Warning: Permanently added '[localhost]:29743' (ECDSA) to the list of known hosts. 2022/09/14 13:11:57 fuzzer started 2022/09/14 13:11:57 dialing manager at localhost:33849 syzkaller login: [ 47.091260] cgroup: Unknown subsys name 'net' [ 47.169684] cgroup: Unknown subsys name 'rlimit' 2022/09/14 13:12:14 syscalls: 2215 2022/09/14 13:12:14 code coverage: enabled 2022/09/14 13:12:14 comparison tracing: enabled 2022/09/14 13:12:14 extra coverage: enabled 2022/09/14 13:12:14 setuid sandbox: enabled 2022/09/14 13:12:14 namespace sandbox: enabled 2022/09/14 13:12:14 Android sandbox: enabled 2022/09/14 13:12:14 fault injection: enabled 2022/09/14 13:12:14 leak checking: enabled 2022/09/14 13:12:14 net packet injection: enabled 2022/09/14 13:12:14 net device setup: enabled 2022/09/14 13:12:14 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/09/14 13:12:14 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/09/14 13:12:14 USB emulation: enabled 2022/09/14 13:12:14 hci packet injection: enabled 2022/09/14 13:12:14 wifi device emulation: failed to parse kernel version (6.0.0-rc5-next-20220914) 2022/09/14 13:12:14 802.15.4 emulation: enabled 2022/09/14 13:12:14 fetching corpus: 0, signal 0/2000 (executing program) 2022/09/14 13:12:14 fetching corpus: 25, signal 21792/25450 (executing program) 2022/09/14 13:12:14 fetching corpus: 75, signal 43670/48626 (executing program) 2022/09/14 13:12:14 fetching corpus: 125, signal 55233/61444 (executing program) 2022/09/14 13:12:15 fetching corpus: 175, signal 65228/72556 (executing program) 2022/09/14 13:12:15 fetching corpus: 225, signal 72255/80678 (executing program) 2022/09/14 13:12:15 fetching corpus: 275, signal 79643/89093 (executing program) 2022/09/14 13:12:15 fetching corpus: 325, signal 82932/93483 (executing program) 2022/09/14 13:12:15 fetching corpus: 375, signal 87069/98629 (executing program) 2022/09/14 13:12:15 fetching corpus: 425, signal 89960/102535 (executing program) 2022/09/14 13:12:15 fetching corpus: 475, signal 93459/106991 (executing program) 2022/09/14 13:12:16 fetching corpus: 524, signal 98206/112500 (executing program) 2022/09/14 13:12:16 fetching corpus: 574, signal 101709/116786 (executing program) 2022/09/14 13:12:16 fetching corpus: 624, signal 103890/119823 (executing program) 2022/09/14 13:12:16 fetching corpus: 674, signal 105927/122735 (executing program) 2022/09/14 13:12:16 fetching corpus: 724, signal 109394/126895 (executing program) 2022/09/14 13:12:16 fetching corpus: 774, signal 111475/129751 (executing program) 2022/09/14 13:12:16 fetching corpus: 824, signal 113137/132200 (executing program) 2022/09/14 13:12:16 fetching corpus: 873, signal 115890/135573 (executing program) 2022/09/14 13:12:17 fetching corpus: 923, signal 119287/139321 (executing program) 2022/09/14 13:12:17 fetching corpus: 973, signal 121577/142173 (executing program) 2022/09/14 13:12:17 fetching corpus: 1023, signal 123167/144429 (executing program) 2022/09/14 13:12:17 fetching corpus: 1072, signal 124549/146517 (executing program) 2022/09/14 13:12:17 fetching corpus: 1122, signal 126537/149082 (executing program) 2022/09/14 13:12:17 fetching corpus: 1172, signal 129297/152143 (executing program) 2022/09/14 13:12:17 fetching corpus: 1222, signal 132220/155330 (executing program) 2022/09/14 13:12:18 fetching corpus: 1272, signal 134599/157989 (executing program) 2022/09/14 13:12:18 fetching corpus: 1322, signal 136298/160149 (executing program) 2022/09/14 13:12:18 fetching corpus: 1372, signal 138496/162554 (executing program) 2022/09/14 13:12:18 fetching corpus: 1421, signal 140576/164861 (executing program) 2022/09/14 13:12:18 fetching corpus: 1471, signal 142217/166871 (executing program) 2022/09/14 13:12:18 fetching corpus: 1521, signal 143767/168776 (executing program) 2022/09/14 13:12:18 fetching corpus: 1571, signal 145563/170768 (executing program) 2022/09/14 13:12:19 fetching corpus: 1621, signal 147029/172540 (executing program) 2022/09/14 13:12:19 fetching corpus: 1671, signal 148487/174326 (executing program) 2022/09/14 13:12:19 fetching corpus: 1721, signal 150906/176674 (executing program) 2022/09/14 13:12:19 fetching corpus: 1771, signal 152339/178389 (executing program) 2022/09/14 13:12:19 fetching corpus: 1821, signal 154141/180376 (executing program) 2022/09/14 13:12:19 fetching corpus: 1871, signal 156156/182394 (executing program) 2022/09/14 13:12:19 fetching corpus: 1921, signal 157860/184302 (executing program) 2022/09/14 13:12:19 fetching corpus: 1971, signal 158808/185584 (executing program) 2022/09/14 13:12:20 fetching corpus: 2021, signal 160697/187435 (executing program) 2022/09/14 13:12:20 fetching corpus: 2071, signal 161414/188553 (executing program) 2022/09/14 13:12:20 fetching corpus: 2121, signal 162994/190144 (executing program) 2022/09/14 13:12:20 fetching corpus: 2171, signal 164404/191605 (executing program) 2022/09/14 13:12:20 fetching corpus: 2221, signal 165195/192689 (executing program) 2022/09/14 13:12:20 fetching corpus: 2271, signal 166191/193880 (executing program) 2022/09/14 13:12:20 fetching corpus: 2321, signal 167696/195498 (executing program) 2022/09/14 13:12:21 fetching corpus: 2371, signal 168585/196604 (executing program) 2022/09/14 13:12:21 fetching corpus: 2421, signal 170114/198047 (executing program) 2022/09/14 13:12:21 fetching corpus: 2471, signal 171723/199546 (executing program) 2022/09/14 13:12:21 fetching corpus: 2521, signal 173085/200815 (executing program) 2022/09/14 13:12:21 fetching corpus: 2571, signal 174398/202023 (executing program) 2022/09/14 13:12:21 fetching corpus: 2621, signal 176320/203518 (executing program) 2022/09/14 13:12:21 fetching corpus: 2671, signal 177718/204796 (executing program) 2022/09/14 13:12:22 fetching corpus: 2721, signal 178511/205708 (executing program) 2022/09/14 13:12:22 fetching corpus: 2771, signal 179296/206601 (executing program) 2022/09/14 13:12:22 fetching corpus: 2821, signal 180195/207526 (executing program) 2022/09/14 13:12:22 fetching corpus: 2871, signal 181197/208516 (executing program) 2022/09/14 13:12:22 fetching corpus: 2921, signal 182260/209510 (executing program) 2022/09/14 13:12:22 fetching corpus: 2971, signal 183342/210475 (executing program) 2022/09/14 13:12:22 fetching corpus: 3020, signal 184084/211294 (executing program) 2022/09/14 13:12:23 fetching corpus: 3069, signal 184967/212097 (executing program) 2022/09/14 13:12:23 fetching corpus: 3119, signal 186168/212995 (executing program) 2022/09/14 13:12:23 fetching corpus: 3169, signal 187213/213811 (executing program) 2022/09/14 13:12:23 fetching corpus: 3219, signal 187885/214493 (executing program) 2022/09/14 13:12:23 fetching corpus: 3269, signal 189333/215707 (executing program) 2022/09/14 13:12:23 fetching corpus: 3319, signal 190186/216474 (executing program) 2022/09/14 13:12:23 fetching corpus: 3369, signal 190668/217062 (executing program) 2022/09/14 13:12:24 fetching corpus: 3419, signal 192451/218086 (executing program) 2022/09/14 13:12:24 fetching corpus: 3469, signal 193197/218732 (executing program) 2022/09/14 13:12:24 fetching corpus: 3518, signal 193914/219345 (executing program) 2022/09/14 13:12:24 fetching corpus: 3568, signal 195378/220164 (executing program) 2022/09/14 13:12:24 fetching corpus: 3618, signal 196055/220720 (executing program) 2022/09/14 13:12:24 fetching corpus: 3668, signal 196778/221252 (executing program) 2022/09/14 13:12:25 fetching corpus: 3718, signal 197450/221791 (executing program) 2022/09/14 13:12:25 fetching corpus: 3768, signal 198202/222372 (executing program) 2022/09/14 13:12:25 fetching corpus: 3818, signal 199384/223018 (executing program) 2022/09/14 13:12:25 fetching corpus: 3868, signal 200038/223525 (executing program) 2022/09/14 13:12:25 fetching corpus: 3918, signal 200825/224054 (executing program) 2022/09/14 13:12:25 fetching corpus: 3968, signal 202417/224807 (executing program) 2022/09/14 13:12:25 fetching corpus: 4018, signal 203350/225287 (executing program) 2022/09/14 13:12:26 fetching corpus: 4068, signal 204304/225769 (executing program) 2022/09/14 13:12:26 fetching corpus: 4118, signal 205235/226252 (executing program) 2022/09/14 13:12:26 fetching corpus: 4168, signal 205901/226740 (executing program) 2022/09/14 13:12:26 fetching corpus: 4218, signal 206883/227225 (executing program) 2022/09/14 13:12:26 fetching corpus: 4268, signal 207582/227644 (executing program) 2022/09/14 13:12:26 fetching corpus: 4318, signal 208005/227972 (executing program) 2022/09/14 13:12:26 fetching corpus: 4368, signal 208380/228255 (executing program) 2022/09/14 13:12:27 fetching corpus: 4418, signal 208920/228620 (executing program) 2022/09/14 13:12:27 fetching corpus: 4467, signal 209768/229033 (executing program) 2022/09/14 13:12:27 fetching corpus: 4517, signal 210755/229407 (executing program) 2022/09/14 13:12:27 fetching corpus: 4567, signal 211459/229743 (executing program) 2022/09/14 13:12:27 fetching corpus: 4617, signal 212198/230063 (executing program) 2022/09/14 13:12:27 fetching corpus: 4667, signal 212787/230318 (executing program) 2022/09/14 13:12:27 fetching corpus: 4716, signal 213617/230779 (executing program) 2022/09/14 13:12:28 fetching corpus: 4765, signal 214284/231063 (executing program) 2022/09/14 13:12:28 fetching corpus: 4815, signal 214692/231279 (executing program) 2022/09/14 13:12:28 fetching corpus: 4865, signal 215144/231489 (executing program) 2022/09/14 13:12:28 fetching corpus: 4915, signal 215613/231718 (executing program) 2022/09/14 13:12:28 fetching corpus: 4965, signal 216308/231981 (executing program) 2022/09/14 13:12:28 fetching corpus: 5015, signal 216927/232242 (executing program) 2022/09/14 13:12:28 fetching corpus: 5065, signal 217772/232460 (executing program) 2022/09/14 13:12:29 fetching corpus: 5115, signal 218689/232647 (executing program) 2022/09/14 13:12:29 fetching corpus: 5165, signal 219712/232809 (executing program) 2022/09/14 13:12:29 fetching corpus: 5214, signal 220719/232985 (executing program) 2022/09/14 13:12:29 fetching corpus: 5264, signal 221380/233163 (executing program) 2022/09/14 13:12:29 fetching corpus: 5314, signal 222014/233303 (executing program) 2022/09/14 13:12:29 fetching corpus: 5364, signal 222533/233306 (executing program) 2022/09/14 13:12:30 fetching corpus: 5414, signal 223030/233307 (executing program) 2022/09/14 13:12:30 fetching corpus: 5464, signal 223496/233309 (executing program) 2022/09/14 13:12:30 fetching corpus: 5514, signal 224010/233323 (executing program) 2022/09/14 13:12:30 fetching corpus: 5564, signal 224644/233323 (executing program) 2022/09/14 13:12:30 fetching corpus: 5614, signal 225163/233337 (executing program) 2022/09/14 13:12:30 fetching corpus: 5664, signal 225504/233346 (executing program) 2022/09/14 13:12:30 fetching corpus: 5666, signal 225508/233346 (executing program) 2022/09/14 13:12:30 fetching corpus: 5666, signal 225508/233346 (executing program) 2022/09/14 13:12:32 starting 8 fuzzer processes 13:12:32 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:12:32 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r0 = epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000400)={0x30000004}) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 13:12:33 executing program 2: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$sock_ifreq(r0, 0x40086806, 0x0) [ 80.353969] audit: type=1400 audit(1663161153.033:6): avc: denied { execmem } for pid=287 comm="syz-executor.2" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 13:12:33 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) clone3(&(0x7f00000001c0)={0x123363500, &(0x7f0000000180), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) recvmmsg$unix(r1, &(0x7f0000001880)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2, 0x0) 13:12:33 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x2, 0x80, 0x94, 0x84, 0x5, 0x2a, 0x0, 0x9, 0x8013, 0xb, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000005c0), 0x8}, 0x7bc39bb3f88feff6, 0x9, 0x8000, 0x1, 0x9, 0x1, 0x8, 0x0, 0x200, 0x0, 0x4}, 0x0, 0xb, r0, 0xa) read(r1, &(0x7f0000000000), 0xfffffdef) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000180)={0x0, @private=0xa010101, @multicast1}, 0xc) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="90000000eadfd9107efe0600033726abdb53857cb50c", @ANYRES16=0x0, @ANYBLOB="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"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x4040) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000780)={&(0x7f0000000880)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="00022cbd7000ffdbdf251300000000000000255c00a834bb1700"], 0x1c}, 0x1, 0x0, 0x0, 0x44085}, 0x8001) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000001d40), 0x8) 13:12:33 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:12:33 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000000640)=[{&(0x7f00000002c0)="19", 0x1}], 0x1, 0x8000000, 0x0) read(r0, &(0x7f0000000000)=""/78, 0x4e) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) sendfile(r1, r0, &(0x7f0000000080)=0xc902, 0x7) 13:12:33 executing program 7: r0 = socket$inet6(0xa, 0x801, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) [ 81.607658] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 81.610208] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 81.612469] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 81.614495] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 81.615366] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 81.617062] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 81.626842] Bluetooth: hci0: HCI_REQ-0x0c1a [ 81.668511] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 81.670102] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 81.671507] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 81.672193] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 81.674137] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 81.676235] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 81.677643] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 81.678354] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 81.678379] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 81.685117] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 81.686686] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 81.687366] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 81.688317] Bluetooth: hci1: HCI_REQ-0x0c1a [ 81.692844] Bluetooth: hci2: HCI_REQ-0x0c1a [ 81.694649] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 81.695663] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 81.697380] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 81.698607] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 81.700327] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 81.705492] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 81.707904] Bluetooth: hci3: HCI_REQ-0x0c1a [ 81.720250] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 81.721159] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 81.722664] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 81.724480] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 81.725372] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 81.726776] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 81.730019] Bluetooth: hci4: HCI_REQ-0x0c1a [ 81.793668] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 81.796648] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 81.798842] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 81.802596] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 81.806028] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 81.807275] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 81.825257] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 81.832878] Bluetooth: hci6: HCI_REQ-0x0c1a [ 81.833619] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 81.881049] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 81.889372] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 81.903060] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 81.917295] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 81.929874] Bluetooth: hci7: HCI_REQ-0x0c1a [ 83.635373] Bluetooth: hci0: command 0x0409 tx timeout [ 83.698871] Bluetooth: hci1: command 0x0409 tx timeout [ 83.762918] Bluetooth: hci4: command 0x0409 tx timeout [ 83.763497] Bluetooth: hci3: command 0x0409 tx timeout [ 83.764016] Bluetooth: hci2: command 0x0409 tx timeout [ 83.828086] Bluetooth: hci5: Opcode 0x c03 failed: -110 [ 83.891844] Bluetooth: hci6: command 0x0409 tx timeout [ 83.955896] Bluetooth: hci7: command 0x0409 tx timeout [ 85.684301] Bluetooth: hci0: command 0x041b tx timeout [ 85.747910] Bluetooth: hci1: command 0x041b tx timeout [ 85.810956] Bluetooth: hci2: command 0x041b tx timeout [ 85.812766] Bluetooth: hci3: command 0x041b tx timeout [ 85.813407] Bluetooth: hci4: command 0x041b tx timeout [ 85.940010] Bluetooth: hci6: command 0x041b tx timeout [ 86.003843] Bluetooth: hci7: command 0x041b tx timeout [ 86.951464] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 86.956435] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 86.974972] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 86.982002] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 86.983027] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 86.983772] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 86.986824] Bluetooth: hci5: HCI_REQ-0x0c1a [ 87.731851] Bluetooth: hci0: command 0x040f tx timeout [ 87.795839] Bluetooth: hci1: command 0x040f tx timeout [ 87.859918] Bluetooth: hci4: command 0x040f tx timeout [ 87.860459] Bluetooth: hci3: command 0x040f tx timeout [ 87.860953] Bluetooth: hci2: command 0x040f tx timeout [ 87.986907] Bluetooth: hci6: command 0x040f tx timeout [ 88.051917] Bluetooth: hci7: command 0x040f tx timeout [ 89.010868] Bluetooth: hci5: command 0x0409 tx timeout [ 89.778897] Bluetooth: hci0: command 0x0419 tx timeout [ 89.842846] Bluetooth: hci1: command 0x0419 tx timeout [ 89.907913] Bluetooth: hci2: command 0x0419 tx timeout [ 89.908392] Bluetooth: hci3: command 0x0419 tx timeout [ 89.908842] Bluetooth: hci4: command 0x0419 tx timeout [ 90.035837] Bluetooth: hci6: command 0x0419 tx timeout [ 90.099844] Bluetooth: hci7: command 0x0419 tx timeout [ 91.058863] Bluetooth: hci5: command 0x041b tx timeout [ 93.106844] Bluetooth: hci5: command 0x040f tx timeout [ 95.156164] Bluetooth: hci5: command 0x0419 tx timeout [ 133.648300] audit: type=1400 audit(1663161206.328:7): avc: denied { open } for pid=3751 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 133.649905] audit: type=1400 audit(1663161206.328:8): avc: denied { kernel } for pid=3751 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 133.669412] ------------[ cut here ]------------ [ 133.669438] [ 133.669442] ====================================================== [ 133.669447] WARNING: possible circular locking dependency detected [ 133.669451] 6.0.0-rc5-next-20220914 #1 Not tainted [ 133.669460] ------------------------------------------------------ [ 133.669464] syz-executor.0/3753 is trying to acquire lock: [ 133.669471] ffffffff853fa878 ((console_sem).lock){....}-{2:2}, at: down_trylock+0xe/0x70 [ 133.669525] [ 133.669525] but task is already holding lock: [ 133.669529] ffff88800d2fa820 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 133.669563] [ 133.669563] which lock already depends on the new lock. [ 133.669563] [ 133.669567] [ 133.669567] the existing dependency chain (in reverse order) is: [ 133.669571] [ 133.669571] -> #3 (&ctx->lock){....}-{2:2}: [ 133.669589] _raw_spin_lock+0x2a/0x40 [ 133.669610] __perf_event_task_sched_out+0x53b/0x18d0 [ 133.669626] __schedule+0xedd/0x2470 [ 133.669639] schedule+0xda/0x1b0 [ 133.669651] exit_to_user_mode_prepare+0x114/0x1a0 [ 133.669676] syscall_exit_to_user_mode+0x19/0x40 [ 133.669698] do_syscall_64+0x48/0x90 [ 133.669715] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 133.669737] [ 133.669737] -> #2 (&rq->__lock){-.-.}-{2:2}: [ 133.669754] _raw_spin_lock_nested+0x30/0x40 [ 133.669773] raw_spin_rq_lock_nested+0x1e/0x30 [ 133.669793] task_fork_fair+0x63/0x4d0 [ 133.669813] sched_cgroup_fork+0x3d0/0x540 [ 133.669831] copy_process+0x4183/0x6e20 [ 133.669844] kernel_clone+0xe7/0x890 [ 133.669856] user_mode_thread+0xad/0xf0 [ 133.669869] rest_init+0x24/0x250 [ 133.669889] arch_call_rest_init+0xf/0x14 [ 133.669904] start_kernel+0x4c1/0x4e6 [ 133.669917] secondary_startup_64_no_verify+0xe0/0xeb [ 133.669934] [ 133.669934] -> #1 (&p->pi_lock){-.-.}-{2:2}: [ 133.669952] _raw_spin_lock_irqsave+0x39/0x60 [ 133.669971] try_to_wake_up+0xab/0x1920 [ 133.669988] up+0x75/0xb0 [ 133.670002] __up_console_sem+0x6e/0x80 [ 133.670022] console_unlock+0x46a/0x590 [ 133.670042] vprintk_emit+0x1bd/0x560 [ 133.670062] vprintk+0x84/0xa0 [ 133.670082] _printk+0xba/0xf1 [ 133.670104] kauditd_hold_skb.cold+0x3f/0x4e [ 133.670122] kauditd_send_queue+0x233/0x290 [ 133.670140] kauditd_thread+0x5da/0x9a0 [ 133.670158] kthread+0x2ed/0x3a0 [ 133.670175] ret_from_fork+0x22/0x30 [ 133.670191] [ 133.670191] -> #0 ((console_sem).lock){....}-{2:2}: [ 133.670209] __lock_acquire+0x2a02/0x5e70 [ 133.670229] lock_acquire+0x1a2/0x530 [ 133.670249] _raw_spin_lock_irqsave+0x39/0x60 [ 133.670268] down_trylock+0xe/0x70 [ 133.670284] __down_trylock_console_sem+0x3b/0xd0 [ 133.670304] vprintk_emit+0x16b/0x560 [ 133.670325] vprintk+0x84/0xa0 [ 133.670345] _printk+0xba/0xf1 [ 133.670365] report_bug.cold+0x72/0xab [ 133.670381] handle_bug+0x3c/0x70 [ 133.670397] exc_invalid_op+0x14/0x50 [ 133.670414] asm_exc_invalid_op+0x16/0x20 [ 133.670434] group_sched_out.part.0+0x2c7/0x460 [ 133.670448] ctx_sched_out+0x8f1/0xc10 [ 133.670461] __perf_event_task_sched_out+0x6d0/0x18d0 [ 133.670476] __schedule+0xedd/0x2470 [ 133.670489] schedule+0xda/0x1b0 [ 133.670501] exit_to_user_mode_prepare+0x114/0x1a0 [ 133.670525] syscall_exit_to_user_mode+0x19/0x40 [ 133.670546] do_syscall_64+0x48/0x90 [ 133.670563] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 133.670584] [ 133.670584] other info that might help us debug this: [ 133.670584] [ 133.670588] Chain exists of: [ 133.670588] (console_sem).lock --> &rq->__lock --> &ctx->lock [ 133.670588] [ 133.670607] Possible unsafe locking scenario: [ 133.670607] [ 133.670610] CPU0 CPU1 [ 133.670613] ---- ---- [ 133.670616] lock(&ctx->lock); [ 133.670623] lock(&rq->__lock); [ 133.670631] lock(&ctx->lock); [ 133.670639] lock((console_sem).lock); [ 133.670646] [ 133.670646] *** DEADLOCK *** [ 133.670646] [ 133.670648] 2 locks held by syz-executor.0/3753: [ 133.670657] #0: ffff88806ce37cd8 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x1cf/0x2470 [ 133.670690] #1: ffff88800d2fa820 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 133.670726] [ 133.670726] stack backtrace: [ 133.670730] CPU: 0 PID: 3753 Comm: syz-executor.0 Not tainted 6.0.0-rc5-next-20220914 #1 [ 133.670746] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 133.670756] Call Trace: [ 133.670760] [ 133.670765] dump_stack_lvl+0x8b/0xb3 [ 133.670784] check_noncircular+0x263/0x2e0 [ 133.670805] ? format_decode+0x26c/0xb50 [ 133.670824] ? print_circular_bug+0x450/0x450 [ 133.670846] ? enable_ptr_key_workfn+0x20/0x20 [ 133.670865] ? perf_trace_lock+0x308/0x560 [ 133.670883] ? format_decode+0x26c/0xb50 [ 133.670904] ? alloc_chain_hlocks+0x1ec/0x5a0 [ 133.670927] __lock_acquire+0x2a02/0x5e70 [ 133.670957] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 133.670988] lock_acquire+0x1a2/0x530 [ 133.671009] ? down_trylock+0xe/0x70 [ 133.671028] ? rcu_read_unlock+0x40/0x40 [ 133.671057] ? vprintk+0x84/0xa0 [ 133.671080] _raw_spin_lock_irqsave+0x39/0x60 [ 133.671100] ? down_trylock+0xe/0x70 [ 133.671118] down_trylock+0xe/0x70 [ 133.671135] ? vprintk+0x84/0xa0 [ 133.671156] __down_trylock_console_sem+0x3b/0xd0 [ 133.671179] vprintk_emit+0x16b/0x560 [ 133.671204] vprintk+0x84/0xa0 [ 133.671226] _printk+0xba/0xf1 [ 133.671249] ? record_print_text.cold+0x16/0x16 [ 133.671280] ? report_bug.cold+0x66/0xab [ 133.671300] ? group_sched_out.part.0+0x2c7/0x460 [ 133.671316] report_bug.cold+0x72/0xab [ 133.671337] handle_bug+0x3c/0x70 [ 133.671353] exc_invalid_op+0x14/0x50 [ 133.671370] asm_exc_invalid_op+0x16/0x20 [ 133.671390] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 133.671405] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 133.671419] RSP: 0018:ffff88800dd6fc48 EFLAGS: 00010006 [ 133.671430] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 133.671439] RDX: ffff8880100eb580 RSI: ffffffff81566027 RDI: 0000000000000005 [ 133.671448] RBP: ffff888008660000 R08: 0000000000000005 R09: 0000000000000001 [ 133.671456] R10: 0000000000000000 R11: ffffffff865ac01b R12: ffff88800d2fa800 [ 133.671465] R13: ffff88806ce3d100 R14: ffffffff8547c660 R15: 0000000000000002 [ 133.671479] ? group_sched_out.part.0+0x2c7/0x460 [ 133.671495] ? group_sched_out.part.0+0x2c7/0x460 [ 133.671511] ctx_sched_out+0x8f1/0xc10 [ 133.671527] __perf_event_task_sched_out+0x6d0/0x18d0 [ 133.671546] ? lock_is_held_type+0xd7/0x130 [ 133.671568] ? __perf_cgroup_move+0x160/0x160 [ 133.671582] ? set_next_entity+0x304/0x550 [ 133.671603] ? update_curr+0x267/0x740 [ 133.671625] ? lock_is_held_type+0xd7/0x130 [ 133.671647] __schedule+0xedd/0x2470 [ 133.671664] ? io_schedule_timeout+0x150/0x150 [ 133.671680] ? __x64_sys_futex_time32+0x480/0x480 [ 133.671697] schedule+0xda/0x1b0 [ 133.671710] exit_to_user_mode_prepare+0x114/0x1a0 [ 133.671734] syscall_exit_to_user_mode+0x19/0x40 [ 133.671755] do_syscall_64+0x48/0x90 [ 133.671772] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 133.671793] RIP: 0033:0x7f41f8f10b19 [ 133.671803] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 133.671815] RSP: 002b:00007f41f6486218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 133.671828] RAX: 0000000000000001 RBX: 00007f41f9023f68 RCX: 00007f41f8f10b19 [ 133.671837] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f41f9023f6c [ 133.671845] RBP: 00007f41f9023f60 R08: 000000000000000e R09: 0000000000000000 [ 133.671854] R10: 0000000000000003 R11: 0000000000000246 R12: 00007f41f9023f6c [ 133.671862] R13: 00007fff351ef6cf R14: 00007f41f6486300 R15: 0000000000022000 [ 133.671880] [ 133.744273] WARNING: CPU: 0 PID: 3753 at kernel/events/core.c:2309 group_sched_out.part.0+0x2c7/0x460 [ 133.745092] Modules linked in: [ 133.745367] CPU: 0 PID: 3753 Comm: syz-executor.0 Not tainted 6.0.0-rc5-next-20220914 #1 [ 133.746142] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 133.747233] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 133.747763] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 133.749341] RSP: 0018:ffff88800dd6fc48 EFLAGS: 00010006 [ 133.749867] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 133.750564] RDX: ffff8880100eb580 RSI: ffffffff81566027 RDI: 0000000000000005 [ 133.751261] RBP: ffff888008660000 R08: 0000000000000005 R09: 0000000000000001 [ 133.751958] R10: 0000000000000000 R11: ffffffff865ac01b R12: ffff88800d2fa800 [ 133.752656] R13: ffff88806ce3d100 R14: ffffffff8547c660 R15: 0000000000000002 [ 133.753361] FS: 00007f41f6486700(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 133.754156] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 133.754732] CR2: 00007fa0b1341028 CR3: 000000000a1ec000 CR4: 0000000000350ef0 [ 133.755423] Call Trace: [ 133.755680] [ 133.755914] ctx_sched_out+0x8f1/0xc10 [ 133.756310] __perf_event_task_sched_out+0x6d0/0x18d0 [ 133.756823] ? lock_is_held_type+0xd7/0x130 [ 133.757258] ? __perf_cgroup_move+0x160/0x160 [ 133.757729] ? set_next_entity+0x304/0x550 [ 133.758164] ? update_curr+0x267/0x740 [ 133.758582] ? lock_is_held_type+0xd7/0x130 [ 133.759023] __schedule+0xedd/0x2470 [ 133.759408] ? io_schedule_timeout+0x150/0x150 [ 133.759871] ? __x64_sys_futex_time32+0x480/0x480 [ 133.760366] schedule+0xda/0x1b0 [ 133.760714] exit_to_user_mode_prepare+0x114/0x1a0 [ 133.761216] syscall_exit_to_user_mode+0x19/0x40 [ 133.761724] do_syscall_64+0x48/0x90 [ 133.762112] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 133.762640] RIP: 0033:0x7f41f8f10b19 [ 133.763014] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 133.764769] RSP: 002b:00007f41f6486218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 133.765523] RAX: 0000000000000001 RBX: 00007f41f9023f68 RCX: 00007f41f8f10b19 [ 133.766117] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f41f9023f6c [ 133.766690] RBP: 00007f41f9023f60 R08: 000000000000000e R09: 0000000000000000 [ 133.767277] R10: 0000000000000003 R11: 0000000000000246 R12: 00007f41f9023f6c [ 133.767870] R13: 00007fff351ef6cf R14: 00007f41f6486300 R15: 0000000000022000 [ 133.768470] [ 133.768677] irq event stamp: 590 [ 133.768959] hardirqs last enabled at (589): [] exit_to_user_mode_prepare+0x109/0x1a0 [ 133.769744] hardirqs last disabled at (590): [] __schedule+0x1225/0x2470 [ 133.770405] softirqs last enabled at (394): [] __irq_exit_rcu+0x11b/0x180 [ 133.771098] softirqs last disabled at (389): [] __irq_exit_rcu+0x11b/0x180 [ 133.771804] ---[ end trace 0000000000000000 ]--- 13:13:29 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x2, 0x80, 0x94, 0x84, 0x5, 0x2a, 0x0, 0x9, 0x8013, 0xb, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000005c0), 0x8}, 0x7bc39bb3f88feff6, 0x9, 0x8000, 0x1, 0x9, 0x1, 0x8, 0x0, 0x200, 0x0, 0x4}, 0x0, 0xb, r0, 0xa) read(r1, &(0x7f0000000000), 0xfffffdef) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000180)={0x0, @private=0xa010101, @multicast1}, 0xc) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="90000000eadfd9107efe0600033726abdb53857cb50c", @ANYRES16=0x0, @ANYBLOB="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"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x4040) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000780)={&(0x7f0000000880)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="00022cbd7000ffdbdf251300000000000000255c00a834bb1700"], 0x1c}, 0x1, 0x0, 0x0, 0x44085}, 0x8001) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000001d40), 0x8) 13:13:29 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r0 = epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000400)={0x30000004}) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 13:13:29 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) clone3(&(0x7f00000001c0)={0x123363500, &(0x7f0000000180), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) recvmmsg$unix(r1, &(0x7f0000001880)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2, 0x0) 13:13:29 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r0 = epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000400)={0x30000004}) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 13:13:29 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000c00), r0) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x204000, 0x1) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000100)={'syztnl2\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x2f, 0x3e, 0x1, 0x1, 0x20, @empty, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7, 0x10, 0x1000, 0x9}}) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x44, 0x0, 0x400, 0x70bd29, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x1c}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x4}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x44}, 0x1, 0x0, 0x0, 0x40860}, 0x1) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000001340), 0x8, 0x0) dup2(r3, r0) 13:13:29 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x2, 0x80, 0x94, 0x84, 0x5, 0x2a, 0x0, 0x9, 0x8013, 0xb, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000005c0), 0x8}, 0x7bc39bb3f88feff6, 0x9, 0x8000, 0x1, 0x9, 0x1, 0x8, 0x0, 0x200, 0x0, 0x4}, 0x0, 0xb, r0, 0xa) read(r1, &(0x7f0000000000), 0xfffffdef) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000180)={0x0, @private=0xa010101, @multicast1}, 0xc) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="90000000eadfd9107efe0600033726abdb53857cb50c", @ANYRES16=0x0, @ANYBLOB="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"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x4040) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000780)={&(0x7f0000000880)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="00022cbd7000ffdbdf251300000000000000255c00a834bb1700"], 0x1c}, 0x1, 0x0, 0x0, 0x44085}, 0x8001) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000001d40), 0x8) 13:13:29 executing program 7: geteuid() 13:13:29 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x2, 0x80, 0x94, 0x84, 0x5, 0x2a, 0x0, 0x9, 0x8013, 0xb, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000005c0), 0x8}, 0x7bc39bb3f88feff6, 0x9, 0x8000, 0x1, 0x9, 0x1, 0x8, 0x0, 0x200, 0x0, 0x4}, 0x0, 0xb, r0, 0xa) read(r1, &(0x7f0000000000), 0xfffffdef) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000180)={0x0, @private=0xa010101, @multicast1}, 0xc) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="90000000eadfd9107efe0600033726abdb53857cb50c", @ANYRES16=0x0, @ANYBLOB="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"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x4040) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000780)={&(0x7f0000000880)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="00022cbd7000ffdbdf251300000000000000255c00a834bb1700"], 0x1c}, 0x1, 0x0, 0x0, 0x44085}, 0x8001) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000001d40), 0x8) 13:13:29 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r0 = epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000400)={0x30000004}) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 13:13:29 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r0 = epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000400)={0x30000004}) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 13:13:29 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x2, 0x80, 0x94, 0x84, 0x5, 0x2a, 0x0, 0x9, 0x8013, 0xb, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000005c0), 0x8}, 0x7bc39bb3f88feff6, 0x9, 0x8000, 0x1, 0x9, 0x1, 0x8, 0x0, 0x200, 0x0, 0x4}, 0x0, 0xb, r0, 0xa) read(r1, &(0x7f0000000000), 0xfffffdef) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000180)={0x0, @private=0xa010101, @multicast1}, 0xc) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="90000000eadfd9107efe0600033726abdb53857cb50c", @ANYRES16=0x0, @ANYBLOB="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"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x4040) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000780)={&(0x7f0000000880)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="00022cbd7000ffdbdf251300000000000000255c00a834bb1700"], 0x1c}, 0x1, 0x0, 0x0, 0x44085}, 0x8001) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000001d40), 0x8) 13:13:29 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x2, 0x80, 0x94, 0x84, 0x5, 0x2a, 0x0, 0x9, 0x8013, 0xb, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000005c0), 0x8}, 0x7bc39bb3f88feff6, 0x9, 0x8000, 0x1, 0x9, 0x1, 0x8, 0x0, 0x200, 0x0, 0x4}, 0x0, 0xb, r0, 0xa) read(r1, &(0x7f0000000000), 0xfffffdef) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000180)={0x0, @private=0xa010101, @multicast1}, 0xc) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="90000000eadfd9107efe0600033726abdb53857cb50c", @ANYRES16=0x0, @ANYBLOB="000427bdabc5ff0000005c000180060004004e23000008002f82950e12d57ad088af20125890dfb9080000020000060004004e230000060002003c00000014000300ff0200000000000000000000000000010c000700200000000100000008000b007369700008000b0073697000060004004e23000008000400e90a0000080006000200000008000400000000000800040000210000355c9656f35fdeb7bb961620a0dae802be9f8b74623f42c9bd892fae0aca9f4cee9ce3e2f090f7dcdede6da696d02d3c99137bf2594599b85fa71274d6254704d7bbfdc328a68b82cd0aef0f9c79e220679f773f1de1675f18b4af2d804e4ca7912750e0ab515aff130f483b9cad80f41ebf4cc9caea11eae445e79c2b60717a98bc5ef854a8052b2b37acfa7277ced458f939ac2ea170d1c1a2e5760428edadf9d905a4b3f09f09881ca89f7f9096d91beffa584b8d2e7cc5102f09d8868d245590f811541c9d52eec7984fd86c"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x4040) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000780)={&(0x7f0000000880)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="00022cbd7000ffdbdf251300000000000000255c00a834bb1700"], 0x1c}, 0x1, 0x0, 0x0, 0x44085}, 0x8001) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000001d40), 0x8) 13:13:29 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x2, 0x80, 0x94, 0x84, 0x5, 0x2a, 0x0, 0x9, 0x8013, 0xb, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000005c0), 0x8}, 0x7bc39bb3f88feff6, 0x9, 0x8000, 0x1, 0x9, 0x1, 0x8, 0x0, 0x200, 0x0, 0x4}, 0x0, 0xb, r0, 0xa) read(r1, &(0x7f0000000000), 0xfffffdef) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000180)={0x0, @private=0xa010101, @multicast1}, 0xc) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="90000000eadfd9107efe0600033726abdb53857cb50c", @ANYRES16=0x0, @ANYBLOB="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"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x4040) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000780)={&(0x7f0000000880)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="00022cbd7000ffdbdf251300000000000000255c00a834bb1700"], 0x1c}, 0x1, 0x0, 0x0, 0x44085}, 0x8001) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000001d40), 0x8) 13:13:29 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r0 = epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000400)={0x30000004}) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 13:13:30 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x2, 0x80, 0x94, 0x84, 0x5, 0x2a, 0x0, 0x9, 0x8013, 0xb, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000005c0), 0x8}, 0x7bc39bb3f88feff6, 0x9, 0x8000, 0x1, 0x9, 0x1, 0x8, 0x0, 0x200, 0x0, 0x4}, 0x0, 0xb, r0, 0xa) read(r1, &(0x7f0000000000), 0xfffffdef) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000180)={0x0, @private=0xa010101, @multicast1}, 0xc) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="90000000eadfd9107efe0600033726abdb53857cb50c", @ANYRES16=0x0, @ANYBLOB="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"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x4040) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000780)={&(0x7f0000000880)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="00022cbd7000ffdbdf251300000000000000255c00a834bb1700"], 0x1c}, 0x1, 0x0, 0x0, 0x44085}, 0x8001) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000001d40), 0x8) 13:13:30 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r0 = epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000400)={0x30000004}) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 13:13:30 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x2, 0x80, 0x94, 0x84, 0x5, 0x2a, 0x0, 0x9, 0x8013, 0xb, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000005c0), 0x8}, 0x7bc39bb3f88feff6, 0x9, 0x8000, 0x1, 0x9, 0x1, 0x8, 0x0, 0x200, 0x0, 0x4}, 0x0, 0xb, r0, 0xa) read(r1, &(0x7f0000000000), 0xfffffdef) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000180)={0x0, @private=0xa010101, @multicast1}, 0xc) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="90000000eadfd9107efe0600033726abdb53857cb50c", @ANYRES16=0x0, @ANYBLOB="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"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x4040) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000780)={&(0x7f0000000880)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="00022cbd7000ffdbdf251300000000000000255c00a834bb1700"], 0x1c}, 0x1, 0x0, 0x0, 0x44085}, 0x8001) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000001d40), 0x8) 13:13:30 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x2, 0x80, 0x94, 0x84, 0x5, 0x2a, 0x0, 0x9, 0x8013, 0xb, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000005c0), 0x8}, 0x7bc39bb3f88feff6, 0x9, 0x8000, 0x1, 0x9, 0x1, 0x8, 0x0, 0x200, 0x0, 0x4}, 0x0, 0xb, r0, 0xa) read(r1, &(0x7f0000000000), 0xfffffdef) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000180)={0x0, @private=0xa010101, @multicast1}, 0xc) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="90000000eadfd9107efe0600033726abdb53857cb50c", @ANYRES16=0x0, @ANYBLOB="000427bdabc5ff0000005c000180060004004e23000008002f82950e12d57ad088af20125890dfb9080000020000060004004e230000060002003c00000014000300ff0200000000000000000000000000010c000700200000000100000008000b007369700008000b0073697000060004004e23000008000400e90a0000080006000200000008000400000000000800040000210000355c9656f35fdeb7bb961620a0dae802be9f8b74623f42c9bd892fae0aca9f4cee9ce3e2f090f7dcdede6da696d02d3c99137bf2594599b85fa71274d6254704d7bbfdc328a68b82cd0aef0f9c79e220679f773f1de1675f18b4af2d804e4ca7912750e0ab515aff130f483b9cad80f41ebf4cc9caea11eae445e79c2b60717a98bc5ef854a8052b2b37acfa7277ced458f939ac2ea170d1c1a2e5760428edadf9d905a4b3f09f09881ca89f7f9096d91beffa584b8d2e7cc5102f09d8868d245590f811541c9d52eec7984fd86c"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x4040) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000780)={&(0x7f0000000880)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="00022cbd7000ffdbdf251300000000000000255c00a834bb1700"], 0x1c}, 0x1, 0x0, 0x0, 0x44085}, 0x8001) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000001d40), 0x8) 13:13:30 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x2, 0x80, 0x94, 0x84, 0x5, 0x2a, 0x0, 0x9, 0x8013, 0xb, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000005c0), 0x8}, 0x7bc39bb3f88feff6, 0x9, 0x8000, 0x1, 0x9, 0x1, 0x8, 0x0, 0x200, 0x0, 0x4}, 0x0, 0xb, r0, 0xa) read(r1, &(0x7f0000000000), 0xfffffdef) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000180)={0x0, @private=0xa010101, @multicast1}, 0xc) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="90000000eadfd9107efe0600033726abdb53857cb50c", @ANYRES16=0x0, @ANYBLOB="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"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x4040) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000780)={&(0x7f0000000880)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="00022cbd7000ffdbdf251300000000000000255c00a834bb1700"], 0x1c}, 0x1, 0x0, 0x0, 0x44085}, 0x8001) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000001d40), 0x8) 13:13:30 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) clone3(&(0x7f00000001c0)={0x123363500, &(0x7f0000000180), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) recvmmsg$unix(r1, &(0x7f0000001880)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2, 0x0) 13:13:30 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x2, 0x80, 0x94, 0x84, 0x5, 0x2a, 0x0, 0x9, 0x8013, 0xb, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000005c0), 0x8}, 0x7bc39bb3f88feff6, 0x9, 0x8000, 0x1, 0x9, 0x1, 0x8, 0x0, 0x200, 0x0, 0x4}, 0x0, 0xb, r0, 0xa) read(r1, &(0x7f0000000000), 0xfffffdef) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000180)={0x0, @private=0xa010101, @multicast1}, 0xc) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="90000000eadfd9107efe0600033726abdb53857cb50c", @ANYRES16=0x0, @ANYBLOB="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"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x4040) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000780)={&(0x7f0000000880)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="00022cbd7000ffdbdf251300000000000000255c00a834bb1700"], 0x1c}, 0x1, 0x0, 0x0, 0x44085}, 0x8001) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000001d40), 0x8) 13:13:30 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x2, 0x80, 0x94, 0x84, 0x5, 0x2a, 0x0, 0x9, 0x8013, 0xb, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000005c0), 0x8}, 0x7bc39bb3f88feff6, 0x9, 0x8000, 0x1, 0x9, 0x1, 0x8, 0x0, 0x200, 0x0, 0x4}, 0x0, 0xb, r0, 0xa) read(r1, &(0x7f0000000000), 0xfffffdef) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000180)={0x0, @private=0xa010101, @multicast1}, 0xc) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="90000000eadfd9107efe0600033726abdb53857cb50c", @ANYRES16=0x0, @ANYBLOB="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"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x4040) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000780)={&(0x7f0000000880)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="00022cbd7000ffdbdf251300000000000000255c00a834bb1700"], 0x1c}, 0x1, 0x0, 0x0, 0x44085}, 0x8001) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000001d40), 0x8) [ 137.835805] hrtimer: interrupt took 18615 ns 13:13:31 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x2, 0x80, 0x94, 0x84, 0x5, 0x2a, 0x0, 0x9, 0x8013, 0xb, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000005c0), 0x8}, 0x7bc39bb3f88feff6, 0x9, 0x8000, 0x1, 0x9, 0x1, 0x8, 0x0, 0x200, 0x0, 0x4}, 0x0, 0xb, r0, 0xa) read(r1, &(0x7f0000000000), 0xfffffdef) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000180)={0x0, @private=0xa010101, @multicast1}, 0xc) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="90000000eadfd9107efe0600033726abdb53857cb50c", @ANYRES16=0x0, @ANYBLOB="000427bdabc5ff0000005c000180060004004e23000008002f82950e12d57ad088af20125890dfb9080000020000060004004e230000060002003c00000014000300ff0200000000000000000000000000010c000700200000000100000008000b007369700008000b0073697000060004004e23000008000400e90a0000080006000200000008000400000000000800040000210000355c9656f35fdeb7bb961620a0dae802be9f8b74623f42c9bd892fae0aca9f4cee9ce3e2f090f7dcdede6da696d02d3c99137bf2594599b85fa71274d6254704d7bbfdc328a68b82cd0aef0f9c79e220679f773f1de1675f18b4af2d804e4ca7912750e0ab515aff130f483b9cad80f41ebf4cc9caea11eae445e79c2b60717a98bc5ef854a8052b2b37acfa7277ced458f939ac2ea170d1c1a2e5760428edadf9d905a4b3f09f09881ca89f7f9096d91beffa584b8d2e7cc5102f09d8868d245590f811541c9d52eec7984fd86c"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x4040) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000780)={&(0x7f0000000880)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="00022cbd7000ffdbdf251300000000000000255c00a834bb1700"], 0x1c}, 0x1, 0x0, 0x0, 0x44085}, 0x8001) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000001d40), 0x8) 13:13:31 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x10, &(0x7f0000000000), 0xc) 13:13:31 executing program 1: syz_io_uring_setup(0x7137, &(0x7f0000000000), &(0x7f0000ff3000/0xd000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0) remap_file_pages(&(0x7f0000ff5000/0x4000)=nil, 0x4000, 0x0, 0x0, 0xff0f0045) 13:13:31 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000001c0)={0x0, 0x0, 0x0, 'queue0\x00'}) [ 138.467552] mmap: syz-executor.1 (4021) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. 13:13:31 executing program 0: r0 = syz_io_uring_setup(0x4f02, &(0x7f00000002c0), &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_TIMEOUT={0xb, 0x5, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x77359400}}, 0x102) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x55a1, &(0x7f0000000040), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000200)) syz_io_uring_submit(r3, r2, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)}, 0x0) io_uring_enter(r0, 0x6c64, 0x0, 0x0, 0x0, 0x0) 13:13:31 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x10, &(0x7f0000000000), 0xc) 13:13:31 executing program 1: setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) bind$802154_dgram(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[]) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000080)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x511882, 0x0) 13:13:31 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x2, 0x80, 0x94, 0x84, 0x5, 0x2a, 0x0, 0x9, 0x8013, 0xb, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000005c0), 0x8}, 0x7bc39bb3f88feff6, 0x9, 0x8000, 0x1, 0x9, 0x1, 0x8, 0x0, 0x200, 0x0, 0x4}, 0x0, 0xb, r0, 0xa) read(r1, &(0x7f0000000000), 0xfffffdef) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000180)={0x0, @private=0xa010101, @multicast1}, 0xc) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="90000000eadfd9107efe0600033726abdb53857cb50c", @ANYRES16=0x0, @ANYBLOB="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"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x4040) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000780)={&(0x7f0000000880)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="00022cbd7000ffdbdf251300000000000000255c00a834bb1700"], 0x1c}, 0x1, 0x0, 0x0, 0x44085}, 0x8001) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000001d40), 0x8) 13:13:31 executing program 0: r0 = syz_io_uring_setup(0x4f02, &(0x7f00000002c0), &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_TIMEOUT={0xb, 0x5, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x77359400}}, 0x102) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x55a1, &(0x7f0000000040), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000200)) syz_io_uring_submit(r3, r2, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)}, 0x0) io_uring_enter(r0, 0x6c64, 0x0, 0x0, 0x0, 0x0) 13:13:31 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x10, &(0x7f0000000000), 0xc) 13:13:31 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x2, 0x80, 0x94, 0x84, 0x5, 0x2a, 0x0, 0x9, 0x8013, 0xb, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000005c0), 0x8}, 0x7bc39bb3f88feff6, 0x9, 0x8000, 0x1, 0x9, 0x1, 0x8, 0x0, 0x200, 0x0, 0x4}, 0x0, 0xb, r0, 0xa) read(r1, &(0x7f0000000000), 0xfffffdef) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000180)={0x0, @private=0xa010101, @multicast1}, 0xc) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="90000000eadfd9107efe0600033726abdb53857cb50c", @ANYRES16=0x0, @ANYBLOB="000427bdabc5ff0000005c000180060004004e23000008002f82950e12d57ad088af20125890dfb9080000020000060004004e230000060002003c00000014000300ff0200000000000000000000000000010c000700200000000100000008000b007369700008000b0073697000060004004e23000008000400e90a0000080006000200000008000400000000000800040000210000355c9656f35fdeb7bb961620a0dae802be9f8b74623f42c9bd892fae0aca9f4cee9ce3e2f090f7dcdede6da696d02d3c99137bf2594599b85fa71274d6254704d7bbfdc328a68b82cd0aef0f9c79e220679f773f1de1675f18b4af2d804e4ca7912750e0ab515aff130f483b9cad80f41ebf4cc9caea11eae445e79c2b60717a98bc5ef854a8052b2b37acfa7277ced458f939ac2ea170d1c1a2e5760428edadf9d905a4b3f09f09881ca89f7f9096d91beffa584b8d2e7cc5102f09d8868d245590f811541c9d52eec7984fd86c"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x4040) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000780)={&(0x7f0000000880)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="00022cbd7000ffdbdf251300000000000000255c00a834bb1700"], 0x1c}, 0x1, 0x0, 0x0, 0x44085}, 0x8001) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000001d40), 0x8) 13:13:31 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x2, 0x80, 0x94, 0x84, 0x5, 0x2a, 0x0, 0x9, 0x8013, 0xb, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000005c0), 0x8}, 0x7bc39bb3f88feff6, 0x9, 0x8000, 0x1, 0x9, 0x1, 0x8, 0x0, 0x200, 0x0, 0x4}, 0x0, 0xb, r0, 0xa) read(r1, &(0x7f0000000000), 0xfffffdef) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000180)={0x0, @private=0xa010101, @multicast1}, 0xc) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="90000000eadfd9107efe0600033726abdb53857cb50c", @ANYRES16=0x0, @ANYBLOB="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"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x4040) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000780)={&(0x7f0000000880)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="00022cbd7000ffdbdf251300000000000000255c00a834bb1700"], 0x1c}, 0x1, 0x0, 0x0, 0x44085}, 0x8001) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000001d40), 0x8) 13:13:31 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x2, 0x80, 0x94, 0x84, 0x5, 0x2a, 0x0, 0x9, 0x8013, 0xb, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000005c0), 0x8}, 0x7bc39bb3f88feff6, 0x9, 0x8000, 0x1, 0x9, 0x1, 0x8, 0x0, 0x200, 0x0, 0x4}, 0x0, 0xb, r0, 0xa) read(r1, &(0x7f0000000000), 0xfffffdef) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000180)={0x0, @private=0xa010101, @multicast1}, 0xc) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="90000000eadfd9107efe0600033726abdb53857cb50c", @ANYRES16=0x0, @ANYBLOB="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"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x4040) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000780)={&(0x7f0000000880)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="00022cbd7000ffdbdf251300000000000000255c00a834bb1700"], 0x1c}, 0x1, 0x0, 0x0, 0x44085}, 0x8001) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000001d40), 0x8) 13:13:31 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) clone3(&(0x7f00000001c0)={0x123363500, &(0x7f0000000180), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) recvmmsg$unix(r1, &(0x7f0000001880)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2, 0x0) [ 138.844970] tmpfs: Unknown parameter './file0' 13:13:31 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)={0x0, "4690deb62eb693e86e05bcd2d53eaaa588593f676f7d8dafa4f2e856c10a78b3a3bcc8d9f5380628464651a3cee1df7b45c7371a73c3ee1a2dd47a894dfd87d0"}, 0x48, 0xffffffffffffffff) keyctl$get_keyring_id(0x0, r0, 0x0) 13:13:31 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x10, &(0x7f0000000000), 0xc) 13:13:31 executing program 1: setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) bind$802154_dgram(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[]) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000080)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x511882, 0x0) 13:13:31 executing program 0: r0 = syz_io_uring_setup(0x4f02, &(0x7f00000002c0), &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_TIMEOUT={0xb, 0x5, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x77359400}}, 0x102) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x55a1, &(0x7f0000000040), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000200)) syz_io_uring_submit(r3, r2, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)}, 0x0) io_uring_enter(r0, 0x6c64, 0x0, 0x0, 0x0, 0x0) 13:13:31 executing program 3: setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) bind$802154_dgram(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[]) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000080)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x511882, 0x0) 13:13:31 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)={0x0, "4690deb62eb693e86e05bcd2d53eaaa588593f676f7d8dafa4f2e856c10a78b3a3bcc8d9f5380628464651a3cee1df7b45c7371a73c3ee1a2dd47a894dfd87d0"}, 0x48, 0xffffffffffffffff) keyctl$get_keyring_id(0x0, r0, 0x0) 13:13:31 executing program 1: setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) bind$802154_dgram(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[]) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000080)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x511882, 0x0) 13:13:31 executing program 6: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, &(0x7f00000022c0)=[{0x408, 0x1, 0x1, "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"}], 0x408}, 0x0) 13:13:31 executing program 3: setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) bind$802154_dgram(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[]) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000080)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x511882, 0x0) 13:13:31 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc0189436, &(0x7f0000000000)) 13:13:31 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)={0x0, "4690deb62eb693e86e05bcd2d53eaaa588593f676f7d8dafa4f2e856c10a78b3a3bcc8d9f5380628464651a3cee1df7b45c7371a73c3ee1a2dd47a894dfd87d0"}, 0x48, 0xffffffffffffffff) keyctl$get_keyring_id(0x0, r0, 0x0) 13:13:31 executing program 0: r0 = syz_io_uring_setup(0x4f02, &(0x7f00000002c0), &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_TIMEOUT={0xb, 0x5, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x77359400}}, 0x102) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x55a1, &(0x7f0000000040), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000200)) syz_io_uring_submit(r3, r2, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)}, 0x0) io_uring_enter(r0, 0x6c64, 0x0, 0x0, 0x0, 0x0) 13:13:31 executing program 1: setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) bind$802154_dgram(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[]) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000080)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x511882, 0x0) 13:13:31 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000080)={0x1, 0x0, 0x0, 0x3}) 13:13:31 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x2, 0x80, 0x94, 0x84, 0x5, 0x2a, 0x0, 0x9, 0x8013, 0xb, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000005c0), 0x8}, 0x7bc39bb3f88feff6, 0x9, 0x8000, 0x1, 0x9, 0x1, 0x8, 0x0, 0x200, 0x0, 0x4}, 0x0, 0xb, r0, 0xa) read(r1, &(0x7f0000000000), 0xfffffdef) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000180)={0x0, @private=0xa010101, @multicast1}, 0xc) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="90000000eadfd9107efe0600033726abdb53857cb50c", @ANYRES16=0x0, @ANYBLOB="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"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x4040) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000780)={&(0x7f0000000880)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="00022cbd7000ffdbdf251300000000000000255c00a834bb1700"], 0x1c}, 0x1, 0x0, 0x0, 0x44085}, 0x8001) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000001d40), 0x8) 13:13:31 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x48, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) 13:13:31 executing program 3: setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) bind$802154_dgram(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[]) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000080)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x511882, 0x0) 13:13:31 executing program 1: r0 = fsopen(&(0x7f0000000000)='debugfs\x00', 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f00000000c0)="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", 0x1c0}], 0x1) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000080)='}\x00', &(0x7f0000000180)='\xdf\xff\xff\xff\xff\xff\xff\xffKm\x11\xecp\xbf\xdf0\xf1v \x8f\xb0\xb63!\xb5kx\x9cP\xaf\'T\xc0Nk\x05#\xca\xe44\xfb/\xb0\"\x0e\x8c\x9aX=\xaaR\xdcy\a6\xba<\xeeP\x83Y\xf1r\x89\x982\x81\xb2f\x8b\xb8\x04H^\xa8Hg\xa9\xa7\xe23\xac2\xc7\xd4\xb4h:Tg\xbc\x03J\xbd\xc8\xab\\\tqm\xe5\x83\x162l\x813\x13\x8e\xd5R\x1f\x02m\x8b\x13\x19\xa0\x84Y\xc7\xa8\xd1\xf0Vn\xe0\x94\xf4\xbe\x01\xb7\xa4', 0x0) 13:13:31 executing program 5: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x1036e1, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000400)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000c00)}, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="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", 0x90a}], 0x1) 13:13:31 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x48, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) 13:13:31 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc0189436, &(0x7f0000000000)) 13:13:31 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)={0x0, "4690deb62eb693e86e05bcd2d53eaaa588593f676f7d8dafa4f2e856c10a78b3a3bcc8d9f5380628464651a3cee1df7b45c7371a73c3ee1a2dd47a894dfd87d0"}, 0x48, 0xffffffffffffffff) keyctl$get_keyring_id(0x0, r0, 0x0) 13:13:31 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000040), 0x4) 13:13:32 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x541b, 0x0) 13:13:32 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x48, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) 13:13:32 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0xd, 0x0, 0x10) [ 139.390968] audit: type=1400 audit(1663161212.070:9): avc: denied { block_suspend } for pid=4110 comm="syz-executor.1" capability=36 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 13:13:32 executing program 1: ioctl$CDROMREADMODE1(0xffffffffffffffff, 0x530d, &(0x7f0000000800)={0x6, 0x0, 0x20, 0x81, 0x6, 0x89}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000600)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x3, @perf_bp={&(0x7f0000000240), 0x4}, 0x80, 0x3, 0x0, 0x9}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) clone3(&(0x7f0000000440)={0x80000800, &(0x7f0000000000), 0x0, &(0x7f0000000100)=0x0, {0x37}, &(0x7f0000000180)=""/79, 0x4f, &(0x7f0000004c80)=""/102400, &(0x7f0000000380)=[r2, 0x0, r2], 0x3}, 0x58) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000003c0), 0x4c6182, 0x0) r4 = epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r1, &(0x7f0000000200)={0x30000004}) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) epoll_pwait(r4, &(0x7f0000000500)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x8, 0x4, &(0x7f0000000340)={[0x7fffffff]}, 0x8) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r5, &(0x7f0000000140)={r4, 0xffffffffffffffff, 0x3d}) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560c, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f00000005c0)=ANY=[@ANYBLOB="1400001a3e00000071a40a00006b00000000000000"], 0x14}], 0x1}, 0x0) write(0xffffffffffffffff, &(0x7f0000000180)='E', 0x1) kcmp$KCMP_EPOLL_TFD(0x0, r3, 0x7, 0xffffffffffffffff, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x1}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:13:32 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc0189436, &(0x7f0000000000)) 13:13:32 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) waitid$P_PIDFD(0x3, r0, 0x0, 0x2, 0x0) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(0xffffffffffffffff, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) 13:13:32 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000000)) 13:13:32 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0xd, 0x0, 0x10) 13:13:32 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x48, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) 13:13:32 executing program 3: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000080)={{0x2, 0x0, @local}, {0x0, @multicast}, 0x0, {0x2, 0x0, @multicast2}}) 13:13:32 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local, 0x4d4, 0x3c}, 0x2, @in6=@empty, 0x0, 0x1, 0x0, 0xfe}}, 0xe8) sendmmsg$inet6(r0, &(0x7f0000004580)=[{{&(0x7f0000000300)={0xa, 0x4e21, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x0) [ 139.544854] syz-executor.3 uses obsolete (PF_INET,SOCK_PACKET) 13:13:32 executing program 1: ioctl$CDROMREADMODE1(0xffffffffffffffff, 0x530d, &(0x7f0000000800)={0x6, 0x0, 0x20, 0x81, 0x6, 0x89}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000600)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x3, @perf_bp={&(0x7f0000000240), 0x4}, 0x80, 0x3, 0x0, 0x9}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) clone3(&(0x7f0000000440)={0x80000800, &(0x7f0000000000), 0x0, &(0x7f0000000100)=0x0, {0x37}, &(0x7f0000000180)=""/79, 0x4f, &(0x7f0000004c80)=""/102400, &(0x7f0000000380)=[r2, 0x0, r2], 0x3}, 0x58) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000003c0), 0x4c6182, 0x0) r4 = epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r1, &(0x7f0000000200)={0x30000004}) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) epoll_pwait(r4, &(0x7f0000000500)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x8, 0x4, &(0x7f0000000340)={[0x7fffffff]}, 0x8) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r5, &(0x7f0000000140)={r4, 0xffffffffffffffff, 0x3d}) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560c, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f00000005c0)=ANY=[@ANYBLOB="1400001a3e00000071a40a00006b00000000000000"], 0x14}], 0x1}, 0x0) write(0xffffffffffffffff, &(0x7f0000000180)='E', 0x1) kcmp$KCMP_EPOLL_TFD(0x0, r3, 0x7, 0xffffffffffffffff, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x1}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:13:32 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0xd, 0x0, 0x10) 13:13:32 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = clone3(&(0x7f0000000640)={0x127363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) clone3(&(0x7f00000024c0)={0x100000000, &(0x7f0000001fc0), &(0x7f00000022c0)=0x0, &(0x7f0000002300)=0x0, {0x15}, &(0x7f0000002340)=""/131, 0x83, &(0x7f0000002400)=""/51, &(0x7f0000002480)=[0x0], 0x1}, 0x58) ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000000)) syz_open_dev$tty20(0xc, 0x4, 0x0) gettid() r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000340)) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x1c5042, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)="f2", 0x1}], 0x1, 0x8001, 0x0) clone3(&(0x7f0000000480)={0x8220100, &(0x7f0000000240), &(0x7f0000000300), &(0x7f0000000380), {0x38}, &(0x7f00000003c0)=""/127, 0x7f, &(0x7f00000006c0)=""/4096, &(0x7f0000000440)=[r2, r2, r0, 0x0, r2, 0x0, r2, r1], 0x8}, 0x58) 13:13:32 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc0189436, &(0x7f0000000000)) 13:13:32 executing program 3: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000080)={{0x2, 0x0, @local}, {0x0, @multicast}, 0x0, {0x2, 0x0, @multicast2}}) 13:13:32 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x13, r2, 0x0) 13:13:32 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x2) sendmsg$NL80211_CMD_SET_COALESCE(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000340)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 13:13:32 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local, 0x4d4, 0x3c}, 0x2, @in6=@empty, 0x0, 0x1, 0x0, 0xfe}}, 0xe8) sendmmsg$inet6(r0, &(0x7f0000004580)=[{{&(0x7f0000000300)={0xa, 0x4e21, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x0) [ 139.654729] audit: type=1400 audit(1663161212.334:10): avc: denied { read } for pid=4141 comm="syz-executor.5" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 13:13:32 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0xd, 0x0, 0x10) 13:13:32 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x2) sendmsg$NL80211_CMD_SET_COALESCE(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000340)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 13:13:32 executing program 3: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000080)={{0x2, 0x0, @local}, {0x0, @multicast}, 0x0, {0x2, 0x0, @multicast2}}) 13:13:32 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x13, r2, 0x0) 13:13:32 executing program 6: syz_mount_image$tmpfs(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000006c0)='./file0\x00', 0x0, 0x0) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) renameat2(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x1) 13:13:32 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local, 0x4d4, 0x3c}, 0x2, @in6=@empty, 0x0, 0x1, 0x0, 0xfe}}, 0xe8) sendmmsg$inet6(r0, &(0x7f0000004580)=[{{&(0x7f0000000300)={0xa, 0x4e21, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x0) 13:13:32 executing program 4: r0 = fork() tkill(r0, 0x28) 13:13:32 executing program 3: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000080)={{0x2, 0x0, @local}, {0x0, @multicast}, 0x0, {0x2, 0x0, @multicast2}}) 13:13:32 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = clone3(&(0x7f0000000640)={0x127363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) clone3(&(0x7f00000024c0)={0x100000000, &(0x7f0000001fc0), &(0x7f00000022c0)=0x0, &(0x7f0000002300)=0x0, {0x15}, &(0x7f0000002340)=""/131, 0x83, &(0x7f0000002400)=""/51, &(0x7f0000002480)=[0x0], 0x1}, 0x58) ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000000)) syz_open_dev$tty20(0xc, 0x4, 0x0) gettid() r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000340)) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x1c5042, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)="f2", 0x1}], 0x1, 0x8001, 0x0) clone3(&(0x7f0000000480)={0x8220100, &(0x7f0000000240), &(0x7f0000000300), &(0x7f0000000380), {0x38}, &(0x7f00000003c0)=""/127, 0x7f, &(0x7f00000006c0)=""/4096, &(0x7f0000000440)=[r2, r2, r0, 0x0, r2, 0x0, r2, r1], 0x8}, 0x58) 13:13:32 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x2) sendmsg$NL80211_CMD_SET_COALESCE(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000340)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 13:13:32 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x13, r2, 0x0) 13:13:32 executing program 3: syz_emit_ethernet(0x32, &(0x7f0000000040)={@local, @random="7700c24d06a7", @void, {@ipv4={0x800, @dccp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "b50bbe", 0x0, "1b2813"}}}}}}, 0x0) 13:13:32 executing program 6: syz_mount_image$tmpfs(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000006c0)='./file0\x00', 0x0, 0x0) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) renameat2(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x1) 13:13:32 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local, 0x4d4, 0x3c}, 0x2, @in6=@empty, 0x0, 0x1, 0x0, 0xfe}}, 0xe8) sendmmsg$inet6(r0, &(0x7f0000004580)=[{{&(0x7f0000000300)={0xa, 0x4e21, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x0) 13:13:32 executing program 4: r0 = fork() tkill(r0, 0x28) 13:13:32 executing program 1: ioctl$CDROMREADMODE1(0xffffffffffffffff, 0x530d, &(0x7f0000000800)={0x6, 0x0, 0x20, 0x81, 0x6, 0x89}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000600)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x3, @perf_bp={&(0x7f0000000240), 0x4}, 0x80, 0x3, 0x0, 0x9}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) clone3(&(0x7f0000000440)={0x80000800, &(0x7f0000000000), 0x0, &(0x7f0000000100)=0x0, {0x37}, &(0x7f0000000180)=""/79, 0x4f, &(0x7f0000004c80)=""/102400, &(0x7f0000000380)=[r2, 0x0, r2], 0x3}, 0x58) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000003c0), 0x4c6182, 0x0) r4 = epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r1, &(0x7f0000000200)={0x30000004}) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) epoll_pwait(r4, &(0x7f0000000500)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x8, 0x4, &(0x7f0000000340)={[0x7fffffff]}, 0x8) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r5, &(0x7f0000000140)={r4, 0xffffffffffffffff, 0x3d}) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560c, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f00000005c0)=ANY=[@ANYBLOB="1400001a3e00000071a40a00006b00000000000000"], 0x14}], 0x1}, 0x0) write(0xffffffffffffffff, &(0x7f0000000180)='E', 0x1) kcmp$KCMP_EPOLL_TFD(0x0, r3, 0x7, 0xffffffffffffffff, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x1}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:13:32 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x13, r2, 0x0) 13:13:32 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x2) sendmsg$NL80211_CMD_SET_COALESCE(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000340)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 13:13:32 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = clone3(&(0x7f0000000640)={0x127363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) clone3(&(0x7f00000024c0)={0x100000000, &(0x7f0000001fc0), &(0x7f00000022c0)=0x0, &(0x7f0000002300)=0x0, {0x15}, &(0x7f0000002340)=""/131, 0x83, &(0x7f0000002400)=""/51, &(0x7f0000002480)=[0x0], 0x1}, 0x58) ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000000)) syz_open_dev$tty20(0xc, 0x4, 0x0) gettid() r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000340)) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x1c5042, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)="f2", 0x1}], 0x1, 0x8001, 0x0) clone3(&(0x7f0000000480)={0x8220100, &(0x7f0000000240), &(0x7f0000000300), &(0x7f0000000380), {0x38}, &(0x7f00000003c0)=""/127, 0x7f, &(0x7f00000006c0)=""/4096, &(0x7f0000000440)=[r2, r2, r0, 0x0, r2, 0x0, r2, r1], 0x8}, 0x58) 13:13:32 executing program 6: syz_mount_image$tmpfs(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000006c0)='./file0\x00', 0x0, 0x0) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) renameat2(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x1) 13:13:32 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = clone3(&(0x7f0000000640)={0x127363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) clone3(&(0x7f00000024c0)={0x100000000, &(0x7f0000001fc0), &(0x7f00000022c0)=0x0, &(0x7f0000002300)=0x0, {0x15}, &(0x7f0000002340)=""/131, 0x83, &(0x7f0000002400)=""/51, &(0x7f0000002480)=[0x0], 0x1}, 0x58) ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000000)) syz_open_dev$tty20(0xc, 0x4, 0x0) gettid() r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000340)) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x1c5042, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)="f2", 0x1}], 0x1, 0x8001, 0x0) clone3(&(0x7f0000000480)={0x8220100, &(0x7f0000000240), &(0x7f0000000300), &(0x7f0000000380), {0x38}, &(0x7f00000003c0)=""/127, 0x7f, &(0x7f00000006c0)=""/4096, &(0x7f0000000440)=[r2, r2, r0, 0x0, r2, 0x0, r2, r1], 0x8}, 0x58) 13:13:32 executing program 4: r0 = fork() tkill(r0, 0x28) 13:13:32 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = clone3(&(0x7f0000000640)={0x127363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) clone3(&(0x7f00000024c0)={0x100000000, &(0x7f0000001fc0), &(0x7f00000022c0)=0x0, &(0x7f0000002300)=0x0, {0x15}, &(0x7f0000002340)=""/131, 0x83, &(0x7f0000002400)=""/51, &(0x7f0000002480)=[0x0], 0x1}, 0x58) ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000000)) syz_open_dev$tty20(0xc, 0x4, 0x0) gettid() r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000340)) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x1c5042, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)="f2", 0x1}], 0x1, 0x8001, 0x0) clone3(&(0x7f0000000480)={0x8220100, &(0x7f0000000240), &(0x7f0000000300), &(0x7f0000000380), {0x38}, &(0x7f00000003c0)=""/127, 0x7f, &(0x7f00000006c0)=""/4096, &(0x7f0000000440)=[r2, r2, r0, 0x0, r2, 0x0, r2, r1], 0x8}, 0x58) 13:13:32 executing program 1: ioctl$CDROMREADMODE1(0xffffffffffffffff, 0x530d, &(0x7f0000000800)={0x6, 0x0, 0x20, 0x81, 0x6, 0x89}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000600)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x3, @perf_bp={&(0x7f0000000240), 0x4}, 0x80, 0x3, 0x0, 0x9}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) clone3(&(0x7f0000000440)={0x80000800, &(0x7f0000000000), 0x0, &(0x7f0000000100)=0x0, {0x37}, &(0x7f0000000180)=""/79, 0x4f, &(0x7f0000004c80)=""/102400, &(0x7f0000000380)=[r2, 0x0, r2], 0x3}, 0x58) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000003c0), 0x4c6182, 0x0) r4 = epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r1, &(0x7f0000000200)={0x30000004}) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) epoll_pwait(r4, &(0x7f0000000500)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x8, 0x4, &(0x7f0000000340)={[0x7fffffff]}, 0x8) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r5, &(0x7f0000000140)={r4, 0xffffffffffffffff, 0x3d}) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560c, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f00000005c0)=ANY=[@ANYBLOB="1400001a3e00000071a40a00006b00000000000000"], 0x14}], 0x1}, 0x0) write(0xffffffffffffffff, &(0x7f0000000180)='E', 0x1) kcmp$KCMP_EPOLL_TFD(0x0, r3, 0x7, 0xffffffffffffffff, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x1}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:13:32 executing program 6: syz_mount_image$tmpfs(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000006c0)='./file0\x00', 0x0, 0x0) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) renameat2(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x1) 13:13:33 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = clone3(&(0x7f0000000640)={0x127363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) clone3(&(0x7f00000024c0)={0x100000000, &(0x7f0000001fc0), &(0x7f00000022c0)=0x0, &(0x7f0000002300)=0x0, {0x15}, &(0x7f0000002340)=""/131, 0x83, &(0x7f0000002400)=""/51, &(0x7f0000002480)=[0x0], 0x1}, 0x58) ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000000)) syz_open_dev$tty20(0xc, 0x4, 0x0) gettid() r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000340)) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x1c5042, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)="f2", 0x1}], 0x1, 0x8001, 0x0) clone3(&(0x7f0000000480)={0x8220100, &(0x7f0000000240), &(0x7f0000000300), &(0x7f0000000380), {0x38}, &(0x7f00000003c0)=""/127, 0x7f, &(0x7f00000006c0)=""/4096, &(0x7f0000000440)=[r2, r2, r0, 0x0, r2, 0x0, r2, r1], 0x8}, 0x58) 13:13:33 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f00000001c0), 0x2, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c0, 0x0, 0x0, r1}) ioctl$SCSI_IOCTL_DOORLOCK(r3, 0x5380) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x220) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000180)=0x80000001, 0x1) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={'\x00', 0x80, 0x3f, 0x7fffffff, 0x0, 0x2, r1}) r4 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2, 0x80000000000000, 0x718c35f1}) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000340)={'\x00', 0x80, 0x3f, 0x7fffffff, 0x0, 0x2}) syz_open_procfs(0x0, 0x0) 13:13:33 executing program 7: mlock2(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r0 = shmget(0x3, 0xa000, 0x20, &(0x7f0000ff6000/0xa000)=nil) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x2000) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r3 = openat2(r1, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) mincore(&(0x7f0000ff8000/0x2000)=nil, 0x2000, &(0x7f0000000700)=""/4096) r4 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x2, 0x3f, 0x5, 0x3, 0x0, 0x89d9, 0x1000, 0xc, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x4, 0x8}, 0x8040, 0x4, 0x400, 0x6, 0xa2, 0x0, 0x7, 0x0, 0x4, 0x0, 0x239b}, 0xffffffffffffffff, 0x9, r3, 0x0) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r2, 0x40089413, &(0x7f0000000180)=0x1) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) ioctl$SNAPSHOT_FREE(r5, 0x3305) mremap(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0x2000, 0x7, &(0x7f0000ffe000/0x2000)=nil) 13:13:33 executing program 4: r0 = fork() tkill(r0, 0x28) 13:13:33 executing program 7: mlock2(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r0 = shmget(0x3, 0xa000, 0x20, &(0x7f0000ff6000/0xa000)=nil) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x2000) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r3 = openat2(r1, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) mincore(&(0x7f0000ff8000/0x2000)=nil, 0x2000, &(0x7f0000000700)=""/4096) r4 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x2, 0x3f, 0x5, 0x3, 0x0, 0x89d9, 0x1000, 0xc, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x4, 0x8}, 0x8040, 0x4, 0x400, 0x6, 0xa2, 0x0, 0x7, 0x0, 0x4, 0x0, 0x239b}, 0xffffffffffffffff, 0x9, r3, 0x0) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r2, 0x40089413, &(0x7f0000000180)=0x1) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) ioctl$SNAPSHOT_FREE(r5, 0x3305) mremap(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0x2000, 0x7, &(0x7f0000ffe000/0x2000)=nil) 13:13:33 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/key-users\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000100)=[{&(0x7f0000002240)=""/4109, 0x100d}], 0x1, 0x7, 0x0) 13:13:33 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = clone3(&(0x7f0000000640)={0x127363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) clone3(&(0x7f00000024c0)={0x100000000, &(0x7f0000001fc0), &(0x7f00000022c0)=0x0, &(0x7f0000002300)=0x0, {0x15}, &(0x7f0000002340)=""/131, 0x83, &(0x7f0000002400)=""/51, &(0x7f0000002480)=[0x0], 0x1}, 0x58) ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000000)) syz_open_dev$tty20(0xc, 0x4, 0x0) gettid() r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000340)) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x1c5042, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)="f2", 0x1}], 0x1, 0x8001, 0x0) clone3(&(0x7f0000000480)={0x8220100, &(0x7f0000000240), &(0x7f0000000300), &(0x7f0000000380), {0x38}, &(0x7f00000003c0)=""/127, 0x7f, &(0x7f00000006c0)=""/4096, &(0x7f0000000440)=[r2, r2, r0, 0x0, r2, 0x0, r2, r1], 0x8}, 0x58) 13:13:33 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = clone3(&(0x7f0000000640)={0x127363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) clone3(&(0x7f00000024c0)={0x100000000, &(0x7f0000001fc0), &(0x7f00000022c0)=0x0, &(0x7f0000002300)=0x0, {0x15}, &(0x7f0000002340)=""/131, 0x83, &(0x7f0000002400)=""/51, &(0x7f0000002480)=[0x0], 0x1}, 0x58) ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000000)) syz_open_dev$tty20(0xc, 0x4, 0x0) gettid() r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000340)) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x1c5042, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)="f2", 0x1}], 0x1, 0x8001, 0x0) clone3(&(0x7f0000000480)={0x8220100, &(0x7f0000000240), &(0x7f0000000300), &(0x7f0000000380), {0x38}, &(0x7f00000003c0)=""/127, 0x7f, &(0x7f00000006c0)=""/4096, &(0x7f0000000440)=[r2, r2, r0, 0x0, r2, 0x0, r2, r1], 0x8}, 0x58) 13:13:33 executing program 1: mlock2(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r0 = shmget(0x3, 0xa000, 0x20, &(0x7f0000ff6000/0xa000)=nil) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x2000) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r3 = openat2(r1, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) mincore(&(0x7f0000ff8000/0x2000)=nil, 0x2000, &(0x7f0000000700)=""/4096) r4 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x2, 0x3f, 0x5, 0x3, 0x0, 0x89d9, 0x1000, 0xc, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x4, 0x8}, 0x8040, 0x4, 0x400, 0x6, 0xa2, 0x0, 0x7, 0x0, 0x4, 0x0, 0x239b}, 0xffffffffffffffff, 0x9, r3, 0x0) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r2, 0x40089413, &(0x7f0000000180)=0x1) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) ioctl$SNAPSHOT_FREE(r5, 0x3305) mremap(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0x2000, 0x7, &(0x7f0000ffe000/0x2000)=nil) 13:13:33 executing program 7: mlock2(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r0 = shmget(0x3, 0xa000, 0x20, &(0x7f0000ff6000/0xa000)=nil) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x2000) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r3 = openat2(r1, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) mincore(&(0x7f0000ff8000/0x2000)=nil, 0x2000, &(0x7f0000000700)=""/4096) r4 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x2, 0x3f, 0x5, 0x3, 0 VM DIAGNOSIS: 13:13:26 Registers: info registers vcpu 0 RAX=dffffc0000000060 RBX=00000000000003fd RCX=0000000000000000 RDX=00000000000003fd RSI=ffffffff822b246c RDI=ffffffff87641b60 RBP=ffffffff87641b20 RSP=ffff88800dd6f640 R8 =0000000000000004 R9 =0000000000000010 R10=0000000000000010 R11=0000000000000001 R12=0000000000002710 R13=0000000000000020 R14=fffffbfff0ec83bb R15=dffffc0000000000 RIP=ffffffff822b24c1 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f41f6486700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fa0b1341028 CR3=000000000a1ec000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 00007f41f8ff77c0 00007f41f8ff77c8 YMM02=0000000000000000 0000000000000000 00007f41f8ff77e0 00007f41f8ff77c0 YMM03=0000000000000000 0000000000000000 00007f41f8ff77c8 00007f41f8ff77c0 YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffff00000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=0000000000000000 RBX=ffff8880204cf660 RCX=0000000000000004 RDX=0000000000000000 RSI=0000000000000000 RDI=ffff8880204cf618 RBP=ffff88801740d040 RSP=ffff8880204cf570 R8 =0000000000000001 R9 =ffff8880204cf5c8 R10=ffffed1004099ec6 R11=0000000000000001 R12=0000000000000000 R13=ffff8880204cf5f0 R14=ffff88801740d040 R15=ffff8880204cf5c8 RIP=ffffffff8413d714 RFL=00000212 [----A--] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f3af5394260 CR3=0000000018102000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 756e696c2d34365f 3638782f62696c2f YMM01=0000000000000000 0000000000000000 2e6f747079726362 696c2f756e672d78 YMM02=0000000000000000 0000000000000000 00312e312e6f732e 6f74707972636269 YMM03=0000000000000000 0000000000000000 6c2f756e672d7875 6e696c2d34365f36 YMM04=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000