14 12:57:08 fetching corpus: 4293, signal 205763/221093 (executing program) 2022/09/14 12:57:08 fetching corpus: 4343, signal 206675/221406 (executing program) 2022/09/14 12:57:08 fetching corpus: 4393, signal 207105/221620 (executing program) 2022/09/14 12:57:08 fetching corpus: 4443, signal 207887/221917 (executing program) 2022/09/14 12:57:08 fetching corpus: 4493, signal 208680/222183 (executing program) 2022/09/14 12:57:08 fetching corpus: 4543, signal 209601/222436 (executing program) 2022/09/14 12:57:08 fetching corpus: 4593, signal 210281/222657 (executing program) 2022/09/14 12:57:09 fetching corpus: 4643, signal 210927/222850 (executing program) 2022/09/14 12:57:09 fetching corpus: 4693, signal 211669/223115 (executing program) 2022/09/14 12:57:09 fetching corpus: 4743, signal 212212/223317 (executing program) 2022/09/14 12:57:09 fetching corpus: 4793, signal 213372/223681 (executing program) 2022/09/14 12:57:09 fetching corpus: 4843, signal 214144/223840 (executing program) 2022/09/14 12:57:09 fetching corpus: 4893, signal 214741/224030 (executing program) 2022/09/14 12:57:09 fetching corpus: 4943, signal 215560/224188 (executing program) 2022/09/14 12:57:10 fetching corpus: 4993, signal 216534/224300 (executing program) 2022/09/14 12:57:10 fetching corpus: 5043, signal 216929/224417 (executing program) 2022/09/14 12:57:10 fetching corpus: 5074, signal 217183/224484 (executing program) 2022/09/14 12:57:10 fetching corpus: 5074, signal 217183/224526 (executing program) 2022/09/14 12:57:10 fetching corpus: 5074, signal 217183/224526 (executing program) 2022/09/14 12:57:13 starting 8 fuzzer processes 12:57:13 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000006c0)='./file0\x00', 0x0, 0x0) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) renameat2(r0, &(0x7f0000000080)='./file0\x00', r0, &(0x7f0000000180)='./file1\x00', 0x4) 12:57:13 executing program 1: r0 = gettid() syz_open_procfs$namespace(r0, 0x0) 12:57:13 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)) 12:57:13 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_set$pid(0x2, 0x0, 0x2007) ioprio_get$pid(0x3, 0x0) 12:57:13 executing program 4: syz_mount_image$iso9660(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000", 0x7b, 0x8000}, {&(0x7f0000010600)="ff4344", 0x3, 0x8800}, {0x0, 0x0, 0xb800}], 0x0, &(0x7f0000000680)=ANY=[]) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, 0x0) renameat2(0xffffffffffffffff, 0xfffffffffffffffe, 0xffffffffffffffff, &(0x7f0000000380)='./file1\x00', 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)='r', 0x1}], 0x1) r0 = syz_io_uring_setup(0x178f, &(0x7f0000000440)={0x0, 0x301d, 0x900, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000000), &(0x7f0000000040)) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0xfffffffd, @loopback}, 0x1c) sendmmsg(r1, &(0x7f0000004240)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000300)="e9", 0xfffffe8e}], 0x1}}], 0x1, 0x0) recvfrom(r1, &(0x7f00000003c0)=""/77, 0x6bc2bb1, 0x324, 0x0, 0x37) io_uring_enter(r0, 0x64d0, 0x48be, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x1, 0x1f, 0x0, 0x0, 0x0, 0x5, 0x84208, 0xb84e01778a86e6ca, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, @perf_config_ext={0x100000000, 0xcf65}, 0x3108, 0x0, 0x81, 0x8, 0x0, 0x7fffffff, 0xbc, 0x0, 0x1f, 0x0, 0x214}, 0xffffffffffffffff, 0x0, r2, 0xa) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 78.473628] audit: type=1400 audit(1663160233.333:6): avc: denied { execmem } for pid=285 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 12:57:13 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) r0 = epoll_create(0x1) epoll_pwait(r0, &(0x7f0000000000)=[{}], 0x1, 0x7fffffff, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0x60000017}) 12:57:13 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x185041, 0x0) mount(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='devtmpfs\x00', 0x0, &(0x7f0000000000)='+@@^:\x00') 12:57:13 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r0, 0x4b4b, &(0x7f0000000380)=""/98) [ 79.794060] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 79.795755] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 79.796973] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 79.801137] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 79.803138] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 79.805045] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 79.807402] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 79.808384] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 79.808622] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 79.811389] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 79.817065] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 79.819106] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 79.825753] Bluetooth: hci1: HCI_REQ-0x0c1a [ 79.830369] Bluetooth: hci0: HCI_REQ-0x0c1a [ 79.869430] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 79.871706] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 79.873643] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 79.896046] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 79.897703] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 79.899240] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 79.901029] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 79.902991] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 79.909536] Bluetooth: hci3: HCI_REQ-0x0c1a [ 79.927225] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 79.929796] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 79.931124] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 79.933709] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 79.936270] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 79.938320] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 79.940362] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 79.941751] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 79.946391] Bluetooth: hci6: HCI_REQ-0x0c1a [ 79.946698] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 79.949077] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 79.950344] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 79.952183] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 79.960705] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 79.964269] Bluetooth: hci4: HCI_REQ-0x0c1a [ 79.971081] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 79.976678] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 79.978203] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 79.983168] Bluetooth: hci7: HCI_REQ-0x0c1a [ 81.862505] Bluetooth: hci1: command 0x0409 tx timeout [ 81.862903] Bluetooth: hci2: Opcode 0x c03 failed: -110 [ 81.863964] Bluetooth: hci0: command 0x0409 tx timeout [ 81.925906] Bluetooth: hci5: Opcode 0x c03 failed: -110 [ 81.925960] Bluetooth: hci3: command 0x0409 tx timeout [ 81.989966] Bluetooth: hci4: command 0x0409 tx timeout [ 81.990924] Bluetooth: hci6: command 0x0409 tx timeout [ 82.054183] Bluetooth: hci7: command 0x0409 tx timeout [ 83.909973] Bluetooth: hci0: command 0x041b tx timeout [ 83.910512] Bluetooth: hci1: command 0x041b tx timeout [ 83.973994] Bluetooth: hci3: command 0x041b tx timeout [ 84.037963] Bluetooth: hci6: command 0x041b tx timeout [ 84.039946] Bluetooth: hci4: command 0x041b tx timeout [ 84.101974] Bluetooth: hci7: command 0x041b tx timeout [ 85.958929] Bluetooth: hci1: command 0x040f tx timeout [ 85.959564] Bluetooth: hci0: command 0x040f tx timeout [ 86.023016] Bluetooth: hci3: command 0x040f tx timeout [ 86.063325] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 86.073317] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 86.076860] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 86.083376] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 86.085908] Bluetooth: hci4: command 0x040f tx timeout [ 86.086381] Bluetooth: hci6: command 0x040f tx timeout [ 86.095973] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 86.106076] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 86.121546] Bluetooth: hci2: HCI_REQ-0x0c1a [ 86.150854] Bluetooth: hci7: command 0x040f tx timeout [ 88.005937] Bluetooth: hci0: command 0x0419 tx timeout [ 88.006740] Bluetooth: hci1: command 0x0419 tx timeout [ 88.069934] Bluetooth: hci3: command 0x0419 tx timeout [ 88.070355] Bluetooth: hci5: Opcode 0x c03 failed: -110 [ 88.133870] Bluetooth: hci2: command 0x0409 tx timeout [ 88.133956] Bluetooth: hci6: command 0x0419 tx timeout [ 88.135194] Bluetooth: hci4: command 0x0419 tx timeout [ 88.197890] Bluetooth: hci7: command 0x0419 tx timeout [ 90.181890] Bluetooth: hci2: command 0x041b tx timeout [ 91.017137] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 91.018803] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 91.019593] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 91.022374] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 91.023523] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 91.024644] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 91.028555] Bluetooth: hci5: HCI_REQ-0x0c1a [ 92.230065] Bluetooth: hci2: command 0x040f tx timeout [ 93.063202] Bluetooth: hci5: command 0x0409 tx timeout [ 94.277983] Bluetooth: hci2: command 0x0419 tx timeout [ 95.109906] Bluetooth: hci5: command 0x041b tx timeout [ 97.157896] Bluetooth: hci5: command 0x040f tx timeout [ 99.205907] Bluetooth: hci5: command 0x0419 tx timeout [ 135.159455] loop4: detected capacity change from 0 to 184 [ 135.339978] audit: type=1400 audit(1663160290.199:7): avc: denied { open } for pid=3637 comm="syz-executor.4" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 135.990714] loop4: detected capacity change from 0 to 184 12:58:10 executing program 4: syz_mount_image$iso9660(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000", 0x7b, 0x8000}, {&(0x7f0000010600)="ff4344", 0x3, 0x8800}, {0x0, 0x0, 0xb800}], 0x0, &(0x7f0000000680)=ANY=[]) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, 0x0) renameat2(0xffffffffffffffff, 0xfffffffffffffffe, 0xffffffffffffffff, &(0x7f0000000380)='./file1\x00', 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)='r', 0x1}], 0x1) r0 = syz_io_uring_setup(0x178f, &(0x7f0000000440)={0x0, 0x301d, 0x900, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000000), &(0x7f0000000040)) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0xfffffffd, @loopback}, 0x1c) sendmmsg(r1, &(0x7f0000004240)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000300)="e9", 0xfffffe8e}], 0x1}}], 0x1, 0x0) recvfrom(r1, &(0x7f00000003c0)=""/77, 0x6bc2bb1, 0x324, 0x0, 0x37) io_uring_enter(r0, 0x64d0, 0x48be, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x1, 0x1f, 0x0, 0x0, 0x0, 0x5, 0x84208, 0xb84e01778a86e6ca, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, @perf_config_ext={0x100000000, 0xcf65}, 0x3108, 0x0, 0x81, 0x8, 0x0, 0x7fffffff, 0xbc, 0x0, 0x1f, 0x0, 0x214}, 0xffffffffffffffff, 0x0, r2, 0xa) socketpair$unix(0x1, 0x0, 0x0, 0x0) 12:58:11 executing program 4: syz_mount_image$iso9660(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000", 0x7b, 0x8000}, {&(0x7f0000010600)="ff4344", 0x3, 0x8800}, {0x0, 0x0, 0xb800}], 0x0, &(0x7f0000000680)=ANY=[]) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, 0x0) renameat2(0xffffffffffffffff, 0xfffffffffffffffe, 0xffffffffffffffff, &(0x7f0000000380)='./file1\x00', 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)='r', 0x1}], 0x1) r0 = syz_io_uring_setup(0x178f, &(0x7f0000000440)={0x0, 0x301d, 0x900, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000000), &(0x7f0000000040)) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0xfffffffd, @loopback}, 0x1c) sendmmsg(r1, &(0x7f0000004240)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000300)="e9", 0xfffffe8e}], 0x1}}], 0x1, 0x0) recvfrom(r1, &(0x7f00000003c0)=""/77, 0x6bc2bb1, 0x324, 0x0, 0x37) io_uring_enter(r0, 0x64d0, 0x48be, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x1, 0x1f, 0x0, 0x0, 0x0, 0x5, 0x84208, 0xb84e01778a86e6ca, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, @perf_config_ext={0x100000000, 0xcf65}, 0x3108, 0x0, 0x81, 0x8, 0x0, 0x7fffffff, 0xbc, 0x0, 0x1f, 0x0, 0x214}, 0xffffffffffffffff, 0x0, r2, 0xa) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 136.330424] loop4: detected capacity change from 0 to 184 12:58:11 executing program 4: syz_mount_image$iso9660(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000", 0x7b, 0x8000}, {&(0x7f0000010600)="ff4344", 0x3, 0x8800}, {0x0, 0x0, 0xb800}], 0x0, &(0x7f0000000680)=ANY=[]) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, 0x0) renameat2(0xffffffffffffffff, 0xfffffffffffffffe, 0xffffffffffffffff, &(0x7f0000000380)='./file1\x00', 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)='r', 0x1}], 0x1) r0 = syz_io_uring_setup(0x178f, &(0x7f0000000440)={0x0, 0x301d, 0x900, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000000), &(0x7f0000000040)) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0xfffffffd, @loopback}, 0x1c) sendmmsg(r1, &(0x7f0000004240)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000300)="e9", 0xfffffe8e}], 0x1}}], 0x1, 0x0) recvfrom(r1, &(0x7f00000003c0)=""/77, 0x6bc2bb1, 0x324, 0x0, 0x37) io_uring_enter(r0, 0x64d0, 0x48be, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x1, 0x1f, 0x0, 0x0, 0x0, 0x5, 0x84208, 0xb84e01778a86e6ca, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, @perf_config_ext={0x100000000, 0xcf65}, 0x3108, 0x0, 0x81, 0x8, 0x0, 0x7fffffff, 0xbc, 0x0, 0x1f, 0x0, 0x214}, 0xffffffffffffffff, 0x0, r2, 0xa) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 136.456566] loop4: detected capacity change from 0 to 184 12:58:11 executing program 1: syz_mount_image$iso9660(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000", 0x7b, 0x8000}, {&(0x7f0000010600)="ff4344", 0x3, 0x8800}, {0x0, 0x0, 0xb800}], 0x0, &(0x7f0000000680)=ANY=[]) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, 0x0) renameat2(0xffffffffffffffff, 0xfffffffffffffffe, 0xffffffffffffffff, &(0x7f0000000380)='./file1\x00', 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)='r', 0x1}], 0x1) r0 = syz_io_uring_setup(0x178f, &(0x7f0000000440)={0x0, 0x301d, 0x900, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000000), &(0x7f0000000040)) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0xfffffffd, @loopback}, 0x1c) sendmmsg(r1, &(0x7f0000004240)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000300)="e9", 0xfffffe8e}], 0x1}}], 0x1, 0x0) recvfrom(r1, &(0x7f00000003c0)=""/77, 0x6bc2bb1, 0x324, 0x0, 0x37) io_uring_enter(r0, 0x64d0, 0x48be, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x1, 0x1f, 0x0, 0x0, 0x0, 0x5, 0x84208, 0xb84e01778a86e6ca, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, @perf_config_ext={0x100000000, 0xcf65}, 0x3108, 0x0, 0x81, 0x8, 0x0, 0x7fffffff, 0xbc, 0x0, 0x1f, 0x0, 0x214}, 0xffffffffffffffff, 0x0, r2, 0xa) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 136.547527] loop1: detected capacity change from 0 to 184 12:58:11 executing program 4: syz_mount_image$iso9660(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000", 0x7b, 0x8000}, {&(0x7f0000010600)="ff4344", 0x3, 0x8800}, {0x0, 0x0, 0xb800}], 0x0, &(0x7f0000000680)=ANY=[]) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, 0x0) renameat2(0xffffffffffffffff, 0xfffffffffffffffe, 0xffffffffffffffff, &(0x7f0000000380)='./file1\x00', 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)='r', 0x1}], 0x1) r0 = syz_io_uring_setup(0x178f, &(0x7f0000000440)={0x0, 0x301d, 0x900, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000000), &(0x7f0000000040)) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0xfffffffd, @loopback}, 0x1c) sendmmsg(r1, &(0x7f0000004240)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000300)="e9", 0xfffffe8e}], 0x1}}], 0x1, 0x0) recvfrom(r1, &(0x7f00000003c0)=""/77, 0x6bc2bb1, 0x324, 0x0, 0x37) io_uring_enter(r0, 0x64d0, 0x48be, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x1, 0x1f, 0x0, 0x0, 0x0, 0x5, 0x84208, 0xb84e01778a86e6ca, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, @perf_config_ext={0x100000000, 0xcf65}, 0x3108, 0x0, 0x81, 0x8, 0x0, 0x7fffffff, 0xbc, 0x0, 0x1f, 0x0, 0x214}, 0xffffffffffffffff, 0x0, r2, 0xa) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 136.628236] loop4: detected capacity change from 0 to 184 12:58:11 executing program 4: syz_mount_image$iso9660(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000", 0x7b, 0x8000}, {&(0x7f0000010600)="ff4344", 0x3, 0x8800}, {0x0, 0x0, 0xb800}], 0x0, &(0x7f0000000680)=ANY=[]) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, 0x0) renameat2(0xffffffffffffffff, 0xfffffffffffffffe, 0xffffffffffffffff, &(0x7f0000000380)='./file1\x00', 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)='r', 0x1}], 0x1) r0 = syz_io_uring_setup(0x178f, &(0x7f0000000440)={0x0, 0x301d, 0x900, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000000), &(0x7f0000000040)) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0xfffffffd, @loopback}, 0x1c) sendmmsg(r1, &(0x7f0000004240)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000300)="e9", 0xfffffe8e}], 0x1}}], 0x1, 0x0) recvfrom(r1, &(0x7f00000003c0)=""/77, 0x6bc2bb1, 0x324, 0x0, 0x37) io_uring_enter(r0, 0x64d0, 0x48be, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x1, 0x1f, 0x0, 0x0, 0x0, 0x5, 0x84208, 0xb84e01778a86e6ca, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, @perf_config_ext={0x100000000, 0xcf65}, 0x3108, 0x0, 0x81, 0x8, 0x0, 0x7fffffff, 0xbc, 0x0, 0x1f, 0x0, 0x214}, 0xffffffffffffffff, 0x0, r2, 0xa) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 136.786648] loop4: detected capacity change from 0 to 184 12:58:11 executing program 4: syz_mount_image$iso9660(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000", 0x7b, 0x8000}, {&(0x7f0000010600)="ff4344", 0x3, 0x8800}, {0x0, 0x0, 0xb800}], 0x0, &(0x7f0000000680)=ANY=[]) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, 0x0) renameat2(0xffffffffffffffff, 0xfffffffffffffffe, 0xffffffffffffffff, &(0x7f0000000380)='./file1\x00', 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)='r', 0x1}], 0x1) r0 = syz_io_uring_setup(0x178f, &(0x7f0000000440)={0x0, 0x301d, 0x900, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000000), &(0x7f0000000040)) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0xfffffffd, @loopback}, 0x1c) sendmmsg(r1, &(0x7f0000004240)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000300)="e9", 0xfffffe8e}], 0x1}}], 0x1, 0x0) recvfrom(r1, &(0x7f00000003c0)=""/77, 0x6bc2bb1, 0x324, 0x0, 0x37) io_uring_enter(r0, 0x64d0, 0x48be, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x1, 0x1f, 0x0, 0x0, 0x0, 0x5, 0x84208, 0xb84e01778a86e6ca, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, @perf_config_ext={0x100000000, 0xcf65}, 0x3108, 0x0, 0x81, 0x8, 0x0, 0x7fffffff, 0xbc, 0x0, 0x1f, 0x0, 0x214}, 0xffffffffffffffff, 0x0, r2, 0xa) socketpair$unix(0x1, 0x0, 0x0, 0x0) 12:58:11 executing program 4: syz_mount_image$iso9660(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000", 0x7b, 0x8000}, {&(0x7f0000010600)="ff4344", 0x3, 0x8800}, {0x0, 0x0, 0xb800}], 0x0, &(0x7f0000000680)=ANY=[]) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, 0x0) renameat2(0xffffffffffffffff, 0xfffffffffffffffe, 0xffffffffffffffff, &(0x7f0000000380)='./file1\x00', 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)='r', 0x1}], 0x1) r0 = syz_io_uring_setup(0x178f, &(0x7f0000000440)={0x0, 0x301d, 0x900, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000000), &(0x7f0000000040)) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0xfffffffd, @loopback}, 0x1c) sendmmsg(r1, &(0x7f0000004240)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000300)="e9", 0xfffffe8e}], 0x1}}], 0x1, 0x0) recvfrom(r1, &(0x7f00000003c0)=""/77, 0x6bc2bb1, 0x324, 0x0, 0x37) io_uring_enter(r0, 0x64d0, 0x48be, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x1, 0x1f, 0x0, 0x0, 0x0, 0x5, 0x84208, 0xb84e01778a86e6ca, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, @perf_config_ext={0x100000000, 0xcf65}, 0x3108, 0x0, 0x81, 0x8, 0x0, 0x7fffffff, 0xbc, 0x0, 0x1f, 0x0, 0x214}, 0xffffffffffffffff, 0x0, r2, 0xa) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 137.080283] loop4: detected capacity change from 0 to 184 [ 137.264121] audit: type=1400 audit(1663160292.124:8): avc: denied { kernel } for pid=3779 comm="syz-executor.3" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 137.271917] ------------[ cut here ]------------ [ 137.271941] [ 137.271944] ====================================================== [ 137.271948] WARNING: possible circular locking dependency detected [ 137.271952] 6.0.0-rc5-next-20220914 #1 Not tainted [ 137.271958] ------------------------------------------------------ [ 137.271962] syz-executor.3/3783 is trying to acquire lock: [ 137.271968] ffffffff853fa878 ((console_sem).lock){....}-{2:2}, at: down_trylock+0xe/0x70 [ 137.272006] [ 137.272006] but task is already holding lock: [ 137.272009] ffff88800df79420 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 137.272039] [ 137.272039] which lock already depends on the new lock. [ 137.272039] [ 137.272043] [ 137.272043] the existing dependency chain (in reverse order) is: [ 137.272048] [ 137.272048] -> #3 (&ctx->lock){....}-{2:2}: [ 137.272063] _raw_spin_lock+0x2a/0x40 [ 137.272080] __perf_event_task_sched_out+0x53b/0x18d0 [ 137.272092] __schedule+0xedd/0x2470 [ 137.272103] schedule+0xda/0x1b0 [ 137.272113] exit_to_user_mode_prepare+0x114/0x1a0 [ 137.272133] syscall_exit_to_user_mode+0x19/0x40 [ 137.272150] do_syscall_64+0x48/0x90 [ 137.272163] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 137.272181] [ 137.272181] -> #2 (&rq->__lock){-.-.}-{2:2}: [ 137.272195] _raw_spin_lock_nested+0x30/0x40 [ 137.272209] raw_spin_rq_lock_nested+0x1e/0x30 [ 137.272222] task_fork_fair+0x63/0x4d0 [ 137.272239] sched_cgroup_fork+0x3d0/0x540 [ 137.272253] copy_process+0x4183/0x6e20 [ 137.272263] kernel_clone+0xe7/0x890 [ 137.272273] user_mode_thread+0xad/0xf0 [ 137.272283] rest_init+0x24/0x250 [ 137.272299] arch_call_rest_init+0xf/0x14 [ 137.272311] start_kernel+0x4c1/0x4e6 [ 137.272321] secondary_startup_64_no_verify+0xe0/0xeb [ 137.272335] [ 137.272335] -> #1 (&p->pi_lock){-.-.}-{2:2}: [ 137.272349] _raw_spin_lock_irqsave+0x39/0x60 [ 137.272364] try_to_wake_up+0xab/0x1920 [ 137.272376] up+0x75/0xb0 [ 137.272388] __up_console_sem+0x6e/0x80 [ 137.272404] console_unlock+0x46a/0x590 [ 137.272419] vprintk_emit+0x1bd/0x560 [ 137.272435] vprintk+0x84/0xa0 [ 137.272451] _printk+0xba/0xf1 [ 137.272468] kauditd_hold_skb.cold+0x3f/0x4e [ 137.272482] kauditd_send_queue+0x233/0x290 [ 137.272497] kauditd_thread+0x5da/0x9a0 [ 137.272511] kthread+0x2ed/0x3a0 [ 137.272525] ret_from_fork+0x22/0x30 [ 137.272537] [ 137.272537] -> #0 ((console_sem).lock){....}-{2:2}: [ 137.272551] __lock_acquire+0x2a02/0x5e70 [ 137.272567] lock_acquire+0x1a2/0x530 [ 137.272583] _raw_spin_lock_irqsave+0x39/0x60 [ 137.272597] down_trylock+0xe/0x70 [ 137.272609] __down_trylock_console_sem+0x3b/0xd0 [ 137.272625] vprintk_emit+0x16b/0x560 [ 137.272641] vprintk+0x84/0xa0 [ 137.272656] _printk+0xba/0xf1 [ 137.272672] report_bug.cold+0x72/0xab [ 137.272684] handle_bug+0x3c/0x70 [ 137.272696] exc_invalid_op+0x14/0x50 [ 137.272709] asm_exc_invalid_op+0x16/0x20 [ 137.272725] group_sched_out.part.0+0x2c7/0x460 [ 137.272736] ctx_sched_out+0x8f1/0xc10 [ 137.272745] __perf_event_task_sched_out+0x6d0/0x18d0 [ 137.272757] __schedule+0xedd/0x2470 [ 137.272767] schedule+0xda/0x1b0 [ 137.272776] exit_to_user_mode_prepare+0x114/0x1a0 [ 137.272795] syscall_exit_to_user_mode+0x19/0x40 [ 137.272811] do_syscall_64+0x48/0x90 [ 137.272824] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 137.272840] [ 137.272840] other info that might help us debug this: [ 137.272840] [ 137.272843] Chain exists of: [ 137.272843] (console_sem).lock --> &rq->__lock --> &ctx->lock [ 137.272843] [ 137.272859] Possible unsafe locking scenario: [ 137.272859] [ 137.272861] CPU0 CPU1 [ 137.272863] ---- ---- [ 137.272866] lock(&ctx->lock); [ 137.272872] lock(&rq->__lock); [ 137.272878] lock(&ctx->lock); [ 137.272884] lock((console_sem).lock); [ 137.272890] [ 137.272890] *** DEADLOCK *** [ 137.272890] [ 137.272892] 2 locks held by syz-executor.3/3783: [ 137.272899] #0: ffff88806ce37cd8 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x1cf/0x2470 [ 137.272925] #1: ffff88800df79420 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 137.272952] [ 137.272952] stack backtrace: [ 137.272955] CPU: 0 PID: 3783 Comm: syz-executor.3 Not tainted 6.0.0-rc5-next-20220914 #1 [ 137.272968] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 137.272976] Call Trace: [ 137.272980] [ 137.272984] dump_stack_lvl+0x8b/0xb3 [ 137.272999] check_noncircular+0x263/0x2e0 [ 137.273015] ? format_decode+0x26c/0xb50 [ 137.273031] ? print_circular_bug+0x450/0x450 [ 137.273047] ? enable_ptr_key_workfn+0x20/0x20 [ 137.273062] ? perf_trace_lock+0x308/0x560 [ 137.273076] ? format_decode+0x26c/0xb50 [ 137.273092] ? alloc_chain_hlocks+0x1ec/0x5a0 [ 137.273110] __lock_acquire+0x2a02/0x5e70 [ 137.273133] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 137.273157] lock_acquire+0x1a2/0x530 [ 137.273173] ? down_trylock+0xe/0x70 [ 137.273188] ? rcu_read_unlock+0x40/0x40 [ 137.273210] ? vprintk+0x84/0xa0 [ 137.273228] _raw_spin_lock_irqsave+0x39/0x60 [ 137.273243] ? down_trylock+0xe/0x70 [ 137.273257] down_trylock+0xe/0x70 [ 137.273270] ? vprintk+0x84/0xa0 [ 137.273286] __down_trylock_console_sem+0x3b/0xd0 [ 137.273304] vprintk_emit+0x16b/0x560 [ 137.273323] vprintk+0x84/0xa0 [ 137.273340] _printk+0xba/0xf1 [ 137.273357] ? record_print_text.cold+0x16/0x16 [ 137.273380] ? report_bug.cold+0x66/0xab [ 137.273395] ? group_sched_out.part.0+0x2c7/0x460 [ 137.273406] report_bug.cold+0x72/0xab [ 137.273422] handle_bug+0x3c/0x70 [ 137.273436] exc_invalid_op+0x14/0x50 [ 137.273450] asm_exc_invalid_op+0x16/0x20 [ 137.273467] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 137.273480] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 137.273491] RSP: 0018:ffff888041f0fc48 EFLAGS: 00010006 [ 137.273515] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 137.273523] RDX: ffff88803414b580 RSI: ffffffff81566027 RDI: 0000000000000005 [ 137.273531] RBP: ffff888008660000 R08: 0000000000000005 R09: 0000000000000001 [ 137.273538] R10: 0000000000000000 R11: ffffffff865ac01b R12: ffff88800df79400 [ 137.273547] R13: ffff88806ce3d100 R14: ffffffff8547c660 R15: 0000000000000002 [ 137.273559] ? group_sched_out.part.0+0x2c7/0x460 [ 137.273572] ? group_sched_out.part.0+0x2c7/0x460 [ 137.273586] ctx_sched_out+0x8f1/0xc10 [ 137.273599] __perf_event_task_sched_out+0x6d0/0x18d0 [ 137.273615] ? lock_is_held_type+0xd7/0x130 [ 137.273634] ? __perf_cgroup_move+0x160/0x160 [ 137.273646] ? set_next_entity+0x304/0x550 [ 137.273663] ? update_curr+0x267/0x740 [ 137.273682] ? lock_is_held_type+0xd7/0x130 [ 137.273700] __schedule+0xedd/0x2470 [ 137.273715] ? io_schedule_timeout+0x150/0x150 [ 137.273728] ? __x64_sys_futex_time32+0x480/0x480 [ 137.273743] schedule+0xda/0x1b0 [ 137.273754] exit_to_user_mode_prepare+0x114/0x1a0 [ 137.273774] syscall_exit_to_user_mode+0x19/0x40 [ 137.273792] do_syscall_64+0x48/0x90 [ 137.273806] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 137.273824] RIP: 0033:0x7fbada566b19 [ 137.273832] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 137.273843] RSP: 002b:00007fbad7adc218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 137.273854] RAX: 0000000000000001 RBX: 00007fbada679f68 RCX: 00007fbada566b19 [ 137.273861] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007fbada679f6c [ 137.273869] RBP: 00007fbada679f60 R08: 000000000000000e R09: 0000000000000000 [ 137.273876] R10: 0000000000000003 R11: 0000000000000246 R12: 00007fbada679f6c [ 137.273883] R13: 00007ffd755e9b4f R14: 00007fbad7adc300 R15: 0000000000022000 [ 137.273898] [ 137.330760] WARNING: CPU: 0 PID: 3783 at kernel/events/core.c:2309 group_sched_out.part.0+0x2c7/0x460 [ 137.331436] Modules linked in: [ 137.331677] CPU: 0 PID: 3783 Comm: syz-executor.3 Not tainted 6.0.0-rc5-next-20220914 #1 [ 137.332264] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 137.333081] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 137.333487] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 137.334822] RSP: 0018:ffff888041f0fc48 EFLAGS: 00010006 [ 137.335210] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 137.335729] RDX: ffff88803414b580 RSI: ffffffff81566027 RDI: 0000000000000005 [ 137.336247] RBP: ffff888008660000 R08: 0000000000000005 R09: 0000000000000001 [ 137.336769] R10: 0000000000000000 R11: ffffffff865ac01b R12: ffff88800df79400 [ 137.337293] R13: ffff88806ce3d100 R14: ffffffff8547c660 R15: 0000000000000002 [ 137.337830] FS: 00007fbad7adc700(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 137.338426] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 137.338860] CR2: 00007f87e8d9e6f4 CR3: 0000000009980000 CR4: 0000000000350ef0 [ 137.339376] Call Trace: [ 137.339571] [ 137.339742] ctx_sched_out+0x8f1/0xc10 [ 137.340035] __perf_event_task_sched_out+0x6d0/0x18d0 [ 137.340426] ? lock_is_held_type+0xd7/0x130 [ 137.340755] ? __perf_cgroup_move+0x160/0x160 [ 137.341092] ? set_next_entity+0x304/0x550 [ 137.341416] ? update_curr+0x267/0x740 [ 137.341731] ? lock_is_held_type+0xd7/0x130 [ 137.342062] __schedule+0xedd/0x2470 [ 137.342353] ? io_schedule_timeout+0x150/0x150 [ 137.342698] ? __x64_sys_futex_time32+0x480/0x480 [ 137.343061] schedule+0xda/0x1b0 [ 137.343323] exit_to_user_mode_prepare+0x114/0x1a0 [ 137.343695] syscall_exit_to_user_mode+0x19/0x40 [ 137.344063] do_syscall_64+0x48/0x90 [ 137.344361] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 137.344755] RIP: 0033:0x7fbada566b19 [ 137.345033] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 137.346371] RSP: 002b:00007fbad7adc218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 137.346933] RAX: 0000000000000001 RBX: 00007fbada679f68 RCX: 00007fbada566b19 [ 137.347453] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007fbada679f6c [ 137.347982] RBP: 00007fbada679f60 R08: 000000000000000e R09: 0000000000000000 [ 137.348508] R10: 0000000000000003 R11: 0000000000000246 R12: 00007fbada679f6c [ 137.349032] R13: 00007ffd755e9b4f R14: 00007fbad7adc300 R15: 0000000000022000 [ 137.349569] [ 137.349750] irq event stamp: 512 [ 137.349999] hardirqs last enabled at (511): [] exit_to_user_mode_prepare+0x109/0x1a0 [ 137.350692] hardirqs last disabled at (512): [] __schedule+0x1225/0x2470 [ 137.351297] softirqs last enabled at (310): [] __irq_exit_rcu+0x11b/0x180 [ 137.351922] softirqs last disabled at (265): [] __irq_exit_rcu+0x11b/0x180 [ 137.352544] ---[ end trace 0000000000000000 ]--- [ 137.356089] audit: type=1400 audit(1663160292.216:9): avc: denied { block_suspend } for pid=3781 comm="syz-executor.5" capability=36 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 [ 141.938252] devtmpfs: Unknown parameter '+@@^:' 12:58:16 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000006c0)='./file0\x00', 0x0, 0x0) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) renameat2(r0, &(0x7f0000000080)='./file0\x00', r0, &(0x7f0000000180)='./file1\x00', 0x4) 12:58:16 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x185041, 0x0) mount(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='devtmpfs\x00', 0x0, &(0x7f0000000000)='+@@^:\x00') 12:58:16 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r0, 0x4b4b, &(0x7f0000000380)=""/98) 12:58:16 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) r0 = epoll_create(0x1) epoll_pwait(r0, &(0x7f0000000000)=[{}], 0x1, 0x7fffffff, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0x60000017}) [ 141.978235] devtmpfs: Unknown parameter '+@@^:' [ 141.981001] loop4: detected capacity change from 0 to 184 [ 141.991439] loop1: detected capacity change from 0 to 184 12:58:16 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_set$pid(0x2, 0x0, 0x2007) ioprio_get$pid(0x3, 0x0) 12:58:16 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)) 12:58:16 executing program 1: syz_mount_image$iso9660(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000", 0x7b, 0x8000}, {&(0x7f0000010600)="ff4344", 0x3, 0x8800}, {0x0, 0x0, 0xb800}], 0x0, &(0x7f0000000680)=ANY=[]) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, 0x0) renameat2(0xffffffffffffffff, 0xfffffffffffffffe, 0xffffffffffffffff, &(0x7f0000000380)='./file1\x00', 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)='r', 0x1}], 0x1) r0 = syz_io_uring_setup(0x178f, &(0x7f0000000440)={0x0, 0x301d, 0x900, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000000), &(0x7f0000000040)) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0xfffffffd, @loopback}, 0x1c) sendmmsg(r1, &(0x7f0000004240)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000300)="e9", 0xfffffe8e}], 0x1}}], 0x1, 0x0) recvfrom(r1, &(0x7f00000003c0)=""/77, 0x6bc2bb1, 0x324, 0x0, 0x37) io_uring_enter(r0, 0x64d0, 0x48be, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x1, 0x1f, 0x0, 0x0, 0x0, 0x5, 0x84208, 0xb84e01778a86e6ca, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, @perf_config_ext={0x100000000, 0xcf65}, 0x3108, 0x0, 0x81, 0x8, 0x0, 0x7fffffff, 0xbc, 0x0, 0x1f, 0x0, 0x214}, 0xffffffffffffffff, 0x0, r2, 0xa) socketpair$unix(0x1, 0x0, 0x0, 0x0) 12:58:16 executing program 4: syz_mount_image$iso9660(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000", 0x7b, 0x8000}, {&(0x7f0000010600)="ff4344", 0x3, 0x8800}, {0x0, 0x0, 0xb800}], 0x0, &(0x7f0000000680)=ANY=[]) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, 0x0) renameat2(0xffffffffffffffff, 0xfffffffffffffffe, 0xffffffffffffffff, &(0x7f0000000380)='./file1\x00', 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)='r', 0x1}], 0x1) r0 = syz_io_uring_setup(0x178f, &(0x7f0000000440)={0x0, 0x301d, 0x900, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000000), &(0x7f0000000040)) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0xfffffffd, @loopback}, 0x1c) sendmmsg(r1, &(0x7f0000004240)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000300)="e9", 0xfffffe8e}], 0x1}}], 0x1, 0x0) recvfrom(r1, &(0x7f00000003c0)=""/77, 0x6bc2bb1, 0x324, 0x0, 0x37) io_uring_enter(r0, 0x64d0, 0x48be, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x1, 0x1f, 0x0, 0x0, 0x0, 0x5, 0x84208, 0xb84e01778a86e6ca, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, @perf_config_ext={0x100000000, 0xcf65}, 0x3108, 0x0, 0x81, 0x8, 0x0, 0x7fffffff, 0xbc, 0x0, 0x1f, 0x0, 0x214}, 0xffffffffffffffff, 0x0, r2, 0xa) socketpair$unix(0x1, 0x0, 0x0, 0x0) 12:58:16 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)) 12:58:16 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x185041, 0x0) mount(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='devtmpfs\x00', 0x0, &(0x7f0000000000)='+@@^:\x00') [ 142.054348] devtmpfs: Unknown parameter '+@@^:' 12:58:16 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000006c0)='./file0\x00', 0x0, 0x0) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) renameat2(r0, &(0x7f0000000080)='./file0\x00', r0, &(0x7f0000000180)='./file1\x00', 0x4) [ 142.115344] loop1: detected capacity change from 0 to 184 12:58:16 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r0, 0x4b4b, &(0x7f0000000380)=""/98) 12:58:16 executing program 4: syz_mount_image$iso9660(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000", 0x7b, 0x8000}, {&(0x7f0000010600)="ff4344", 0x3, 0x8800}, {0x0, 0x0, 0xb800}], 0x0, &(0x7f0000000680)=ANY=[]) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, 0x0) renameat2(0xffffffffffffffff, 0xfffffffffffffffe, 0xffffffffffffffff, &(0x7f0000000380)='./file1\x00', 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)='r', 0x1}], 0x1) r0 = syz_io_uring_setup(0x178f, &(0x7f0000000440)={0x0, 0x301d, 0x900, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000000), &(0x7f0000000040)) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0xfffffffd, @loopback}, 0x1c) sendmmsg(r1, &(0x7f0000004240)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000300)="e9", 0xfffffe8e}], 0x1}}], 0x1, 0x0) recvfrom(r1, &(0x7f00000003c0)=""/77, 0x6bc2bb1, 0x324, 0x0, 0x37) io_uring_enter(r0, 0x64d0, 0x48be, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x1, 0x1f, 0x0, 0x0, 0x0, 0x5, 0x84208, 0xb84e01778a86e6ca, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, @perf_config_ext={0x100000000, 0xcf65}, 0x3108, 0x0, 0x81, 0x8, 0x0, 0x7fffffff, 0xbc, 0x0, 0x1f, 0x0, 0x214}, 0xffffffffffffffff, 0x0, r2, 0xa) socketpair$unix(0x1, 0x0, 0x0, 0x0) 12:58:16 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_set$pid(0x2, 0x0, 0x2007) ioprio_get$pid(0x3, 0x0) 12:58:16 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) r0 = epoll_create(0x1) epoll_pwait(r0, &(0x7f0000000000)=[{}], 0x1, 0x7fffffff, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0x60000017}) 12:58:16 executing program 1: syz_mount_image$iso9660(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000", 0x7b, 0x8000}, {&(0x7f0000010600)="ff4344", 0x3, 0x8800}, {0x0, 0x0, 0xb800}], 0x0, &(0x7f0000000680)=ANY=[]) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, 0x0) renameat2(0xffffffffffffffff, 0xfffffffffffffffe, 0xffffffffffffffff, &(0x7f0000000380)='./file1\x00', 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)='r', 0x1}], 0x1) r0 = syz_io_uring_setup(0x178f, &(0x7f0000000440)={0x0, 0x301d, 0x900, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000000), &(0x7f0000000040)) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0xfffffffd, @loopback}, 0x1c) sendmmsg(r1, &(0x7f0000004240)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000300)="e9", 0xfffffe8e}], 0x1}}], 0x1, 0x0) recvfrom(r1, &(0x7f00000003c0)=""/77, 0x6bc2bb1, 0x324, 0x0, 0x37) io_uring_enter(r0, 0x64d0, 0x48be, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x1, 0x1f, 0x0, 0x0, 0x0, 0x5, 0x84208, 0xb84e01778a86e6ca, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, @perf_config_ext={0x100000000, 0xcf65}, 0x3108, 0x0, 0x81, 0x8, 0x0, 0x7fffffff, 0xbc, 0x0, 0x1f, 0x0, 0x214}, 0xffffffffffffffff, 0x0, r2, 0xa) socketpair$unix(0x1, 0x0, 0x0, 0x0) 12:58:16 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)) 12:58:16 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x185041, 0x0) mount(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='devtmpfs\x00', 0x0, &(0x7f0000000000)='+@@^:\x00') [ 142.121766] loop4: detected capacity change from 0 to 184 [ 142.122922] devtmpfs: Unknown parameter '+@@^:' 12:58:17 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r0, 0x4b4b, &(0x7f0000000380)=""/98) 12:58:17 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000006c0)='./file0\x00', 0x0, 0x0) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) renameat2(r0, &(0x7f0000000080)='./file0\x00', r0, &(0x7f0000000180)='./file1\x00', 0x4) 12:58:17 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_set$pid(0x2, 0x0, 0x2007) ioprio_get$pid(0x3, 0x0) 12:58:17 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) r0 = epoll_create(0x1) epoll_pwait(r0, &(0x7f0000000000)=[{}], 0x1, 0x7fffffff, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0x60000017}) 12:58:17 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) r0 = epoll_create(0x1) epoll_pwait(r0, &(0x7f0000000000)=[{}], 0x1, 0x7fffffff, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0x60000017}) 12:58:17 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000006c0)='./file0\x00', 0x0, 0x0) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) renameat2(r0, &(0x7f0000000080)='./file0\x00', r0, &(0x7f0000000180)='./file1\x00', 0x4) 12:58:17 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000006c0)='./file0\x00', 0x0, 0x0) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) renameat2(r0, &(0x7f0000000080)='./file0\x00', r0, &(0x7f0000000180)='./file1\x00', 0x4) 12:58:17 executing program 4: r0 = io_uring_setup(0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/168, 0xa8}, {&(0x7f00000000c0)=""/227, 0xe3}, {&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/57, 0x39}], 0x6) fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000280)=0x2d8c, 0x4) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000280)=0x2d8c, 0x4) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x90, 0x4) 12:58:17 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chroot(&(0x7f0000000100)='./file0\x00') getcwd(0x0, 0xffffffffffffff4f) 12:58:17 executing program 0: syz_io_uring_setup(0x0, &(0x7f0000000100), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff0000/0x10000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) 12:58:17 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}, 0x81}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x4) openat$hpet(0xffffffffffffff9c, &(0x7f0000000080), 0x109201, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000200), 0x8, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000240)={0xa0002000}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r2, 0x40045431, &(0x7f0000000040)) r3 = ioctl$TIOCGPTPEER(r2, 0x5441, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_GETSTATE(r4, 0xc0189436, &(0x7f0000002000)) io_submit(0x0, 0x1, &(0x7f0000001340)=[&(0x7f0000001300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x200000}]) dup2(r3, r0) pwrite64(r4, &(0x7f0000000300)="56fe4cd2e402b2e3121444a7c61129cac7dfad7dff17c4a587d6b56360180d0b57ae7c8349683430f3d23df15a69a2a293e62e00807478e73bf9385f0eaf79d4b023f25f1bd0a1a7ee4eb6229eded41a818334cf91034d0f9d46b6a3a8c673682e83919d1087543408be006699cd02fe82f33410c85deb4cc9564a680d0172c0276a4a8341ed2830ebe83d9e4014869acd03bd2a8103205ce76a6811c2cbb5da35391edad6ab658de36e3c884f9bca158778fa89c54edf0d8fdef74fa0b6a08d179024741027527fc398ad7353c7630cc434e28d0864af800f6fa42e0ad76177aeeb791e2baa7f6f1f8aa92deb584a798a110d3aa3", 0xf5, 0x8) 12:58:17 executing program 4: r0 = io_uring_setup(0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/168, 0xa8}, {&(0x7f00000000c0)=""/227, 0xe3}, {&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/57, 0x39}], 0x6) fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000280)=0x2d8c, 0x4) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000280)=0x2d8c, 0x4) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x90, 0x4) 12:58:17 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000006c0)='./file0\x00', 0x0, 0x0) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) renameat2(r0, &(0x7f0000000080)='./file0\x00', r0, &(0x7f0000000180)='./file1\x00', 0x4) 12:58:17 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chroot(&(0x7f0000000100)='./file0\x00') getcwd(0x0, 0xffffffffffffff4f) 12:58:17 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000006c0)='./file0\x00', 0x0, 0x0) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) renameat2(r0, &(0x7f0000000080)='./file0\x00', r0, &(0x7f0000000180)='./file1\x00', 0x4) 12:58:17 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chroot(&(0x7f0000000100)='./file0\x00') getcwd(0x0, 0xffffffffffffff4f) 12:58:17 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) r0 = epoll_create(0x1) epoll_pwait(r0, &(0x7f0000000000)=[{}], 0x1, 0x7fffffff, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0x60000017}) 12:58:17 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000006c0)='./file0\x00', 0x0, 0x0) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) renameat2(r0, &(0x7f0000000080)='./file0\x00', r0, &(0x7f0000000180)='./file1\x00', 0x4) 12:58:17 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chroot(&(0x7f0000000100)='./file0\x00') getcwd(0x0, 0xffffffffffffff4f) 12:58:17 executing program 4: r0 = io_uring_setup(0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/168, 0xa8}, {&(0x7f00000000c0)=""/227, 0xe3}, {&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/57, 0x39}], 0x6) fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000280)=0x2d8c, 0x4) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000280)=0x2d8c, 0x4) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x90, 0x4) 12:58:17 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chroot(&(0x7f0000000100)='./file0\x00') getcwd(0x0, 0xffffffffffffff4f) 12:58:17 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000006c0)='./file0\x00', 0x0, 0x0) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) renameat2(r0, &(0x7f0000000080)='./file0\x00', r0, &(0x7f0000000180)='./file1\x00', 0x4) 12:58:17 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}, 0x81}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x4) openat$hpet(0xffffffffffffff9c, &(0x7f0000000080), 0x109201, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000200), 0x8, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000240)={0xa0002000}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r2, 0x40045431, &(0x7f0000000040)) r3 = ioctl$TIOCGPTPEER(r2, 0x5441, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_GETSTATE(r4, 0xc0189436, &(0x7f0000002000)) io_submit(0x0, 0x1, &(0x7f0000001340)=[&(0x7f0000001300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x200000}]) dup2(r3, r0) pwrite64(r4, &(0x7f0000000300)="56fe4cd2e402b2e3121444a7c61129cac7dfad7dff17c4a587d6b56360180d0b57ae7c8349683430f3d23df15a69a2a293e62e00807478e73bf9385f0eaf79d4b023f25f1bd0a1a7ee4eb6229eded41a818334cf91034d0f9d46b6a3a8c673682e83919d1087543408be006699cd02fe82f33410c85deb4cc9564a680d0172c0276a4a8341ed2830ebe83d9e4014869acd03bd2a8103205ce76a6811c2cbb5da35391edad6ab658de36e3c884f9bca158778fa89c54edf0d8fdef74fa0b6a08d179024741027527fc398ad7353c7630cc434e28d0864af800f6fa42e0ad76177aeeb791e2baa7f6f1f8aa92deb584a798a110d3aa3", 0xf5, 0x8) 12:58:17 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}, 0x81}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x4) openat$hpet(0xffffffffffffff9c, &(0x7f0000000080), 0x109201, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000200), 0x8, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000240)={0xa0002000}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r2, 0x40045431, &(0x7f0000000040)) r3 = ioctl$TIOCGPTPEER(r2, 0x5441, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_GETSTATE(r4, 0xc0189436, &(0x7f0000002000)) io_submit(0x0, 0x1, &(0x7f0000001340)=[&(0x7f0000001300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x200000}]) dup2(r3, r0) pwrite64(r4, &(0x7f0000000300)="56fe4cd2e402b2e3121444a7c61129cac7dfad7dff17c4a587d6b56360180d0b57ae7c8349683430f3d23df15a69a2a293e62e00807478e73bf9385f0eaf79d4b023f25f1bd0a1a7ee4eb6229eded41a818334cf91034d0f9d46b6a3a8c673682e83919d1087543408be006699cd02fe82f33410c85deb4cc9564a680d0172c0276a4a8341ed2830ebe83d9e4014869acd03bd2a8103205ce76a6811c2cbb5da35391edad6ab658de36e3c884f9bca158778fa89c54edf0d8fdef74fa0b6a08d179024741027527fc398ad7353c7630cc434e28d0864af800f6fa42e0ad76177aeeb791e2baa7f6f1f8aa92deb584a798a110d3aa3", 0xf5, 0x8) 12:58:17 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chroot(&(0x7f0000000100)='./file0\x00') getcwd(0x0, 0xffffffffffffff4f) 12:58:17 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chroot(&(0x7f0000000100)='./file0\x00') getcwd(0x0, 0xffffffffffffff4f) 12:58:17 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}, 0x81}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x4) openat$hpet(0xffffffffffffff9c, &(0x7f0000000080), 0x109201, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000200), 0x8, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000240)={0xa0002000}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r2, 0x40045431, &(0x7f0000000040)) r3 = ioctl$TIOCGPTPEER(r2, 0x5441, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_GETSTATE(r4, 0xc0189436, &(0x7f0000002000)) io_submit(0x0, 0x1, &(0x7f0000001340)=[&(0x7f0000001300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x200000}]) dup2(r3, r0) pwrite64(r4, &(0x7f0000000300)="56fe4cd2e402b2e3121444a7c61129cac7dfad7dff17c4a587d6b56360180d0b57ae7c8349683430f3d23df15a69a2a293e62e00807478e73bf9385f0eaf79d4b023f25f1bd0a1a7ee4eb6229eded41a818334cf91034d0f9d46b6a3a8c673682e83919d1087543408be006699cd02fe82f33410c85deb4cc9564a680d0172c0276a4a8341ed2830ebe83d9e4014869acd03bd2a8103205ce76a6811c2cbb5da35391edad6ab658de36e3c884f9bca158778fa89c54edf0d8fdef74fa0b6a08d179024741027527fc398ad7353c7630cc434e28d0864af800f6fa42e0ad76177aeeb791e2baa7f6f1f8aa92deb584a798a110d3aa3", 0xf5, 0x8) 12:58:17 executing program 4: r0 = io_uring_setup(0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/168, 0xa8}, {&(0x7f00000000c0)=""/227, 0xe3}, {&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/57, 0x39}], 0x6) fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000280)=0x2d8c, 0x4) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000280)=0x2d8c, 0x4) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x90, 0x4) 12:58:17 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) r0 = epoll_create(0x1) epoll_pwait(r0, &(0x7f0000000000)=[{}], 0x1, 0x7fffffff, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0x60000017}) [ 142.545826] hrtimer: interrupt took 18444 ns 12:58:17 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}, 0x81}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x4) openat$hpet(0xffffffffffffff9c, &(0x7f0000000080), 0x109201, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000200), 0x8, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000240)={0xa0002000}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r2, 0x40045431, &(0x7f0000000040)) r3 = ioctl$TIOCGPTPEER(r2, 0x5441, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_GETSTATE(r4, 0xc0189436, &(0x7f0000002000)) io_submit(0x0, 0x1, &(0x7f0000001340)=[&(0x7f0000001300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x200000}]) dup2(r3, r0) pwrite64(r4, &(0x7f0000000300)="56fe4cd2e402b2e3121444a7c61129cac7dfad7dff17c4a587d6b56360180d0b57ae7c8349683430f3d23df15a69a2a293e62e00807478e73bf9385f0eaf79d4b023f25f1bd0a1a7ee4eb6229eded41a818334cf91034d0f9d46b6a3a8c673682e83919d1087543408be006699cd02fe82f33410c85deb4cc9564a680d0172c0276a4a8341ed2830ebe83d9e4014869acd03bd2a8103205ce76a6811c2cbb5da35391edad6ab658de36e3c884f9bca158778fa89c54edf0d8fdef74fa0b6a08d179024741027527fc398ad7353c7630cc434e28d0864af800f6fa42e0ad76177aeeb791e2baa7f6f1f8aa92deb584a798a110d3aa3", 0xf5, 0x8) 12:58:17 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r0, 0x5) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x4) 12:58:18 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}, 0x81}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x4) openat$hpet(0xffffffffffffff9c, &(0x7f0000000080), 0x109201, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000200), 0x8, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000240)={0xa0002000}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r2, 0x40045431, &(0x7f0000000040)) r3 = ioctl$TIOCGPTPEER(r2, 0x5441, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_GETSTATE(r4, 0xc0189436, &(0x7f0000002000)) io_submit(0x0, 0x1, &(0x7f0000001340)=[&(0x7f0000001300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x200000}]) dup2(r3, r0) pwrite64(r4, &(0x7f0000000300)="56fe4cd2e402b2e3121444a7c61129cac7dfad7dff17c4a587d6b56360180d0b57ae7c8349683430f3d23df15a69a2a293e62e00807478e73bf9385f0eaf79d4b023f25f1bd0a1a7ee4eb6229eded41a818334cf91034d0f9d46b6a3a8c673682e83919d1087543408be006699cd02fe82f33410c85deb4cc9564a680d0172c0276a4a8341ed2830ebe83d9e4014869acd03bd2a8103205ce76a6811c2cbb5da35391edad6ab658de36e3c884f9bca158778fa89c54edf0d8fdef74fa0b6a08d179024741027527fc398ad7353c7630cc434e28d0864af800f6fa42e0ad76177aeeb791e2baa7f6f1f8aa92deb584a798a110d3aa3", 0xf5, 0x8) 12:58:18 executing program 6: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_int(r0, 0x1, 0x38, 0x0, &(0x7f00000000c0)) 12:58:18 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}, 0x81}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x4) openat$hpet(0xffffffffffffff9c, &(0x7f0000000080), 0x109201, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000200), 0x8, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000240)={0xa0002000}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r2, 0x40045431, &(0x7f0000000040)) r3 = ioctl$TIOCGPTPEER(r2, 0x5441, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_GETSTATE(r4, 0xc0189436, &(0x7f0000002000)) io_submit(0x0, 0x1, &(0x7f0000001340)=[&(0x7f0000001300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x200000}]) dup2(r3, r0) pwrite64(r4, &(0x7f0000000300)="56fe4cd2e402b2e3121444a7c61129cac7dfad7dff17c4a587d6b56360180d0b57ae7c8349683430f3d23df15a69a2a293e62e00807478e73bf9385f0eaf79d4b023f25f1bd0a1a7ee4eb6229eded41a818334cf91034d0f9d46b6a3a8c673682e83919d1087543408be006699cd02fe82f33410c85deb4cc9564a680d0172c0276a4a8341ed2830ebe83d9e4014869acd03bd2a8103205ce76a6811c2cbb5da35391edad6ab658de36e3c884f9bca158778fa89c54edf0d8fdef74fa0b6a08d179024741027527fc398ad7353c7630cc434e28d0864af800f6fa42e0ad76177aeeb791e2baa7f6f1f8aa92deb584a798a110d3aa3", 0xf5, 0x8) 12:58:18 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) connect$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x20, @fixed, 0x0, 0x1}, 0xe) 12:58:18 executing program 7: r0 = open$dir(&(0x7f0000000200)='.\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f0000000000)=""/42, 0x2a) 12:58:18 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}, 0x81}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x4) openat$hpet(0xffffffffffffff9c, &(0x7f0000000080), 0x109201, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000200), 0x8, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000240)={0xa0002000}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r2, 0x40045431, &(0x7f0000000040)) r3 = ioctl$TIOCGPTPEER(r2, 0x5441, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_GETSTATE(r4, 0xc0189436, &(0x7f0000002000)) io_submit(0x0, 0x1, &(0x7f0000001340)=[&(0x7f0000001300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x200000}]) dup2(r3, r0) pwrite64(r4, &(0x7f0000000300)="56fe4cd2e402b2e3121444a7c61129cac7dfad7dff17c4a587d6b56360180d0b57ae7c8349683430f3d23df15a69a2a293e62e00807478e73bf9385f0eaf79d4b023f25f1bd0a1a7ee4eb6229eded41a818334cf91034d0f9d46b6a3a8c673682e83919d1087543408be006699cd02fe82f33410c85deb4cc9564a680d0172c0276a4a8341ed2830ebe83d9e4014869acd03bd2a8103205ce76a6811c2cbb5da35391edad6ab658de36e3c884f9bca158778fa89c54edf0d8fdef74fa0b6a08d179024741027527fc398ad7353c7630cc434e28d0864af800f6fa42e0ad76177aeeb791e2baa7f6f1f8aa92deb584a798a110d3aa3", 0xf5, 0x8) 12:58:18 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}, 0x81}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x4) openat$hpet(0xffffffffffffff9c, &(0x7f0000000080), 0x109201, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000200), 0x8, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000240)={0xa0002000}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r2, 0x40045431, &(0x7f0000000040)) r3 = ioctl$TIOCGPTPEER(r2, 0x5441, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_GETSTATE(r4, 0xc0189436, &(0x7f0000002000)) io_submit(0x0, 0x1, &(0x7f0000001340)=[&(0x7f0000001300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x200000}]) dup2(r3, r0) pwrite64(r4, &(0x7f0000000300)="56fe4cd2e402b2e3121444a7c61129cac7dfad7dff17c4a587d6b56360180d0b57ae7c8349683430f3d23df15a69a2a293e62e00807478e73bf9385f0eaf79d4b023f25f1bd0a1a7ee4eb6229eded41a818334cf91034d0f9d46b6a3a8c673682e83919d1087543408be006699cd02fe82f33410c85deb4cc9564a680d0172c0276a4a8341ed2830ebe83d9e4014869acd03bd2a8103205ce76a6811c2cbb5da35391edad6ab658de36e3c884f9bca158778fa89c54edf0d8fdef74fa0b6a08d179024741027527fc398ad7353c7630cc434e28d0864af800f6fa42e0ad76177aeeb791e2baa7f6f1f8aa92deb584a798a110d3aa3", 0xf5, 0x8) 12:58:18 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r0, 0x5) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x4) 12:58:18 executing program 6: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_int(r0, 0x1, 0x38, 0x0, &(0x7f00000000c0)) 12:58:18 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r0, 0x5) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x4) 12:58:18 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) connect$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x20, @fixed, 0x0, 0x1}, 0xe) 12:58:18 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}, 0x81}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x4) openat$hpet(0xffffffffffffff9c, &(0x7f0000000080), 0x109201, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000200), 0x8, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000240)={0xa0002000}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r2, 0x40045431, &(0x7f0000000040)) r3 = ioctl$TIOCGPTPEER(r2, 0x5441, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_GETSTATE(r4, 0xc0189436, &(0x7f0000002000)) io_submit(0x0, 0x1, &(0x7f0000001340)=[&(0x7f0000001300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x200000}]) dup2(r3, r0) pwrite64(r4, &(0x7f0000000300)="56fe4cd2e402b2e3121444a7c61129cac7dfad7dff17c4a587d6b56360180d0b57ae7c8349683430f3d23df15a69a2a293e62e00807478e73bf9385f0eaf79d4b023f25f1bd0a1a7ee4eb6229eded41a818334cf91034d0f9d46b6a3a8c673682e83919d1087543408be006699cd02fe82f33410c85deb4cc9564a680d0172c0276a4a8341ed2830ebe83d9e4014869acd03bd2a8103205ce76a6811c2cbb5da35391edad6ab658de36e3c884f9bca158778fa89c54edf0d8fdef74fa0b6a08d179024741027527fc398ad7353c7630cc434e28d0864af800f6fa42e0ad76177aeeb791e2baa7f6f1f8aa92deb584a798a110d3aa3", 0xf5, 0x8) 12:58:18 executing program 7: r0 = open$dir(&(0x7f0000000200)='.\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f0000000000)=""/42, 0x2a) 12:58:18 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r0, 0x5) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x4) 12:58:18 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}, 0x81}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x4) openat$hpet(0xffffffffffffff9c, &(0x7f0000000080), 0x109201, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000200), 0x8, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000240)={0xa0002000}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r2, 0x40045431, &(0x7f0000000040)) r3 = ioctl$TIOCGPTPEER(r2, 0x5441, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_GETSTATE(r4, 0xc0189436, &(0x7f0000002000)) io_submit(0x0, 0x1, &(0x7f0000001340)=[&(0x7f0000001300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x200000}]) dup2(r3, r0) pwrite64(r4, &(0x7f0000000300)="56fe4cd2e402b2e3121444a7c61129cac7dfad7dff17c4a587d6b56360180d0b57ae7c8349683430f3d23df15a69a2a293e62e00807478e73bf9385f0eaf79d4b023f25f1bd0a1a7ee4eb6229eded41a818334cf91034d0f9d46b6a3a8c673682e83919d1087543408be006699cd02fe82f33410c85deb4cc9564a680d0172c0276a4a8341ed2830ebe83d9e4014869acd03bd2a8103205ce76a6811c2cbb5da35391edad6ab658de36e3c884f9bca158778fa89c54edf0d8fdef74fa0b6a08d179024741027527fc398ad7353c7630cc434e28d0864af800f6fa42e0ad76177aeeb791e2baa7f6f1f8aa92deb584a798a110d3aa3", 0xf5, 0x8) 12:58:18 executing program 6: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_int(r0, 0x1, 0x38, 0x0, &(0x7f00000000c0)) 12:58:18 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}, 0x81}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x4) openat$hpet(0xffffffffffffff9c, &(0x7f0000000080), 0x109201, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000200), 0x8, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000240)={0xa0002000}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r2, 0x40045431, &(0x7f0000000040)) r3 = ioctl$TIOCGPTPEER(r2, 0x5441, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_GETSTATE(r4, 0xc0189436, &(0x7f0000002000)) io_submit(0x0, 0x1, &(0x7f0000001340)=[&(0x7f0000001300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x200000}]) dup2(r3, r0) pwrite64(r4, &(0x7f0000000300)="56fe4cd2e402b2e3121444a7c61129cac7dfad7dff17c4a587d6b56360180d0b57ae7c8349683430f3d23df15a69a2a293e62e00807478e73bf9385f0eaf79d4b023f25f1bd0a1a7ee4eb6229eded41a818334cf91034d0f9d46b6a3a8c673682e83919d1087543408be006699cd02fe82f33410c85deb4cc9564a680d0172c0276a4a8341ed2830ebe83d9e4014869acd03bd2a8103205ce76a6811c2cbb5da35391edad6ab658de36e3c884f9bca158778fa89c54edf0d8fdef74fa0b6a08d179024741027527fc398ad7353c7630cc434e28d0864af800f6fa42e0ad76177aeeb791e2baa7f6f1f8aa92deb584a798a110d3aa3", 0xf5, 0x8) 12:58:18 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r0, 0x5) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x4) 12:58:18 executing program 7: r0 = open$dir(&(0x7f0000000200)='.\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f0000000000)=""/42, 0x2a) 12:58:18 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) connect$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x20, @fixed, 0x0, 0x1}, 0xe) 12:58:18 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r0, 0x5) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x4) 12:58:18 executing program 6: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_int(r0, 0x1, 0x38, 0x0, &(0x7f00000000c0)) 12:58:18 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}, 0x81}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x4) openat$hpet(0xffffffffffffff9c, &(0x7f0000000080), 0x109201, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000200), 0x8, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000240)={0xa0002000}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r2, 0x40045431, &(0x7f0000000040)) r3 = ioctl$TIOCGPTPEER(r2, 0x5441, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_GETSTATE(r4, 0xc0189436, &(0x7f0000002000)) io_submit(0x0, 0x1, &(0x7f0000001340)=[&(0x7f0000001300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x200000}]) dup2(r3, r0) pwrite64(r4, &(0x7f0000000300)="56fe4cd2e402b2e3121444a7c61129cac7dfad7dff17c4a587d6b56360180d0b57ae7c8349683430f3d23df15a69a2a293e62e00807478e73bf9385f0eaf79d4b023f25f1bd0a1a7ee4eb6229eded41a818334cf91034d0f9d46b6a3a8c673682e83919d1087543408be006699cd02fe82f33410c85deb4cc9564a680d0172c0276a4a8341ed2830ebe83d9e4014869acd03bd2a8103205ce76a6811c2cbb5da35391edad6ab658de36e3c884f9bca158778fa89c54edf0d8fdef74fa0b6a08d179024741027527fc398ad7353c7630cc434e28d0864af800f6fa42e0ad76177aeeb791e2baa7f6f1f8aa92deb584a798a110d3aa3", 0xf5, 0x8) 12:58:18 executing program 7: r0 = open$dir(&(0x7f0000000200)='.\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f0000000000)=""/42, 0x2a) 12:58:18 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) connect$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x20, @fixed, 0x0, 0x1}, 0xe) 12:58:18 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) readv(r3, &(0x7f0000000380)=[{&(0x7f0000000200)=""/17, 0x11}, {&(0x7f0000000100)=""/209, 0xd1}, {&(0x7f0000000200)}, {0x0}, {&(0x7f0000000400)=""/59, 0x3b}], 0x5) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfffffffffffffffb) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000080)={0x17e}) ftruncate(r4, 0x0) sendmsg$IPSET_CMD_PROTOCOL(r1, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)=ANY=[@ANYBLOB="2c00000001060300000000000000000005000004050001000700200005000100070000000500010007000000"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x34008040) 12:58:18 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000100)=""/233, 0xe9, 0x0) flock(r0, 0x5) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x4) 12:58:18 executing program 5: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRES32=0xffffffffffffffff, @ANYRESDEC=r1]) ioctl$SIOCGSTAMPNS(r3, 0x8907, &(0x7f0000000040)) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000080)=0x8) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r5) r6 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r5, r6) keyctl$search(0xa, r2, &(0x7f00000000c0)='.request_key_auth\x00', &(0x7f0000000180)={'syz', 0x3}, r6) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0xcb3, 0x0, 0x0, 0xfffffffffffffffd}) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000080), 0x0) 12:58:18 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, &(0x7f0000000200)=""/148, 0xfffffffffffffcda, 0x0, &(0x7f0000000140)=""/122, 0x7a}, &(0x7f00000001c0)=0x38) 12:58:18 executing program 5: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRES32=0xffffffffffffffff, @ANYRESDEC=r1]) ioctl$SIOCGSTAMPNS(r3, 0x8907, &(0x7f0000000040)) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000080)=0x8) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r5) r6 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r5, r6) keyctl$search(0xa, r2, &(0x7f00000000c0)='.request_key_auth\x00', &(0x7f0000000180)={'syz', 0x3}, r6) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0xcb3, 0x0, 0x0, 0xfffffffffffffffd}) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000080), 0x0) [ 144.010343] syz-executor.1 (4162) used greatest stack depth: 24784 bytes left 12:58:18 executing program 7: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRES32=0xffffffffffffffff, @ANYRESDEC=r1]) ioctl$SIOCGSTAMPNS(r3, 0x8907, &(0x7f0000000040)) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000080)=0x8) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r5) r6 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r5, r6) keyctl$search(0xa, r2, &(0x7f00000000c0)='.request_key_auth\x00', &(0x7f0000000180)={'syz', 0x3}, r6) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0xcb3, 0x0, 0x0, 0xfffffffffffffffd}) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000080), 0x0) 12:58:18 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, &(0x7f0000000200)=""/148, 0xfffffffffffffcda, 0x0, &(0x7f0000000140)=""/122, 0x7a}, &(0x7f00000001c0)=0x38) 12:58:18 executing program 0: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRES32=0xffffffffffffffff, @ANYRESDEC=r1]) ioctl$SIOCGSTAMPNS(r3, 0x8907, &(0x7f0000000040)) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000080)=0x8) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r5) r6 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r5, r6) keyctl$search(0xa, r2, &(0x7f00000000c0)='.request_key_auth\x00', &(0x7f0000000180)={'syz', 0x3}, r6) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0xcb3, 0x0, 0x0, 0xfffffffffffffffd}) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000080), 0x0) 12:58:18 executing program 4: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRES32=0xffffffffffffffff, @ANYRESDEC=r1]) ioctl$SIOCGSTAMPNS(r3, 0x8907, &(0x7f0000000040)) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000080)=0x8) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r5) r6 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r5, r6) keyctl$search(0xa, r2, &(0x7f00000000c0)='.request_key_auth\x00', &(0x7f0000000180)={'syz', 0x3}, r6) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0xcb3, 0x0, 0x0, 0xfffffffffffffffd}) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000080), 0x0) 12:58:18 executing program 6: r0 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x20) stat(&(0x7f0000001480)='./file0\x00', &(0x7f0000000080)) 12:58:18 executing program 7: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRES32=0xffffffffffffffff, @ANYRESDEC=r1]) ioctl$SIOCGSTAMPNS(r3, 0x8907, &(0x7f0000000040)) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000080)=0x8) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r5) r6 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r5, r6) keyctl$search(0xa, r2, &(0x7f00000000c0)='.request_key_auth\x00', &(0x7f0000000180)={'syz', 0x3}, r6) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0xcb3, 0x0, 0x0, 0xfffffffffffffffd}) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000080), 0x0) 12:58:18 executing program 5: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRES32=0xffffffffffffffff, @ANYRESDEC=r1]) ioctl$SIOCGSTAMPNS(r3, 0x8907, &(0x7f0000000040)) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000080)=0x8) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r5) r6 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r5, r6) keyctl$search(0xa, r2, &(0x7f00000000c0)='.request_key_auth\x00', &(0x7f0000000180)={'syz', 0x3}, r6) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0xcb3, 0x0, 0x0, 0xfffffffffffffffd}) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000080), 0x0) 12:58:18 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) readv(r3, &(0x7f0000000380)=[{&(0x7f0000000200)=""/17, 0x11}, {&(0x7f0000000100)=""/209, 0xd1}, {&(0x7f0000000200)}, {0x0}, {&(0x7f0000000400)=""/59, 0x3b}], 0x5) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfffffffffffffffb) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000080)={0x17e}) ftruncate(r4, 0x0) sendmsg$IPSET_CMD_PROTOCOL(r1, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)=ANY=[@ANYBLOB="2c00000001060300000000000000000005000004050001000700200005000100070000000500010007000000"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x34008040) 12:58:19 executing program 6: r0 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x20) stat(&(0x7f0000001480)='./file0\x00', &(0x7f0000000080)) 12:58:19 executing program 4: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRES32=0xffffffffffffffff, @ANYRESDEC=r1]) ioctl$SIOCGSTAMPNS(r3, 0x8907, &(0x7f0000000040)) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000080)=0x8) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r5) r6 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r5, r6) keyctl$search(0xa, r2, &(0x7f00000000c0)='.request_key_auth\x00', &(0x7f0000000180)={'syz', 0x3}, r6) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0xcb3, 0x0, 0x0, 0xfffffffffffffffd}) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000080), 0x0) 12:58:19 executing program 0: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRES32=0xffffffffffffffff, @ANYRESDEC=r1]) ioctl$SIOCGSTAMPNS(r3, 0x8907, &(0x7f0000000040)) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000080)=0x8) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r5) r6 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r5, r6) keyctl$search(0xa, r2, &(0x7f00000000c0)='.request_key_auth\x00', &(0x7f0000000180)={'syz', 0x3}, r6) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0xcb3, 0x0, 0x0, 0xfffffffffffffffd}) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000080), 0x0) 12:58:19 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, &(0x7f0000000200)=""/148, 0xfffffffffffffcda, 0x0, &(0x7f0000000140)=""/122, 0x7a}, &(0x7f00000001c0)=0x38) 12:58:19 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x20) stat(&(0x7f0000001480)='./file0\x00', &(0x7f0000000080)) 12:58:19 executing program 5: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000340)=ANY=[@ANYBLOB="4100fa17d5ffffff17000000af17c5c36bccd237ce23a2d8b4ff7f0000000000000f6d8bc17cd8231356d4bc2dc4cd09bcc4a814a66e19319db964fe7c298cad52d095bb4da6d58735248d6b0005000000000000451f40e33b304c44de167e6656abedc03f46132c191c16a04d8619fe5e9e77647917ee3956813652a06a42dad511ad156c0d2ce97dee52520000000000000000940bdead371ef43fd784b1b73f1efa7e064ceddf44e343c307d3e5de47576d24a059c81f9d9863e14822c268df62fe53b8af3eec54d1e2c270d8bfeb9dd77fbbb115f4b8151eb9b0c9c8314660d7d8340ea5a11d66881ece6a6a6d34621ae07b66d4495f732ff207f2cdff976b23abce4220e10c729a492da6fe0ca2c8e07ae863de7d6874a62a4f1457a5253c436bdb9817456e435f06c1b18e062f2d99333aa4db8bc7b11a92d6d52fc9f09ea4aa7cb3608a41db156b7d1aff06b48adb86e84041d36737beaf29584ffff3b43f93999144665e8d895e47cd2b6e032b9a87fdbc91", @ANYRES32=0xffffffffffffffff, @ANYRESDEC=r1]) ioctl$SIOCGSTAMPNS(r3, 0x8907, &(0x7f0000000040)) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000080)=0x8) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r5) r6 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r5, r6) keyctl$search(0xa, r2, &(0x7f00000000c0)='.request_key_auth\x00', &(0x7f0000000180)={'syz', 0x3}, r6) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0xcb3, 0x0, 0x0, 0xfffffffffffffffd}) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000080), 0x0) 12:58:19 executing program 7: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRES32=0xffffffffffffffff, @ANYRESDEC=r1]) ioctl$SIOCGSTAMPNS(r3, 0x8907, &(0x7f0000000040)) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000080)=0x8) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r5) r6 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r5, r6) keyctl$search(0xa, r2, &(0x7f00000000c0)='.request_key_auth\x00', &(0x7f0000000180)={'syz', 0x3}, r6) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0xcb3, 0x0, 0x0, 0xfffffffffffffffd}) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000080), 0x0) 12:58:19 executing program 0: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRES32=0xffffffffffffffff, @ANYRESDEC=r1]) ioctl$SIOCGSTAMPNS(r3, 0x8907, &(0x7f0000000040)) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000080)=0x8) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r5) r6 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r5, r6) keyctl$search(0xa, r2, &(0x7f00000000c0)='.request_key_auth\x00', &(0x7f0000000180)={'syz', 0x3}, r6) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0xcb3, 0x0, 0x0, 0xfffffffffffffffd}) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000080), 0x0) 12:58:19 executing program 4: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRES32=0xffffffffffffffff, @ANYRESDEC=r1]) ioctl$SIOCGSTAMPNS(r3, 0x8907, &(0x7f0000000040)) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000080)=0x8) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r5) r6 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r5, r6) keyctl$search(0xa, r2, &(0x7f00000000c0)='.request_key_auth\x00', &(0x7f0000000180)={'syz', 0x3}, r6) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0xcb3, 0x0, 0x0, 0xfffffffffffffffd}) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000080), 0x0) 12:58:19 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) readv(r3, &(0x7f0000000380)=[{&(0x7f0000000200)=""/17, 0x11}, {&(0x7f0000000100)=""/209, 0xd1}, {&(0x7f0000000200)}, {0x0}, {&(0x7f0000000400)=""/59, 0x3b}], 0x5) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfffffffffffffffb) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000080)={0x17e}) ftruncate(r4, 0x0) sendmsg$IPSET_CMD_PROTOCOL(r1, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)=ANY=[@ANYBLOB="2c00000001060300000000000000000005000004050001000700200005000100070000000500010007000000"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x34008040) 12:58:19 executing program 6: r0 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x20) stat(&(0x7f0000001480)='./file0\x00', &(0x7f0000000080)) 12:58:19 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x20) stat(&(0x7f0000001480)='./file0\x00', &(0x7f0000000080)) 12:58:19 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, &(0x7f0000000200)=""/148, 0xfffffffffffffcda, 0x0, &(0x7f0000000140)=""/122, 0x7a}, &(0x7f00000001c0)=0x38) 12:58:19 executing program 6: r0 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x20) stat(&(0x7f0000001480)='./file0\x00', &(0x7f0000000080)) 12:58:19 executing program 7: syz_genetlink_get_family_id$gtp(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$nfs4(&(0x7f0000000c40), &(0x7f0000000c80)='./file0\x00', 0x0, 0x3, &(0x7f0000001040)=[{&(0x7f0000000cc0)='r', 0x1}, {&(0x7f0000000d00)="fc", 0x1}, {0x0, 0x0, 0x8}], 0x37841, &(0x7f0000001100)={[], [{@smackfsfloor={'smackfsfloor', 0x3d, 'gtp\x00'}}, {@subj_role={'subj_role', 0x3d, 'gtp\x00'}}, {@dont_measure}]}) 12:58:19 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) readv(r3, &(0x7f0000000380)=[{&(0x7f0000000200)=""/17, 0x11}, {&(0x7f0000000100)=""/209, 0xd1}, {&(0x7f0000000200)}, {0x0}, {&(0x7f0000000400)=""/59, 0x3b}], 0x5) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfffffffffffffffb) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000080)={0x17e}) ftruncate(r4, 0x0) sendmsg$IPSET_CMD_PROTOCOL(r1, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)=ANY=[@ANYBLOB="2c00000001060300000000000000000005000004050001000700200005000100070000000500010007000000"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x34008040) 12:58:19 executing program 0: r0 = memfd_create(&(0x7f0000000180)='vfat\x00', 0x0) lseek(r0, 0x1, 0x1) 12:58:19 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x17, &(0x7f0000000040)=0x20000, 0x4) [ 144.446037] ======================================================= [ 144.446037] WARNING: The mand mount option has been deprecated and [ 144.446037] and is ignored by this kernel. Remove the mand 12:58:19 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) fallocate(r0, 0x0, 0x0, 0x8531) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) preadv2(r1, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/75, 0x4b}], 0x1, 0x0, 0x0, 0x8) 12:58:19 executing program 0: r0 = memfd_create(&(0x7f0000000180)='vfat\x00', 0x0) lseek(r0, 0x1, 0x1) [ 144.446037] option from the mount to silence this warning. [ 144.446037] ======================================================= 12:58:19 executing program 6: perf_event_open(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xffffffff81000000, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:58:19 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x17, &(0x7f0000000040)=0x20000, 0x4) 12:58:19 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x20) stat(&(0x7f0000001480)='./file0\x00', &(0x7f0000000080)) 12:58:19 executing program 0: r0 = memfd_create(&(0x7f0000000180)='vfat\x00', 0x0) lseek(r0, 0x1, 0x1) 12:58:19 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) fallocate(r0, 0x0, 0x0, 0x8531) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) preadv2(r1, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/75, 0x4b}], 0x1, 0x0, 0x0, 0x8) 12:58:19 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) readv(r3, &(0x7f0000000380)=[{&(0x7f0000000200)=""/17, 0x11}, {&(0x7f0000000100)=""/209, 0xd1}, {&(0x7f0000000200)}, {0x0}, {&(0x7f0000000400)=""/59, 0x3b}], 0x5) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfffffffffffffffb) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000080)={0x17e}) ftruncate(r4, 0x0) sendmsg$IPSET_CMD_PROTOCOL(r1, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)=ANY=[@ANYBLOB="2c00000001060300000000000000000005000004050001000700200005000100070000000500010007000000"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x34008040) 12:58:19 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REQ_SET_REG(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000", @ANYRES16, @ANYBLOB="ff05002179043f5918d8d6000000000000ffff"], 0x1c}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'wlan0\x00'}) syz_io_uring_complete(0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000280)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0x8}, @void}}}, 0x24}}, 0x0) 12:58:19 executing program 0: r0 = memfd_create(&(0x7f0000000180)='vfat\x00', 0x0) lseek(r0, 0x1, 0x1) 12:58:19 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) fallocate(r0, 0x0, 0x0, 0x8531) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) preadv2(r1, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/75, 0x4b}], 0x1, 0x0, 0x0, 0x8) 12:58:19 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x17, &(0x7f0000000040)=0x20000, 0x4) 12:58:19 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) readv(r3, &(0x7f0000000380)=[{&(0x7f0000000200)=""/17, 0x11}, {&(0x7f0000000100)=""/209, 0xd1}, {&(0x7f0000000200)}, {0x0}, {&(0x7f0000000400)=""/59, 0x3b}], 0x5) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfffffffffffffffb) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000080)={0x17e}) ftruncate(r4, 0x0) sendmsg$IPSET_CMD_PROTOCOL(r1, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)=ANY=[@ANYBLOB="2c00000001060300000000000000000005000004050001000700200005000100070000000500010007000000"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x34008040) 12:58:19 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) bind$unix(r0, &(0x7f00000000c0)=@abs={0x1}, 0x6e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) bind$unix(r1, &(0x7f00000000c0)=@abs={0x1}, 0x6e) 12:58:19 executing program 6: perf_event_open(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xffffffff81000000, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:58:19 executing program 6: perf_event_open(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xffffffff81000000, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:58:19 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x17, &(0x7f0000000040)=0x20000, 0x4) 12:58:19 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) bind$unix(r0, &(0x7f00000000c0)=@abs={0x1}, 0x6e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) bind$unix(r1, &(0x7f00000000c0)=@abs={0x1}, 0x6e) [ 144.812689] syz-executor.7 (4250) used greatest stack depth: 24472 bytes left 12:58:19 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) fallocate(r0, 0x0, 0x0, 0x8531) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) preadv2(r1, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/75, 0x4b}], 0x1, 0x0, 0x0, 0x8) 12:58:19 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) accept$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00000001c0)=ANY=[], 0x8) setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f0000000380)=@routing, 0x8) 12:58:19 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REQ_SET_REG(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000", @ANYRES16, @ANYBLOB="ff05002179043f5918d8d6000000000000ffff"], 0x1c}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'wlan0\x00'}) syz_io_uring_complete(0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000280)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0x8}, @void}}}, 0x24}}, 0x0) 12:58:19 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REQ_SET_REG(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000", @ANYRES16, @ANYBLOB="ff05002179043f5918d8d6000000000000ffff"], 0x1c}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'wlan0\x00'}) syz_io_uring_complete(0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000280)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0x8}, @void}}}, 0x24}}, 0x0) 12:58:19 executing program 6: perf_event_open(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xffffffff81000000, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:58:19 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) readv(r3, &(0x7f0000000380)=[{&(0x7f0000000200)=""/17, 0x11}, {&(0x7f0000000100)=""/209, 0xd1}, {&(0x7f0000000200)}, {0x0}, {&(0x7f0000000400)=""/59, 0x3b}], 0x5) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfffffffffffffffb) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000080)={0x17e}) ftruncate(r4, 0x0) sendmsg$IPSET_CMD_PROTOCOL(r1, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)=ANY=[@ANYBLOB="2c00000001060300000000000000000005000004050001000700200005000100070000000500010007000000"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x34008040) 12:58:19 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) accept$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00000001c0)=ANY=[], 0x8) setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f0000000380)=@routing, 0x8) 12:58:19 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REQ_SET_REG(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000", @ANYRES16, @ANYBLOB="ff05002179043f5918d8d6000000000000ffff"], 0x1c}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'wlan0\x00'}) syz_io_uring_complete(0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000280)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0x8}, @void}}}, 0x24}}, 0x0) 12:58:19 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) bind$unix(r0, &(0x7f00000000c0)=@abs={0x1}, 0x6e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) bind$unix(r1, &(0x7f00000000c0)=@abs={0x1}, 0x6e) 12:58:19 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REQ_SET_REG(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000", @ANYRES16, @ANYBLOB="ff05002179043f5918d8d6000000000000ffff"], 0x1c}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'wlan0\x00'}) syz_io_uring_complete(0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000280)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0x8}, @void}}}, 0x24}}, 0x0) 12:58:19 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8917, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8918, &(0x7f0000000000)={'lo\x00'}) 12:58:19 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) accept$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00000001c0)=ANY=[], 0x8) setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f0000000380)=@routing, 0x8) 12:58:19 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) bind$unix(r0, &(0x7f00000000c0)=@abs={0x1}, 0x6e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) bind$unix(r1, &(0x7f00000000c0)=@abs={0x1}, 0x6e) 12:58:19 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8917, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8918, &(0x7f0000000000)={'lo\x00'}) 12:58:19 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8917, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8918, &(0x7f0000000000)={'lo\x00'}) 12:58:20 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) accept$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00000001c0)=ANY=[], 0x8) setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f0000000380)=@routing, 0x8) [ 145.154068] syz-executor.2 (4284) used greatest stack depth: 24304 bytes left 12:58:20 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='io\x00') pread64(r0, &(0x7f00000000c0)=""/98, 0x62, 0x0) 12:58:20 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8917, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8918, &(0x7f0000000000)={'lo\x00'}) 12:58:20 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REQ_SET_REG(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000", @ANYRES16, @ANYBLOB="ff05002179043f5918d8d6000000000000ffff"], 0x1c}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'wlan0\x00'}) syz_io_uring_complete(0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000280)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0x8}, @void}}}, 0x24}}, 0x0) 12:58:20 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8917, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8918, &(0x7f0000000000)={'lo\x00'}) 12:58:20 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REQ_SET_REG(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000", @ANYRES16, @ANYBLOB="ff05002179043f5918d8d6000000000000ffff"], 0x1c}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'wlan0\x00'}) syz_io_uring_complete(0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000280)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0x8}, @void}}}, 0x24}}, 0x0) 12:58:20 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) close(r0) socket$packet(0x11, 0x3, 0x300) bind(r0, &(0x7f0000000080)=@xdp, 0x80) 12:58:20 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REQ_SET_REG(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000", @ANYRES16, @ANYBLOB="ff05002179043f5918d8d6000000000000ffff"], 0x1c}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'wlan0\x00'}) syz_io_uring_complete(0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000280)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0x8}, @void}}}, 0x24}}, 0x0) 12:58:20 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8917, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8918, &(0x7f0000000000)={'lo\x00'}) 12:58:20 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='io\x00') pread64(r0, &(0x7f00000000c0)=""/98, 0x62, 0x0) 12:58:20 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) close(r0) socket$packet(0x11, 0x3, 0x300) bind(r0, &(0x7f0000000080)=@xdp, 0x80) 12:58:20 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8917, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8918, &(0x7f0000000000)={'lo\x00'}) 12:58:20 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='io\x00') pread64(r0, &(0x7f00000000c0)=""/98, 0x62, 0x0) 12:58:20 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REQ_SET_REG(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000", @ANYRES16, @ANYBLOB="ff05002179043f5918d8d6000000000000ffff"], 0x1c}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'wlan0\x00'}) syz_io_uring_complete(0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000280)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0x8}, @void}}}, 0x24}}, 0x0) 12:58:20 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REQ_SET_REG(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000", @ANYRES16, @ANYBLOB="ff05002179043f5918d8d6000000000000ffff"], 0x1c}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'wlan0\x00'}) syz_io_uring_complete(0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000280)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0x8}, @void}}}, 0x24}}, 0x0) 12:58:20 executing program 5: syz_open_dev$char_usb(0xc, 0xb4, 0x0) 12:58:20 executing program 6: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f000000148 VM DIAGNOSIS: 12:58:12 Registers: info registers vcpu 0 RAX=0000000000000020 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff822b24f1 RDI=ffffffff87641b60 RBP=ffffffff87641b20 RSP=ffff888041f0f698 R8 =0000000000000001 R9 =000000000000000a R10=0000000000000020 R11=0000000000000001 R12=0000000000000020 R13=ffffffff87641b20 R14=0000000000000010 R15=ffffffff822b24e0 RIP=ffffffff822b2549 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fbad7adc700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f87e8d9e6f4 CR3=0000000009980000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 00007fbada64d7c0 00007fbada64d7c8 YMM02=0000000000000000 0000000000000000 00007fbada64d7e0 00007fbada64d7c0 YMM03=0000000000000000 0000000000000000 00007fbada64d7c8 00007fbada64d7c0 YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffff00000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=ffffffff85b02e90 RBX=1ffff1100797eebf RCX=ffffffff812a3fcf RDX=0000000000000000 RSI=0000000000000008 RDI=ffffffff85b02e90 RBP=0000000000000001 RSP=ffff88803cbf75d0 R8 =0000000000000000 R9 =0000000000000000 R10=ffffed1001a67c48 R11=0000000000000001 R12=0000000000000000 R13=0000000000000000 R14=ffff88800d33e1c8 R15=0000000000000000 RIP=ffffffff81787db3 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f5d37e961f0 CR3=000000003754a000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 756e696c2d34365f 3638782f62696c2f YMM01=0000000000000000 0000000000000000 2e6f747079726362 696c2f756e672d78 YMM02=0000000000000000 0000000000000000 00312e312e6f732e 6f74707972636269 YMM03=0000000000000000 0000000000000000 6c2f756e672d7875 6e696c2d34365f36 YMM04=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000