Warning: Permanently added '[localhost]:30098' (ECDSA) to the list of known hosts. 2022/09/12 16:51:33 fuzzer started 2022/09/12 16:51:34 dialing manager at localhost:38027 syzkaller login: [ 44.330278] cgroup: Unknown subsys name 'net' [ 44.429983] cgroup: Unknown subsys name 'rlimit' 2022/09/12 16:51:48 syscalls: 2215 2022/09/12 16:51:48 code coverage: enabled 2022/09/12 16:51:48 comparison tracing: enabled 2022/09/12 16:51:48 extra coverage: enabled 2022/09/12 16:51:48 setuid sandbox: enabled 2022/09/12 16:51:48 namespace sandbox: enabled 2022/09/12 16:51:48 Android sandbox: enabled 2022/09/12 16:51:48 fault injection: enabled 2022/09/12 16:51:48 leak checking: enabled 2022/09/12 16:51:48 net packet injection: enabled 2022/09/12 16:51:48 net device setup: enabled 2022/09/12 16:51:48 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/09/12 16:51:48 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/09/12 16:51:48 USB emulation: enabled 2022/09/12 16:51:48 hci packet injection: enabled 2022/09/12 16:51:48 wifi device emulation: failed to parse kernel version (6.0.0-rc5-next-20220912) 2022/09/12 16:51:48 802.15.4 emulation: enabled 2022/09/12 16:51:48 fetching corpus: 0, signal 0/2000 (executing program) 2022/09/12 16:51:48 fetching corpus: 50, signal 33525/36980 (executing program) 2022/09/12 16:51:48 fetching corpus: 100, signal 46944/51773 (executing program) 2022/09/12 16:51:48 fetching corpus: 150, signal 58374/64473 (executing program) 2022/09/12 16:51:48 fetching corpus: 200, signal 64664/72049 (executing program) 2022/09/12 16:51:48 fetching corpus: 250, signal 69517/78127 (executing program) 2022/09/12 16:51:49 fetching corpus: 300, signal 74460/84253 (executing program) 2022/09/12 16:51:49 fetching corpus: 350, signal 77811/88744 (executing program) 2022/09/12 16:51:49 fetching corpus: 400, signal 83342/95218 (executing program) 2022/09/12 16:51:49 fetching corpus: 450, signal 87843/100646 (executing program) 2022/09/12 16:51:49 fetching corpus: 500, signal 90586/104421 (executing program) 2022/09/12 16:51:49 fetching corpus: 550, signal 93766/108588 (executing program) 2022/09/12 16:51:49 fetching corpus: 600, signal 96249/112062 (executing program) 2022/09/12 16:51:49 fetching corpus: 650, signal 99444/116103 (executing program) 2022/09/12 16:51:50 fetching corpus: 700, signal 103352/120675 (executing program) 2022/09/12 16:51:50 fetching corpus: 750, signal 107199/125145 (executing program) 2022/09/12 16:51:50 fetching corpus: 800, signal 110650/129285 (executing program) 2022/09/12 16:51:50 fetching corpus: 850, signal 113414/132732 (executing program) 2022/09/12 16:51:50 fetching corpus: 900, signal 116268/136227 (executing program) 2022/09/12 16:51:50 fetching corpus: 950, signal 119185/139765 (executing program) 2022/09/12 16:51:50 fetching corpus: 1000, signal 121727/142928 (executing program) 2022/09/12 16:51:50 fetching corpus: 1050, signal 125549/147189 (executing program) 2022/09/12 16:51:51 fetching corpus: 1100, signal 127616/149846 (executing program) 2022/09/12 16:51:51 fetching corpus: 1150, signal 131262/153767 (executing program) 2022/09/12 16:51:51 fetching corpus: 1200, signal 133583/156560 (executing program) 2022/09/12 16:51:51 fetching corpus: 1250, signal 135781/159222 (executing program) 2022/09/12 16:51:51 fetching corpus: 1300, signal 138402/162172 (executing program) 2022/09/12 16:51:51 fetching corpus: 1350, signal 139804/164167 (executing program) 2022/09/12 16:51:51 fetching corpus: 1400, signal 141209/166108 (executing program) 2022/09/12 16:51:52 fetching corpus: 1450, signal 142754/168116 (executing program) 2022/09/12 16:51:52 fetching corpus: 1500, signal 144644/170380 (executing program) 2022/09/12 16:51:52 fetching corpus: 1550, signal 146362/172438 (executing program) 2022/09/12 16:51:52 fetching corpus: 1600, signal 147863/174377 (executing program) 2022/09/12 16:51:52 fetching corpus: 1650, signal 149118/176143 (executing program) 2022/09/12 16:51:52 fetching corpus: 1700, signal 150433/177863 (executing program) 2022/09/12 16:51:52 fetching corpus: 1750, signal 151460/179357 (executing program) 2022/09/12 16:51:52 fetching corpus: 1800, signal 153040/181269 (executing program) 2022/09/12 16:51:53 fetching corpus: 1850, signal 154124/182792 (executing program) 2022/09/12 16:51:53 fetching corpus: 1900, signal 155279/184326 (executing program) 2022/09/12 16:51:53 fetching corpus: 1950, signal 156302/185784 (executing program) 2022/09/12 16:51:53 fetching corpus: 2000, signal 157497/187358 (executing program) 2022/09/12 16:51:53 fetching corpus: 2050, signal 158959/189038 (executing program) 2022/09/12 16:51:53 fetching corpus: 2100, signal 160039/190464 (executing program) 2022/09/12 16:51:53 fetching corpus: 2150, signal 161053/191826 (executing program) 2022/09/12 16:51:53 fetching corpus: 2200, signal 162512/193422 (executing program) 2022/09/12 16:51:54 fetching corpus: 2250, signal 163833/194922 (executing program) 2022/09/12 16:51:54 fetching corpus: 2300, signal 165514/196643 (executing program) 2022/09/12 16:51:54 fetching corpus: 2350, signal 167205/198416 (executing program) 2022/09/12 16:51:54 fetching corpus: 2400, signal 168185/199634 (executing program) 2022/09/12 16:51:54 fetching corpus: 2450, signal 169896/201313 (executing program) 2022/09/12 16:51:54 fetching corpus: 2500, signal 170820/202491 (executing program) 2022/09/12 16:51:54 fetching corpus: 2550, signal 171544/203510 (executing program) 2022/09/12 16:51:54 fetching corpus: 2600, signal 172694/204796 (executing program) 2022/09/12 16:51:55 fetching corpus: 2650, signal 173511/205899 (executing program) 2022/09/12 16:51:55 fetching corpus: 2700, signal 174313/206938 (executing program) 2022/09/12 16:51:55 fetching corpus: 2750, signal 175376/208104 (executing program) 2022/09/12 16:51:55 fetching corpus: 2800, signal 176496/209308 (executing program) 2022/09/12 16:51:55 fetching corpus: 2850, signal 177533/210474 (executing program) 2022/09/12 16:51:55 fetching corpus: 2900, signal 178395/211493 (executing program) 2022/09/12 16:51:55 fetching corpus: 2950, signal 179615/212719 (executing program) 2022/09/12 16:51:55 fetching corpus: 3000, signal 180468/213734 (executing program) 2022/09/12 16:51:56 fetching corpus: 3050, signal 181230/214672 (executing program) 2022/09/12 16:51:56 fetching corpus: 3100, signal 181909/215544 (executing program) 2022/09/12 16:51:56 fetching corpus: 3150, signal 182676/216439 (executing program) 2022/09/12 16:51:56 fetching corpus: 3200, signal 183525/217344 (executing program) 2022/09/12 16:51:56 fetching corpus: 3250, signal 184198/218122 (executing program) 2022/09/12 16:51:56 fetching corpus: 3300, signal 185232/219113 (executing program) 2022/09/12 16:51:56 fetching corpus: 3350, signal 186052/219966 (executing program) 2022/09/12 16:51:57 fetching corpus: 3400, signal 186723/220768 (executing program) 2022/09/12 16:51:57 fetching corpus: 3450, signal 187623/221657 (executing program) 2022/09/12 16:51:57 fetching corpus: 3500, signal 188514/222526 (executing program) 2022/09/12 16:51:57 fetching corpus: 3550, signal 189382/223345 (executing program) 2022/09/12 16:51:57 fetching corpus: 3600, signal 190414/224256 (executing program) 2022/09/12 16:51:57 fetching corpus: 3650, signal 191284/225071 (executing program) 2022/09/12 16:51:57 fetching corpus: 3700, signal 192264/225913 (executing program) 2022/09/12 16:51:58 fetching corpus: 3750, signal 193726/226975 (executing program) 2022/09/12 16:51:58 fetching corpus: 3799, signal 194304/227633 (executing program) 2022/09/12 16:51:58 fetching corpus: 3849, signal 195591/228511 (executing program) 2022/09/12 16:51:58 fetching corpus: 3899, signal 196654/229317 (executing program) 2022/09/12 16:51:58 fetching corpus: 3949, signal 197480/230007 (executing program) 2022/09/12 16:51:58 fetching corpus: 3999, signal 198307/230682 (executing program) 2022/09/12 16:51:58 fetching corpus: 4049, signal 199321/231487 (executing program) 2022/09/12 16:51:59 fetching corpus: 4099, signal 200077/232217 (executing program) 2022/09/12 16:51:59 fetching corpus: 4149, signal 200726/232824 (executing program) 2022/09/12 16:51:59 fetching corpus: 4199, signal 201389/233414 (executing program) 2022/09/12 16:51:59 fetching corpus: 4249, signal 202268/234045 (executing program) 2022/09/12 16:51:59 fetching corpus: 4299, signal 203140/234672 (executing program) 2022/09/12 16:51:59 fetching corpus: 4349, signal 204090/235299 (executing program) 2022/09/12 16:51:59 fetching corpus: 4399, signal 205060/235959 (executing program) 2022/09/12 16:52:00 fetching corpus: 4449, signal 207010/236804 (executing program) 2022/09/12 16:52:00 fetching corpus: 4499, signal 207869/237383 (executing program) 2022/09/12 16:52:00 fetching corpus: 4549, signal 208497/237932 (executing program) 2022/09/12 16:52:00 fetching corpus: 4599, signal 209247/238443 (executing program) 2022/09/12 16:52:00 fetching corpus: 4649, signal 209960/238981 (executing program) 2022/09/12 16:52:00 fetching corpus: 4699, signal 210600/239462 (executing program) 2022/09/12 16:52:00 fetching corpus: 4749, signal 211196/239897 (executing program) 2022/09/12 16:52:01 fetching corpus: 4799, signal 211991/240370 (executing program) 2022/09/12 16:52:01 fetching corpus: 4849, signal 212657/240802 (executing program) 2022/09/12 16:52:01 fetching corpus: 4899, signal 213285/241222 (executing program) 2022/09/12 16:52:01 fetching corpus: 4949, signal 214136/241729 (executing program) 2022/09/12 16:52:01 fetching corpus: 4999, signal 214699/242128 (executing program) 2022/09/12 16:52:01 fetching corpus: 5048, signal 215515/242546 (executing program) 2022/09/12 16:52:02 fetching corpus: 5098, signal 216086/242892 (executing program) 2022/09/12 16:52:02 fetching corpus: 5148, signal 216808/243276 (executing program) 2022/09/12 16:52:02 fetching corpus: 5198, signal 217390/243654 (executing program) 2022/09/12 16:52:02 fetching corpus: 5248, signal 218000/244001 (executing program) 2022/09/12 16:52:02 fetching corpus: 5298, signal 218636/244354 (executing program) 2022/09/12 16:52:02 fetching corpus: 5348, signal 219088/244707 (executing program) 2022/09/12 16:52:02 fetching corpus: 5397, signal 220019/245292 (executing program) 2022/09/12 16:52:02 fetching corpus: 5446, signal 220508/245605 (executing program) 2022/09/12 16:52:02 fetching corpus: 5495, signal 220951/245918 (executing program) 2022/09/12 16:52:03 fetching corpus: 5545, signal 221636/246173 (executing program) 2022/09/12 16:52:03 fetching corpus: 5595, signal 221921/246395 (executing program) 2022/09/12 16:52:03 fetching corpus: 5644, signal 222347/246642 (executing program) 2022/09/12 16:52:03 fetching corpus: 5694, signal 222776/246893 (executing program) 2022/09/12 16:52:03 fetching corpus: 5743, signal 223542/247149 (executing program) 2022/09/12 16:52:03 fetching corpus: 5793, signal 224121/247425 (executing program) 2022/09/12 16:52:03 fetching corpus: 5842, signal 224612/247628 (executing program) 2022/09/12 16:52:04 fetching corpus: 5892, signal 225388/247866 (executing program) 2022/09/12 16:52:04 fetching corpus: 5942, signal 225964/248053 (executing program) 2022/09/12 16:52:04 fetching corpus: 5992, signal 226303/248148 (executing program) 2022/09/12 16:52:04 fetching corpus: 6042, signal 226614/248156 (executing program) 2022/09/12 16:52:04 fetching corpus: 6092, signal 227036/248161 (executing program) 2022/09/12 16:52:04 fetching corpus: 6142, signal 227884/248177 (executing program) 2022/09/12 16:52:04 fetching corpus: 6192, signal 228454/248242 (executing program) 2022/09/12 16:52:04 fetching corpus: 6241, signal 229180/248260 (executing program) 2022/09/12 16:52:05 fetching corpus: 6291, signal 229697/248278 (executing program) 2022/09/12 16:52:05 fetching corpus: 6341, signal 230399/248288 (executing program) 2022/09/12 16:52:05 fetching corpus: 6391, signal 230900/248294 (executing program) 2022/09/12 16:52:05 fetching corpus: 6441, signal 231257/248334 (executing program) 2022/09/12 16:52:05 fetching corpus: 6491, signal 231708/248360 (executing program) 2022/09/12 16:52:05 fetching corpus: 6539, signal 232351/248402 (executing program) 2022/09/12 16:52:05 fetching corpus: 6587, signal 232989/248480 (executing program) 2022/09/12 16:52:05 fetching corpus: 6637, signal 233410/248498 (executing program) 2022/09/12 16:52:05 fetching corpus: 6686, signal 233827/248501 (executing program) 2022/09/12 16:52:06 fetching corpus: 6736, signal 234486/248506 (executing program) 2022/09/12 16:52:06 fetching corpus: 6786, signal 234841/248507 (executing program) 2022/09/12 16:52:06 fetching corpus: 6836, signal 235477/248512 (executing program) 2022/09/12 16:52:06 fetching corpus: 6886, signal 236079/248619 (executing program) 2022/09/12 16:52:06 fetching corpus: 6936, signal 236679/248632 (executing program) 2022/09/12 16:52:06 fetching corpus: 6986, signal 237101/248668 (executing program) 2022/09/12 16:52:06 fetching corpus: 7036, signal 237522/248704 (executing program) 2022/09/12 16:52:06 fetching corpus: 7084, signal 237912/248707 (executing program) 2022/09/12 16:52:07 fetching corpus: 7134, signal 238254/248716 (executing program) 2022/09/12 16:52:07 fetching corpus: 7164, signal 238592/248730 (executing program) 2022/09/12 16:52:07 fetching corpus: 7165, signal 238593/248737 (executing program) 2022/09/12 16:52:07 fetching corpus: 7165, signal 238593/248737 (executing program) 2022/09/12 16:52:09 starting 8 fuzzer processes 16:52:09 executing program 0: r0 = syz_io_uring_setup(0x4efe, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x5}, 0x7fff) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x5}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)}, 0x9829fe3) io_uring_enter(r0, 0x6c64, 0x0, 0x0, 0x0, 0x0) 16:52:09 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000011c0)={0x1, 0x80, 0xff, 0x20, 0x3f, 0x7f, 0x0, 0x2, 0x5010, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x3e, 0x6}, 0x10000, 0x6, 0x3ec000, 0x8, 0xffffffff, 0x9, 0x4, 0x0, 0x2, 0x0, 0x7}, 0xffffffffffffffff, 0x6, r0, 0xa) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYRES64=r0, @ANYRES16=0x0, @ANYBLOB="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"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x20040044) syz_genetlink_get_family_id$nl80211(&(0x7f0000001280), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000001240)='./file0\x00', 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') 16:52:10 executing program 2: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@multicast, @multicast, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @remote}, @redirect={0x4, 0x0, 0x0, @empty, {0x8, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @dev, @local, {[@rr={0x8}, @rr={0x7, 0x13, 0x0, [@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr, @multicast2]}, @rr={0x7, 0x27, 0x0, [@dev, @local, @private, @loopback, @empty, @remote, @empty, @loopback, @local]}]}}}}}}}, 0x0) 16:52:10 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000540), 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r0, 0x2276, 0x0) 16:52:10 executing program 4: mknod(&(0x7f0000008d80)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1a901e, 0x0) perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x81, 0x9, 0x15, 0x3f, 0x0, 0x5, 0xe004, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xc0000000, 0x0, @perf_config_ext={0x2, 0x8}, 0x80, 0x3, 0x8cf, 0x6, 0xfffffffffffffeff, 0x8, 0x0, 0x0, 0x4, 0x0, 0x3}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x8) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 16:52:10 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x7e, 0x0, @empty}, 0x1c) r2 = socket$inet6(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x7e, 0x0, @empty}, 0x1c) [ 80.178718] audit: type=1400 audit(1663001530.028:6): avc: denied { execmem } for pid=288 comm="syz-executor.1" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 16:52:10 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x45534}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) vmsplice(r0, &(0x7f0000000040)=[{&(0x7f0000000100)="047aaa7b8edc7c225166ab148bfe9b97028709f17c3490d35b4a636b3c61bd0fa309a6e04a3a12b0c58d2fff35f31d8f5e69170ff4363a0af4243597605794e18714af", 0x43}], 0x1, 0x8) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) open_by_handle_at(r1, &(0x7f0000000140)=@ceph_nfs_confh={0x10, 0x2, {0x28}}, 0x600) 16:52:10 executing program 7: pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) write$P9_RWALK(r1, &(0x7f0000000080)={0x9}, 0x9) [ 81.540722] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 81.542950] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 81.544513] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 81.547564] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 81.549478] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 81.550879] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 81.555820] Bluetooth: hci2: HCI_REQ-0x0c1a [ 81.556278] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 81.566694] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 81.571653] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 81.576692] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 81.576846] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 81.582382] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 81.584147] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 81.585488] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 81.589881] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 81.590805] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 81.590892] Bluetooth: hci0: HCI_REQ-0x0c1a [ 81.593969] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 81.595753] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 81.599492] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 81.600978] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 81.602344] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 81.603007] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 81.604000] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 81.604755] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 81.609118] Bluetooth: hci4: HCI_REQ-0x0c1a [ 81.623247] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 81.625264] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 81.627110] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 81.633368] Bluetooth: hci3: HCI_REQ-0x0c1a [ 81.669862] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 81.681467] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 81.682636] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 81.684986] Bluetooth: hci1: HCI_REQ-0x0c1a [ 81.773420] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 81.785091] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 81.793943] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 81.828989] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 81.830608] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 81.831515] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 81.839185] Bluetooth: hci7: HCI_REQ-0x0c1a [ 83.612783] Bluetooth: hci0: command 0x0409 tx timeout [ 83.615488] Bluetooth: hci2: command 0x0409 tx timeout [ 83.676211] Bluetooth: hci3: command 0x0409 tx timeout [ 83.677171] Bluetooth: hci6: Opcode 0x c03 failed: -110 [ 83.678947] Bluetooth: hci5: Opcode 0x c03 failed: -110 [ 83.681314] Bluetooth: hci4: command 0x0409 tx timeout [ 83.740126] Bluetooth: hci1: command 0x0409 tx timeout [ 83.868144] Bluetooth: hci7: command 0x0409 tx timeout [ 85.660319] Bluetooth: hci2: command 0x041b tx timeout [ 85.661170] Bluetooth: hci0: command 0x041b tx timeout [ 85.724156] Bluetooth: hci3: command 0x041b tx timeout [ 85.725114] Bluetooth: hci4: command 0x041b tx timeout [ 85.789083] Bluetooth: hci1: command 0x041b tx timeout [ 85.917196] Bluetooth: hci7: command 0x041b tx timeout [ 87.709087] Bluetooth: hci0: command 0x040f tx timeout [ 87.709565] Bluetooth: hci2: command 0x040f tx timeout [ 87.773095] Bluetooth: hci4: command 0x040f tx timeout [ 87.773556] Bluetooth: hci3: command 0x040f tx timeout [ 87.837071] Bluetooth: hci1: command 0x040f tx timeout [ 87.965930] Bluetooth: hci7: command 0x040f tx timeout [ 89.117077] Bluetooth: hci5: Opcode 0x c03 failed: -110 [ 89.436121] Bluetooth: hci6: Opcode 0x c03 failed: -110 [ 89.756081] Bluetooth: hci2: command 0x0419 tx timeout [ 89.756557] Bluetooth: hci0: command 0x0419 tx timeout [ 89.820100] Bluetooth: hci3: command 0x0419 tx timeout [ 89.820551] Bluetooth: hci4: command 0x0419 tx timeout [ 89.884081] Bluetooth: hci1: command 0x0419 tx timeout [ 90.012122] Bluetooth: hci7: command 0x0419 tx timeout [ 91.809158] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 91.811328] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 91.826819] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 91.838818] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 91.846156] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 91.849359] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 91.853072] Bluetooth: hci5: HCI_REQ-0x0c1a [ 92.262959] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 92.273606] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 92.274793] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 92.283630] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 92.292195] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 92.297577] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 92.314128] Bluetooth: hci6: HCI_REQ-0x0c1a [ 93.916118] Bluetooth: hci5: command 0x0409 tx timeout [ 94.365119] Bluetooth: hci6: command 0x0409 tx timeout [ 95.965167] Bluetooth: hci5: command 0x041b tx timeout [ 96.412072] Bluetooth: hci6: command 0x041b tx timeout [ 98.013134] Bluetooth: hci5: command 0x040f tx timeout [ 98.461073] Bluetooth: hci6: command 0x040f tx timeout [ 100.060312] Bluetooth: hci5: command 0x0419 tx timeout [ 100.509174] Bluetooth: hci6: command 0x0419 tx timeout [ 133.962229] audit: type=1400 audit(1663001583.811:7): avc: denied { open } for pid=3584 comm="syz-executor.1" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 133.963913] audit: type=1400 audit(1663001583.812:8): avc: denied { kernel } for pid=3584 comm="syz-executor.1" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 133.975937] ------------[ cut here ]------------ [ 133.975960] [ 133.975964] ====================================================== [ 133.975968] WARNING: possible circular locking dependency detected [ 133.975972] 6.0.0-rc5-next-20220912 #1 Not tainted [ 133.975980] ------------------------------------------------------ [ 133.975983] syz-executor.1/3586 is trying to acquire lock: [ 133.975991] ffffffff853fa878 ((console_sem).lock){....}-{2:2}, at: down_trylock+0xe/0x70 [ 133.976034] [ 133.976034] but task is already holding lock: [ 133.976037] ffff88800f327c20 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 133.976065] [ 133.976065] which lock already depends on the new lock. [ 133.976065] [ 133.976068] [ 133.976068] the existing dependency chain (in reverse order) is: [ 133.976071] [ 133.976071] -> #3 (&ctx->lock){....}-{2:2}: [ 133.976085] _raw_spin_lock+0x2a/0x40 [ 133.976103] __perf_event_task_sched_out+0x53b/0x18d0 [ 133.976115] __schedule+0xedd/0x2470 [ 133.976126] schedule+0xda/0x1b0 [ 133.976137] futex_wait_queue+0xf5/0x1e0 [ 133.976150] futex_wait+0x28e/0x690 [ 133.976159] do_futex+0x2ff/0x380 [ 133.976169] __x64_sys_futex+0x1c6/0x4d0 [ 133.976179] do_syscall_64+0x3b/0x90 [ 133.976193] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 133.976213] [ 133.976213] -> #2 (&rq->__lock){-.-.}-{2:2}: [ 133.976227] _raw_spin_lock_nested+0x30/0x40 [ 133.976241] raw_spin_rq_lock_nested+0x1e/0x30 [ 133.976255] task_fork_fair+0x63/0x4d0 [ 133.976271] sched_cgroup_fork+0x3d0/0x540 [ 133.976285] copy_process+0x3f9e/0x6df0 [ 133.976296] kernel_clone+0xe7/0x890 [ 133.976305] user_mode_thread+0xad/0xf0 [ 133.976316] rest_init+0x24/0x250 [ 133.976331] arch_call_rest_init+0xf/0x14 [ 133.976350] start_kernel+0x4c1/0x4e6 [ 133.976366] secondary_startup_64_no_verify+0xe0/0xeb [ 133.976381] [ 133.976381] -> #1 (&p->pi_lock){-.-.}-{2:2}: [ 133.976394] _raw_spin_lock_irqsave+0x39/0x60 [ 133.976408] try_to_wake_up+0xab/0x1920 [ 133.976421] up+0x75/0xb0 [ 133.976432] __up_console_sem+0x6e/0x80 [ 133.976448] console_unlock+0x46a/0x590 [ 133.976463] vt_ioctl+0x2822/0x2ca0 [ 133.976476] tty_ioctl+0x7c4/0x1700 [ 133.976488] __x64_sys_ioctl+0x19a/0x210 [ 133.976503] do_syscall_64+0x3b/0x90 [ 133.976515] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 133.976531] [ 133.976531] -> #0 ((console_sem).lock){....}-{2:2}: [ 133.976545] __lock_acquire+0x2a02/0x5e70 [ 133.976561] lock_acquire+0x1a2/0x530 [ 133.976576] _raw_spin_lock_irqsave+0x39/0x60 [ 133.976590] down_trylock+0xe/0x70 [ 133.976602] __down_trylock_console_sem+0x3b/0xd0 [ 133.976618] vprintk_emit+0x16b/0x560 [ 133.976634] vprintk+0x84/0xa0 [ 133.976650] _printk+0xba/0xf1 [ 133.976667] report_bug.cold+0x72/0xab [ 133.976678] handle_bug+0x3c/0x70 [ 133.976691] exc_invalid_op+0x14/0x50 [ 133.976703] asm_exc_invalid_op+0x16/0x20 [ 133.976719] group_sched_out.part.0+0x2c7/0x460 [ 133.976729] ctx_sched_out+0x8f1/0xc10 [ 133.976739] __perf_event_task_sched_out+0x6d0/0x18d0 [ 133.976751] __schedule+0xedd/0x2470 [ 133.976760] schedule+0xda/0x1b0 [ 133.976769] futex_wait_queue+0xf5/0x1e0 [ 133.976779] futex_wait+0x28e/0x690 [ 133.976792] do_futex+0x2ff/0x380 [ 133.976801] __x64_sys_futex+0x1c6/0x4d0 [ 133.976810] do_syscall_64+0x3b/0x90 [ 133.976823] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 133.976840] [ 133.976840] other info that might help us debug this: [ 133.976840] [ 133.976843] Chain exists of: [ 133.976843] (console_sem).lock --> &rq->__lock --> &ctx->lock [ 133.976843] [ 133.976858] Possible unsafe locking scenario: [ 133.976858] [ 133.976860] CPU0 CPU1 [ 133.976864] ---- ---- [ 133.976867] lock(&ctx->lock); [ 133.976872] lock(&rq->__lock); [ 133.976879] lock(&ctx->lock); [ 133.976885] lock((console_sem).lock); [ 133.976891] [ 133.976891] *** DEADLOCK *** [ 133.976891] [ 133.976893] 2 locks held by syz-executor.1/3586: [ 133.976900] #0: ffff88806ce37cd8 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x1cf/0x2470 [ 133.976925] #1: ffff88800f327c20 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 133.976953] [ 133.976953] stack backtrace: [ 133.976956] CPU: 0 PID: 3586 Comm: syz-executor.1 Not tainted 6.0.0-rc5-next-20220912 #1 [ 133.976969] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 133.976977] Call Trace: [ 133.976981] [ 133.976985] dump_stack_lvl+0x8b/0xb3 [ 133.977000] check_noncircular+0x263/0x2e0 [ 133.977016] ? format_decode+0x26c/0xb50 [ 133.977032] ? print_circular_bug+0x450/0x450 [ 133.977050] ? enable_ptr_key_workfn+0x20/0x20 [ 133.977067] ? format_decode+0x26c/0xb50 [ 133.977082] ? alloc_chain_hlocks+0x1ec/0x5a0 [ 133.977100] __lock_acquire+0x2a02/0x5e70 [ 133.977122] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 133.977145] lock_acquire+0x1a2/0x530 [ 133.977162] ? down_trylock+0xe/0x70 [ 133.977177] ? rcu_read_unlock+0x40/0x40 [ 133.977198] ? vprintk+0x84/0xa0 [ 133.977219] _raw_spin_lock_irqsave+0x39/0x60 [ 133.977235] ? down_trylock+0xe/0x70 [ 133.977248] down_trylock+0xe/0x70 [ 133.977262] ? vprintk+0x84/0xa0 [ 133.977279] __down_trylock_console_sem+0x3b/0xd0 [ 133.977299] vprintk_emit+0x16b/0x560 [ 133.977319] vprintk+0x84/0xa0 [ 133.977337] _printk+0xba/0xf1 [ 133.977354] ? record_print_text.cold+0x16/0x16 [ 133.977376] ? report_bug.cold+0x66/0xab [ 133.977390] ? group_sched_out.part.0+0x2c7/0x460 [ 133.977402] report_bug.cold+0x72/0xab [ 133.977417] handle_bug+0x3c/0x70 [ 133.977430] exc_invalid_op+0x14/0x50 [ 133.977444] asm_exc_invalid_op+0x16/0x20 [ 133.977461] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 133.977475] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 133.977487] RSP: 0018:ffff88801d5478f8 EFLAGS: 00010006 [ 133.977496] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 133.977504] RDX: ffff88800feb5040 RSI: ffffffff81566027 RDI: 0000000000000005 [ 133.977512] RBP: ffff8880086605c8 R08: 0000000000000005 R09: 0000000000000001 [ 133.977520] R10: 0000000000000000 R11: ffffffff865aa01b R12: ffff88800f327c00 [ 133.977528] R13: ffff88806ce3d100 R14: ffffffff8547c660 R15: 0000000000000002 [ 133.977539] ? group_sched_out.part.0+0x2c7/0x460 [ 133.977552] ? group_sched_out.part.0+0x2c7/0x460 [ 133.977567] ctx_sched_out+0x8f1/0xc10 [ 133.977580] __perf_event_task_sched_out+0x6d0/0x18d0 [ 133.977595] ? lock_is_held_type+0xd7/0x130 [ 133.977614] ? __perf_cgroup_move+0x160/0x160 [ 133.977625] ? set_next_entity+0x304/0x550 [ 133.977648] ? lock_is_held_type+0xd7/0x130 [ 133.977666] __schedule+0xedd/0x2470 [ 133.977679] ? io_schedule_timeout+0x150/0x150 [ 133.977690] ? futex_wait_setup+0x166/0x230 [ 133.977704] schedule+0xda/0x1b0 [ 133.977715] futex_wait_queue+0xf5/0x1e0 [ 133.977727] futex_wait+0x28e/0x690 [ 133.977740] ? futex_wait_setup+0x230/0x230 [ 133.977753] ? wake_up_q+0x8b/0xf0 [ 133.977766] ? do_raw_spin_unlock+0x4f/0x220 [ 133.977786] ? futex_wake+0x158/0x490 [ 133.977802] ? fd_install+0x1f9/0x640 [ 133.977818] do_futex+0x2ff/0x380 [ 133.977829] ? __ia32_compat_sys_get_robust_list+0x3b0/0x3b0 [ 133.977845] __x64_sys_futex+0x1c6/0x4d0 [ 133.977858] ? __x64_sys_futex_time32+0x480/0x480 [ 133.977870] ? syscall_enter_from_user_mode+0x1d/0x50 [ 133.977889] ? syscall_enter_from_user_mode+0x1d/0x50 [ 133.977909] do_syscall_64+0x3b/0x90 [ 133.977923] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 133.977940] RIP: 0033:0x7f4cc433fb19 [ 133.977950] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 133.977961] RSP: 002b:00007f4cc18b5218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 133.977972] RAX: ffffffffffffffda RBX: 00007f4cc4452f68 RCX: 00007f4cc433fb19 [ 133.977980] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f4cc4452f68 [ 133.977987] RBP: 00007f4cc4452f60 R08: 0000000000000000 R09: 0000000000000000 [ 133.977994] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4cc4452f6c [ 133.978002] R13: 00007ffc9d45274f R14: 00007f4cc18b5300 R15: 0000000000022000 [ 133.978015] [ 134.037651] WARNING: CPU: 0 PID: 3586 at kernel/events/core.c:2309 group_sched_out.part.0+0x2c7/0x460 [ 134.038365] Modules linked in: [ 134.038617] CPU: 0 PID: 3586 Comm: syz-executor.1 Not tainted 6.0.0-rc5-next-20220912 #1 [ 134.039218] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 134.040075] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 134.040486] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 134.041842] RSP: 0018:ffff88801d5478f8 EFLAGS: 00010006 [ 134.042237] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 134.042778] RDX: ffff88800feb5040 RSI: ffffffff81566027 RDI: 0000000000000005 [ 134.043313] RBP: ffff8880086605c8 R08: 0000000000000005 R09: 0000000000000001 [ 134.043862] R10: 0000000000000000 R11: ffffffff865aa01b R12: ffff88800f327c00 [ 134.044401] R13: ffff88806ce3d100 R14: ffffffff8547c660 R15: 0000000000000002 [ 134.044941] FS: 00007f4cc18b5700(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 134.045552] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 134.045995] CR2: 00007f724da76170 CR3: 000000001ba38000 CR4: 0000000000350ef0 [ 134.046534] Call Trace: [ 134.046738] [ 134.046919] ctx_sched_out+0x8f1/0xc10 [ 134.047220] __perf_event_task_sched_out+0x6d0/0x18d0 [ 134.047619] ? lock_is_held_type+0xd7/0x130 [ 134.047971] ? __perf_cgroup_move+0x160/0x160 [ 134.048326] ? set_next_entity+0x304/0x550 [ 134.048659] ? lock_is_held_type+0xd7/0x130 [ 134.048998] __schedule+0xedd/0x2470 [ 134.049288] ? io_schedule_timeout+0x150/0x150 [ 134.049638] ? futex_wait_setup+0x166/0x230 [ 134.049969] schedule+0xda/0x1b0 [ 134.050233] futex_wait_queue+0xf5/0x1e0 [ 134.050545] futex_wait+0x28e/0x690 [ 134.050833] ? futex_wait_setup+0x230/0x230 [ 134.051155] ? wake_up_q+0x8b/0xf0 [ 134.051439] ? do_raw_spin_unlock+0x4f/0x220 [ 134.051782] ? futex_wake+0x158/0x490 [ 134.052093] ? fd_install+0x1f9/0x640 [ 134.052391] do_futex+0x2ff/0x380 [ 134.052670] ? __ia32_compat_sys_get_robust_list+0x3b0/0x3b0 [ 134.053112] __x64_sys_futex+0x1c6/0x4d0 [ 134.053420] ? __x64_sys_futex_time32+0x480/0x480 [ 134.053792] ? syscall_enter_from_user_mode+0x1d/0x50 [ 134.054192] ? syscall_enter_from_user_mode+0x1d/0x50 [ 134.054598] do_syscall_64+0x3b/0x90 [ 134.054889] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 134.055285] RIP: 0033:0x7f4cc433fb19 [ 134.055570] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 134.056944] RSP: 002b:00007f4cc18b5218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 134.057511] RAX: ffffffffffffffda RBX: 00007f4cc4452f68 RCX: 00007f4cc433fb19 [ 134.058048] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f4cc4452f68 [ 134.058577] RBP: 00007f4cc4452f60 R08: 0000000000000000 R09: 0000000000000000 [ 134.059118] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4cc4452f6c [ 134.059654] R13: 00007ffc9d45274f R14: 00007f4cc18b5300 R15: 0000000000022000 [ 134.060200] [ 134.060383] irq event stamp: 608 [ 134.060640] hardirqs last enabled at (607): [] syscall_enter_from_user_mode+0x1d/0x50 [ 134.061352] hardirqs last disabled at (608): [] __schedule+0x1225/0x2470 [ 134.061974] softirqs last enabled at (0): [] copy_process+0x1dfe/0x6df0 [ 134.062590] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 134.063070] ---[ end trace 0000000000000000 ]--- 16:53:04 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000011c0)={0x1, 0x80, 0xff, 0x20, 0x3f, 0x7f, 0x0, 0x2, 0x5010, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x3e, 0x6}, 0x10000, 0x6, 0x3ec000, 0x8, 0xffffffff, 0x9, 0x4, 0x0, 0x2, 0x0, 0x7}, 0xffffffffffffffff, 0x6, r0, 0xa) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYRES64=r0, @ANYRES16=0x0, @ANYBLOB="000427bdabc5ff0000005c000180060004004e23000008002f82950e12d57ad088af20125890dfb9080000020000060004004e230000060082003c00000000000300ff0200000000000000000000000000010c000700200000000100000008000b007369700008000b0073697000060004004e23000007ffe900e90a000008000600020000000800040000007e000800040000210000355c9656f35fdeb7bb961620a0dae802be9f8b74623d42c9bd892fae0aca9f4cee9ce3e2f090f7dcdede6da696d02d3c99137bf2594599b85fa71274d6254704d7bbfdc328a68b82cd0aef0f9c79e2ff669f773f1de1675f18b4af2d804e4ca7912750e0ab515aff130f483b9cad80f41ebf4cc9caea11eae445e79c2b60717a98bc5ef854a8052b2b37acfa7277ced458f939ac2ea170d1c1a2e5760428edadf9d905a4b3f09f09881ca89f7f9096d91beffa584b8d2e7cc5102f09d8868d245590f811541c9d52eec7984fd86c"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x20040044) syz_genetlink_get_family_id$nl80211(&(0x7f0000001280), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000001240)='./file0\x00', 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') 16:53:04 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000011c0)={0x1, 0x80, 0xff, 0x20, 0x3f, 0x7f, 0x0, 0x2, 0x5010, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x3e, 0x6}, 0x10000, 0x6, 0x3ec000, 0x8, 0xffffffff, 0x9, 0x4, 0x0, 0x2, 0x0, 0x7}, 0xffffffffffffffff, 0x6, r0, 0xa) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYRES64=r0, @ANYRES16=0x0, @ANYBLOB="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"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x20040044) syz_genetlink_get_family_id$nl80211(&(0x7f0000001280), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000001240)='./file0\x00', 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') 16:53:04 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x7e, 0x0, @empty}, 0x1c) r2 = socket$inet6(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x7e, 0x0, @empty}, 0x1c) 16:53:04 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000011c0)={0x1, 0x80, 0xff, 0x20, 0x3f, 0x7f, 0x0, 0x2, 0x5010, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x3e, 0x6}, 0x10000, 0x6, 0x3ec000, 0x8, 0xffffffff, 0x9, 0x4, 0x0, 0x2, 0x0, 0x7}, 0xffffffffffffffff, 0x6, r0, 0xa) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYRES64=r0, @ANYRES16=0x0, @ANYBLOB="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"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x20040044) syz_genetlink_get_family_id$nl80211(&(0x7f0000001280), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000001240)='./file0\x00', 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') 16:53:04 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x7e, 0x0, @empty}, 0x1c) r2 = socket$inet6(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x7e, 0x0, @empty}, 0x1c) 16:53:04 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000011c0)={0x1, 0x80, 0xff, 0x20, 0x3f, 0x7f, 0x0, 0x2, 0x5010, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x3e, 0x6}, 0x10000, 0x6, 0x3ec000, 0x8, 0xffffffff, 0x9, 0x4, 0x0, 0x2, 0x0, 0x7}, 0xffffffffffffffff, 0x6, r0, 0xa) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYRES64=r0, @ANYRES16=0x0, @ANYBLOB="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"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x20040044) syz_genetlink_get_family_id$nl80211(&(0x7f0000001280), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000001240)='./file0\x00', 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') 16:53:04 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x7e, 0x0, @empty}, 0x1c) r2 = socket$inet6(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x7e, 0x0, @empty}, 0x1c) 16:53:04 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000011c0)={0x1, 0x80, 0xff, 0x20, 0x3f, 0x7f, 0x0, 0x2, 0x5010, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x3e, 0x6}, 0x10000, 0x6, 0x3ec000, 0x8, 0xffffffff, 0x9, 0x4, 0x0, 0x2, 0x0, 0x7}, 0xffffffffffffffff, 0x6, r0, 0xa) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYRES64=r0, @ANYRES16=0x0, @ANYBLOB="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"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x20040044) syz_genetlink_get_family_id$nl80211(&(0x7f0000001280), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000001240)='./file0\x00', 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') [ 135.963687] syz-executor.0: epoll_ctl support in io_uring is deprecated and will be removed in a future Linux kernel version. [ 139.644043] hrtimer: interrupt took 19046 ns 16:53:09 executing program 0: r0 = syz_io_uring_setup(0x4efe, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x5}, 0x7fff) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x5}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)}, 0x9829fe3) io_uring_enter(r0, 0x6c64, 0x0, 0x0, 0x0, 0x0) 16:53:09 executing program 2: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@multicast, @multicast, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @remote}, @redirect={0x4, 0x0, 0x0, @empty, {0x8, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @dev, @local, {[@rr={0x8}, @rr={0x7, 0x13, 0x0, [@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr, @multicast2]}, @rr={0x7, 0x27, 0x0, [@dev, @local, @private, @loopback, @empty, @remote, @empty, @loopback, @local]}]}}}}}}}, 0x0) 16:53:09 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000011c0)={0x1, 0x80, 0xff, 0x20, 0x3f, 0x7f, 0x0, 0x2, 0x5010, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x3e, 0x6}, 0x10000, 0x6, 0x3ec000, 0x8, 0xffffffff, 0x9, 0x4, 0x0, 0x2, 0x0, 0x7}, 0xffffffffffffffff, 0x6, r0, 0xa) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYRES64=r0, @ANYRES16=0x0, @ANYBLOB="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"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x20040044) syz_genetlink_get_family_id$nl80211(&(0x7f0000001280), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000001240)='./file0\x00', 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') 16:53:09 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x45534}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) vmsplice(r0, &(0x7f0000000040)=[{&(0x7f0000000100)="047aaa7b8edc7c225166ab148bfe9b97028709f17c3490d35b4a636b3c61bd0fa309a6e04a3a12b0c58d2fff35f31d8f5e69170ff4363a0af4243597605794e18714af", 0x43}], 0x1, 0x8) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) open_by_handle_at(r1, &(0x7f0000000140)=@ceph_nfs_confh={0x10, 0x2, {0x28}}, 0x600) 16:53:09 executing program 7: pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) write$P9_RWALK(r1, &(0x7f0000000080)={0x9}, 0x9) 16:53:09 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000011c0)={0x1, 0x80, 0xff, 0x20, 0x3f, 0x7f, 0x0, 0x2, 0x5010, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x3e, 0x6}, 0x10000, 0x6, 0x3ec000, 0x8, 0xffffffff, 0x9, 0x4, 0x0, 0x2, 0x0, 0x7}, 0xffffffffffffffff, 0x6, r0, 0xa) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYRES64=r0, @ANYRES16=0x0, @ANYBLOB="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"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x20040044) syz_genetlink_get_family_id$nl80211(&(0x7f0000001280), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000001240)='./file0\x00', 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') 16:53:09 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000540), 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r0, 0x2276, 0x0) 16:53:09 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000011c0)={0x1, 0x80, 0xff, 0x20, 0x3f, 0x7f, 0x0, 0x2, 0x5010, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x3e, 0x6}, 0x10000, 0x6, 0x3ec000, 0x8, 0xffffffff, 0x9, 0x4, 0x0, 0x2, 0x0, 0x7}, 0xffffffffffffffff, 0x6, r0, 0xa) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYRES64=r0, @ANYRES16=0x0, @ANYBLOB="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"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x20040044) syz_genetlink_get_family_id$nl80211(&(0x7f0000001280), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000001240)='./file0\x00', 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') 16:53:09 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000540), 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r0, 0x2276, 0x0) 16:53:09 executing program 2: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@multicast, @multicast, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @remote}, @redirect={0x4, 0x0, 0x0, @empty, {0x8, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @dev, @local, {[@rr={0x8}, @rr={0x7, 0x13, 0x0, [@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr, @multicast2]}, @rr={0x7, 0x27, 0x0, [@dev, @local, @private, @loopback, @empty, @remote, @empty, @loopback, @local]}]}}}}}}}, 0x0) 16:53:09 executing program 7: pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) write$P9_RWALK(r1, &(0x7f0000000080)={0x9}, 0x9) 16:53:09 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x45534}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) vmsplice(r0, &(0x7f0000000040)=[{&(0x7f0000000100)="047aaa7b8edc7c225166ab148bfe9b97028709f17c3490d35b4a636b3c61bd0fa309a6e04a3a12b0c58d2fff35f31d8f5e69170ff4363a0af4243597605794e18714af", 0x43}], 0x1, 0x8) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) open_by_handle_at(r1, &(0x7f0000000140)=@ceph_nfs_confh={0x10, 0x2, {0x28}}, 0x600) 16:53:09 executing program 0: r0 = syz_io_uring_setup(0x4efe, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x5}, 0x7fff) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x5}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)}, 0x9829fe3) io_uring_enter(r0, 0x6c64, 0x0, 0x0, 0x0, 0x0) 16:53:09 executing program 2: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@multicast, @multicast, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @remote}, @redirect={0x4, 0x0, 0x0, @empty, {0x8, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @dev, @local, {[@rr={0x8}, @rr={0x7, 0x13, 0x0, [@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr, @multicast2]}, @rr={0x7, 0x27, 0x0, [@dev, @local, @private, @loopback, @empty, @remote, @empty, @loopback, @local]}]}}}}}}}, 0x0) 16:53:09 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000011c0)={0x1, 0x80, 0xff, 0x20, 0x3f, 0x7f, 0x0, 0x2, 0x5010, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x3e, 0x6}, 0x10000, 0x6, 0x3ec000, 0x8, 0xffffffff, 0x9, 0x4, 0x0, 0x2, 0x0, 0x7}, 0xffffffffffffffff, 0x6, r0, 0xa) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYRES64=r0, @ANYRES16=0x0, @ANYBLOB="000427bdabc5ff0000005c000180060004004e23000008002f82950e12d57ad088af20125890dfb9080000020000060004004e230000060082003c00000000000300ff0200000000000000000000000000010c000700200000000100000008000b007369700008000b0073697000060004004e23000007ffe900e90a000008000600020000000800040000007e000800040000210000355c9656f35fdeb7bb961620a0dae802be9f8b74623d42c9bd892fae0aca9f4cee9ce3e2f090f7dcdede6da696d02d3c99137bf2594599b85fa71274d6254704d7bbfdc328a68b82cd0aef0f9c79e2ff669f773f1de1675f18b4af2d804e4ca7912750e0ab515aff130f483b9cad80f41ebf4cc9caea11eae445e79c2b60717a98bc5ef854a8052b2b37acfa7277ced458f939ac2ea170d1c1a2e5760428edadf9d905a4b3f09f09881ca89f7f9096d91beffa584b8d2e7cc5102f09d8868d245590f811541c9d52eec7984fd86c"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x20040044) syz_genetlink_get_family_id$nl80211(&(0x7f0000001280), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000001240)='./file0\x00', 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') 16:53:09 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000011c0)={0x1, 0x80, 0xff, 0x20, 0x3f, 0x7f, 0x0, 0x2, 0x5010, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x3e, 0x6}, 0x10000, 0x6, 0x3ec000, 0x8, 0xffffffff, 0x9, 0x4, 0x0, 0x2, 0x0, 0x7}, 0xffffffffffffffff, 0x6, r0, 0xa) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYRES64=r0, @ANYRES16=0x0, @ANYBLOB="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"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x20040044) syz_genetlink_get_family_id$nl80211(&(0x7f0000001280), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000001240)='./file0\x00', 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') 16:53:09 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000540), 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r0, 0x2276, 0x0) 16:53:09 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x45534}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) vmsplice(r0, &(0x7f0000000040)=[{&(0x7f0000000100)="047aaa7b8edc7c225166ab148bfe9b97028709f17c3490d35b4a636b3c61bd0fa309a6e04a3a12b0c58d2fff35f31d8f5e69170ff4363a0af4243597605794e18714af", 0x43}], 0x1, 0x8) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) open_by_handle_at(r1, &(0x7f0000000140)=@ceph_nfs_confh={0x10, 0x2, {0x28}}, 0x600) 16:53:09 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000011c0)={0x1, 0x80, 0xff, 0x20, 0x3f, 0x7f, 0x0, 0x2, 0x5010, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x3e, 0x6}, 0x10000, 0x6, 0x3ec000, 0x8, 0xffffffff, 0x9, 0x4, 0x0, 0x2, 0x0, 0x7}, 0xffffffffffffffff, 0x6, r0, 0xa) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYRES64=r0, @ANYRES16=0x0, @ANYBLOB="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"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x20040044) syz_genetlink_get_family_id$nl80211(&(0x7f0000001280), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000001240)='./file0\x00', 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') 16:53:09 executing program 7: pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) write$P9_RWALK(r1, &(0x7f0000000080)={0x9}, 0x9) 16:53:10 executing program 0: r0 = syz_io_uring_setup(0x4efe, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x5}, 0x7fff) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x5}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)}, 0x9829fe3) io_uring_enter(r0, 0x6c64, 0x0, 0x0, 0x0, 0x0) 16:53:10 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000011c0)={0x1, 0x80, 0xff, 0x20, 0x3f, 0x7f, 0x0, 0x2, 0x5010, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x3e, 0x6}, 0x10000, 0x6, 0x3ec000, 0x8, 0xffffffff, 0x9, 0x4, 0x0, 0x2, 0x0, 0x7}, 0xffffffffffffffff, 0x6, r0, 0xa) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYRES64=r0, @ANYRES16=0x0, @ANYBLOB="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"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x20040044) syz_genetlink_get_family_id$nl80211(&(0x7f0000001280), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000001240)='./file0\x00', 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') 16:53:11 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000011c0)={0x1, 0x80, 0xff, 0x20, 0x3f, 0x7f, 0x0, 0x2, 0x5010, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x3e, 0x6}, 0x10000, 0x6, 0x3ec000, 0x8, 0xffffffff, 0x9, 0x4, 0x0, 0x2, 0x0, 0x7}, 0xffffffffffffffff, 0x6, r0, 0xa) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYRES64=r0, @ANYRES16=0x0, @ANYBLOB="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"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x20040044) syz_genetlink_get_family_id$nl80211(&(0x7f0000001280), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000001240)='./file0\x00', 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') 16:53:11 executing program 1: getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, &(0x7f0000000100)) mmap$IORING_OFF_SQ_RING(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x1010, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x8004, &(0x7f00000003c0), 0x7, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000ac0), 0x40, 0x0) 16:53:11 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000011c0)={0x1, 0x80, 0xff, 0x20, 0x3f, 0x7f, 0x0, 0x2, 0x5010, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x3e, 0x6}, 0x10000, 0x6, 0x3ec000, 0x8, 0xffffffff, 0x9, 0x4, 0x0, 0x2, 0x0, 0x7}, 0xffffffffffffffff, 0x6, r0, 0xa) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYRES64=r0, @ANYRES16=0x0, @ANYBLOB="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"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x20040044) syz_genetlink_get_family_id$nl80211(&(0x7f0000001280), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000001240)='./file0\x00', 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') 16:53:11 executing program 7: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) 16:53:11 executing program 6: mknod(&(0x7f0000008d80)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1a901e, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) 16:53:11 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x82103, 0x0) 16:53:11 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000001c0)={0x0, 0x0, 0x0, 'queue0\x00'}) 16:53:11 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000270008000f801", 0x17}], 0x0, &(0x7f00000006c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xb) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) write$binfmt_aout(r0, &(0x7f0000000c40)=ANY=[], 0x820) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) [ 141.498575] loop3: detected capacity change from 0 to 264192 16:53:11 executing program 1: getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, &(0x7f0000000100)) mmap$IORING_OFF_SQ_RING(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x1010, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x8004, &(0x7f00000003c0), 0x7, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000ac0), 0x40, 0x0) 16:53:11 executing program 6: mknod(&(0x7f0000008d80)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1a901e, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) 16:53:11 executing program 7: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) 16:53:11 executing program 5: syz_emit_ethernet(0xf6, &(0x7f0000000000)={@multicast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0xc0, 0x3a, 0xff, @local, @local, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{0x19, 0x16, "f3ee2f95a1639903e0e4b3284b70b92bda2ba69452b7e345cc6763ba2e15e9eb55d9339722b99de9524fcfe8473137f0aa725dc6faf492e282acff85b837f2b736741d500720410be87b430791b02a43bc6cc9acd0cd771ca56e4643e01db2e01fa2cb667920e9e38e77e190f488807ddf8e6ceb6c792ecc1b6572f3a122476c12b237cbc531c683d1d203a3eac79406a662c617774ccaa28fc57da5c1d1af52481db6076ac2421d14aea9385d3b"}]}}}}}}, 0x0) 16:53:11 executing program 0: syz_mount_image$msdos(&(0x7f00000009c0), &(0x7f0000000a00)='.\x00', 0x900, 0x0, &(0x7f0000000d00), 0x0, &(0x7f0000000d80)) [ 141.655316] loop0: detected capacity change from 0 to 4 [ 141.660680] FAT-fs (loop0): bogus number of reserved sectors [ 141.661500] FAT-fs (loop0): Can't find a valid FAT filesystem [ 141.668277] loop0: detected capacity change from 0 to 4 [ 141.671648] FAT-fs (loop0): bogus number of reserved sectors [ 141.672527] FAT-fs (loop0): Can't find a valid FAT filesystem 16:53:11 executing program 7: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) 16:53:11 executing program 1: getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, &(0x7f0000000100)) mmap$IORING_OFF_SQ_RING(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x1010, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x8004, &(0x7f00000003c0), 0x7, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000ac0), 0x40, 0x0) 16:53:11 executing program 6: mknod(&(0x7f0000008d80)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1a901e, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) 16:53:11 executing program 5: syz_emit_ethernet(0xf6, &(0x7f0000000000)={@multicast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0xc0, 0x3a, 0xff, @local, @local, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{0x19, 0x16, "f3ee2f95a1639903e0e4b3284b70b92bda2ba69452b7e345cc6763ba2e15e9eb55d9339722b99de9524fcfe8473137f0aa725dc6faf492e282acff85b837f2b736741d500720410be87b430791b02a43bc6cc9acd0cd771ca56e4643e01db2e01fa2cb667920e9e38e77e190f488807ddf8e6ceb6c792ecc1b6572f3a122476c12b237cbc531c683d1d203a3eac79406a662c617774ccaa28fc57da5c1d1af52481db6076ac2421d14aea9385d3b"}]}}}}}}, 0x0) 16:53:11 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) 16:53:11 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000011c0)={0x1, 0x80, 0xff, 0x20, 0x3f, 0x7f, 0x0, 0x2, 0x5010, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x3e, 0x6}, 0x10000, 0x6, 0x3ec000, 0x8, 0xffffffff, 0x9, 0x4, 0x0, 0x2, 0x0, 0x7}, 0xffffffffffffffff, 0x6, r0, 0xa) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYRES64=r0, @ANYRES16=0x0, @ANYBLOB="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"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x20040044) syz_genetlink_get_family_id$nl80211(&(0x7f0000001280), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000001240)='./file0\x00', 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') 16:53:11 executing program 0: syz_emit_vhci(&(0x7f00000000c0)=@HCI_EVENT_PKT={0x4, @hci_ev_change_link_key_complete={{0x9, 0x3}, {0x0, 0xc8}}}, 0x6) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_keypress_notify={{0x3c, 0x7}, {@fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x4}}}, 0xa) 16:53:11 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000011c0)={0x1, 0x80, 0xff, 0x20, 0x3f, 0x7f, 0x0, 0x2, 0x5010, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x3e, 0x6}, 0x10000, 0x6, 0x3ec000, 0x8, 0xffffffff, 0x9, 0x4, 0x0, 0x2, 0x0, 0x7}, 0xffffffffffffffff, 0x6, r0, 0xa) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYRES64=r0, @ANYRES16=0x0, @ANYBLOB="000427bdabc5ff0000005c000180060004004e23000008002f82950e12d57ad088af20125890dfb9080000020000060004004e230000060082003c00000000000300ff0200000000000000000000000000010c000700200000000100000008000b007369700008000b0073697000060004004e23000007ffe900e90a000008000600020000000800040000007e000800040000210000355c9656f35fdeb7bb961620a0dae802be9f8b74623d42c9bd892fae0aca9f4cee9ce3e2f090f7dcdede6da696d02d3c99137bf2594599b85fa71274d6254704d7bbfdc328a68b82cd0aef0f9c79e2ff669f773f1de1675f18b4af2d804e4ca7912750e0ab515aff130f483b9cad80f41ebf4cc9caea11eae445e79c2b60717a98bc5ef854a8052b2b37acfa7277ced458f939ac2ea170d1c1a2e5760428edadf9d905a4b3f09f09881ca89f7f9096d91beffa584b8d2e7cc5102f09d8868d245590f811541c9d52eec7984fd86c"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x20040044) syz_genetlink_get_family_id$nl80211(&(0x7f0000001280), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000001240)='./file0\x00', 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') 16:53:11 executing program 1: getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, &(0x7f0000000100)) mmap$IORING_OFF_SQ_RING(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x1010, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x8004, &(0x7f00000003c0), 0x7, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000ac0), 0x40, 0x0) 16:53:11 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) 16:53:11 executing program 6: mknod(&(0x7f0000008d80)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1a901e, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) 16:53:11 executing program 0: syz_emit_vhci(&(0x7f00000000c0)=@HCI_EVENT_PKT={0x4, @hci_ev_change_link_key_complete={{0x9, 0x3}, {0x0, 0xc8}}}, 0x6) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_keypress_notify={{0x3c, 0x7}, {@fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x4}}}, 0xa) 16:53:11 executing program 7: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) 16:53:11 executing program 5: syz_emit_ethernet(0xf6, &(0x7f0000000000)={@multicast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0xc0, 0x3a, 0xff, @local, @local, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{0x19, 0x16, "f3ee2f95a1639903e0e4b3284b70b92bda2ba69452b7e345cc6763ba2e15e9eb55d9339722b99de9524fcfe8473137f0aa725dc6faf492e282acff85b837f2b736741d500720410be87b430791b02a43bc6cc9acd0cd771ca56e4643e01db2e01fa2cb667920e9e38e77e190f488807ddf8e6ceb6c792ecc1b6572f3a122476c12b237cbc531c683d1d203a3eac79406a662c617774ccaa28fc57da5c1d1af52481db6076ac2421d14aea9385d3b"}]}}}}}}, 0x0) 16:53:11 executing program 1: syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000140)='./file1\x00', 0x3, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@mpol={'mpol', 0x3d, {'bind', '', @val={0x3a, [0x2c, 0x30, 0x0]}}}}]}) 16:53:11 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) 16:53:11 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x18140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f0000000000)='/usr/sbin/cups-browsed\x00', 0x17) syz_open_dev$evdev(0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, r1, 0x0) r3 = dup3(r2, r2, 0x0) openat(r3, &(0x7f0000000180)='./file0\x00', 0x4143, 0x0) r4 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, r4, 0x0) r6 = dup3(r5, r5, 0x0) r7 = openat(r6, &(0x7f0000000180)='./file0\x00', 0x4143, 0x0) pwritev2(r7, &(0x7f0000000080)=[{&(0x7f00000001c0)='(', 0x1}], 0x1, 0x0, 0x0, 0x2) r8 = socket$inet6_udp(0xa, 0x2, 0x0) r9 = dup(r8) connect$inet6(r9, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) connect$inet6(r9, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) sendmmsg$inet6(r9, &(0x7f0000002880), 0x4000101, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000100)={'ipvlan1\x00'}) close_range(r0, 0xffffffffffffffff, 0x0) 16:53:12 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000011c0)={0x1, 0x80, 0xff, 0x20, 0x3f, 0x7f, 0x0, 0x2, 0x5010, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x3e, 0x6}, 0x10000, 0x6, 0x3ec000, 0x8, 0xffffffff, 0x9, 0x4, 0x0, 0x2, 0x0, 0x7}, 0xffffffffffffffff, 0x6, r0, 0xa) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYRES64=r0, @ANYRES16=0x0, @ANYBLOB="000427bdabc5ff0000005c000180060004004e23000008002f82950e12d57ad088af20125890dfb9080000020000060004004e230000060082003c00000000000300ff0200000000000000000000000000010c000700200000000100000008000b007369700008000b0073697000060004004e23000007ffe900e90a000008000600020000000800040000007e000800040000210000355c9656f35fdeb7bb961620a0dae802be9f8b74623d42c9bd892fae0aca9f4cee9ce3e2f090f7dcdede6da696d02d3c99137bf2594599b85fa71274d6254704d7bbfdc328a68b82cd0aef0f9c79e2ff669f773f1de1675f18b4af2d804e4ca7912750e0ab515aff130f483b9cad80f41ebf4cc9caea11eae445e79c2b60717a98bc5ef854a8052b2b37acfa7277ced458f939ac2ea170d1c1a2e5760428edadf9d905a4b3f09f09881ca89f7f9096d91beffa584b8d2e7cc5102f09d8868d245590f811541c9d52eec7984fd86c"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x20040044) syz_genetlink_get_family_id$nl80211(&(0x7f0000001280), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000001240)='./file0\x00', 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') 16:53:12 executing program 5: syz_emit_ethernet(0xf6, &(0x7f0000000000)={@multicast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0xc0, 0x3a, 0xff, @local, @local, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{0x19, 0x16, "f3ee2f95a1639903e0e4b3284b70b92bda2ba69452b7e345cc6763ba2e15e9eb55d9339722b99de9524fcfe8473137f0aa725dc6faf492e282acff85b837f2b736741d500720410be87b430791b02a43bc6cc9acd0cd771ca56e4643e01db2e01fa2cb667920e9e38e77e190f488807ddf8e6ceb6c792ecc1b6572f3a122476c12b237cbc531c683d1d203a3eac79406a662c617774ccaa28fc57da5c1d1af52481db6076ac2421d14aea9385d3b"}]}}}}}}, 0x0) 16:53:12 executing program 0: syz_emit_vhci(&(0x7f00000000c0)=@HCI_EVENT_PKT={0x4, @hci_ev_change_link_key_complete={{0x9, 0x3}, {0x0, 0xc8}}}, 0x6) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_keypress_notify={{0x3c, 0x7}, {@fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x4}}}, 0xa) 16:53:12 executing program 7: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x33f) r1 = open(&(0x7f0000000400)='./file1\x00', 0x117c80, 0x48) r2 = open_tree(r1, &(0x7f0000000480)='./file1\x00', 0x8100) mount_setattr(r2, &(0x7f00000000c0)='./file1\x00', 0x1000, &(0x7f0000000180)={0x8, 0x80, 0x1e0000}, 0x20) lseek(0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @broadcast}}}], 0x20}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x80200, 0x2) 16:53:12 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000011c0)={0x1, 0x80, 0xff, 0x20, 0x3f, 0x7f, 0x0, 0x2, 0x5010, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x3e, 0x6}, 0x10000, 0x6, 0x3ec000, 0x8, 0xffffffff, 0x9, 0x4, 0x0, 0x2, 0x0, 0x7}, 0xffffffffffffffff, 0x6, r0, 0xa) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYRES64=r0, @ANYRES16=0x0, @ANYBLOB="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"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x20040044) syz_genetlink_get_family_id$nl80211(&(0x7f0000001280), 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000001240)='./file0\x00', 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') 16:53:12 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) 16:53:12 executing program 1: syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000140)='./file1\x00', 0x3, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@mpol={'mpol', 0x3d, {'bind', '', @val={0x3a, [0x2c, 0x30, 0x0]}}}}]}) 16:53:12 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r1 = socket$nl_audit(0x10, 0x3, 0x9) dup3(r1, r0, 0x0) 16:53:12 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x18140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f0000000000)='/usr/sbin/cups-browsed\x00', 0x17) syz_open_dev$evdev(0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, r1, 0x0) r3 = dup3(r2, r2, 0x0) openat(r3, &(0x7f0000000180)='./file0\x00', 0x4143, 0x0) r4 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, r4, 0x0) r6 = dup3(r5, r5, 0x0) r7 = openat(r6, &(0x7f0000000180)='./file0\x00', 0x4143, 0x0) pwritev2(r7, &(0x7f0000000080)=[{&(0x7f00000001c0)='(', 0x1}], 0x1, 0x0, 0x0, 0x2) r8 = socket$inet6_udp(0xa, 0x2, 0x0) r9 = dup(r8) connect$inet6(r9, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) connect$inet6(r9, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) sendmmsg$inet6(r9, &(0x7f0000002880), 0x4000101, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000100)={'ipvlan1\x00'}) close_range(r0, 0xffffffffffffffff, 0x0) 16:53:12 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r1 = socket$nl_audit(0x10, 0x3, 0x9) dup3(r1, r0, 0x0) 16:53:12 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x18140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f0000000000)='/usr/sbin/cups-browsed\x00', 0x17) syz_open_dev$evdev(0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, r1, 0x0) r3 = dup3(r2, r2, 0x0) openat(r3, &(0x7f0000000180)='./file0\x00', 0x4143, 0x0) r4 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, r4, 0x0) r6 = dup3(r5, r5, 0x0) r7 = openat(r6, &(0x7f0000000180)='./file0\x00', 0x4143, 0x0) pwritev2(r7, &(0x7f0000000080)=[{&(0x7f00000001c0)='(', 0x1}], 0x1, 0x0, 0x0, 0x2) r8 = socket$inet6_udp(0xa, 0x2, 0x0) r9 = dup(r8) connect$inet6(r9, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) connect$inet6(r9, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) sendmmsg$inet6(r9, &(0x7f0000002880), 0x4000101, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000100)={'ipvlan1\x00'}) close_range(r0, 0xffffffffffffffff, 0x0) 16:53:12 executing program 0: syz_emit_vhci(&(0x7f00000000c0)=@HCI_EVENT_PKT={0x4, @hci_ev_change_link_key_complete={{0x9, 0x3}, {0x0, 0xc8}}}, 0x6) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_keypress_notify={{0x3c, 0x7}, {@fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x4}}}, 0xa) 16:53:12 executing program 1: syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000140)='./file1\x00', 0x3, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@mpol={'mpol', 0x3d, {'bind', '', @val={0x3a, [0x2c, 0x30, 0x0]}}}}]}) [ 142.972676] syz-executor.3 (4118) used greatest stack depth: 24152 bytes left 16:53:12 executing program 1: syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000140)='./file1\x00', 0x3, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@mpol={'mpol', 0x3d, {'bind', '', @val={0x3a, [0x2c, 0x30, 0x0]}}}}]}) 16:53:12 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r1 = socket$nl_audit(0x10, 0x3, 0x9) dup3(r1, r0, 0x0) 16:53:12 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x18140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f0000000000)='/usr/sbin/cups-browsed\x00', 0x17) syz_open_dev$evdev(0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, r1, 0x0) r3 = dup3(r2, r2, 0x0) openat(r3, &(0x7f0000000180)='./file0\x00', 0x4143, 0x0) r4 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, r4, 0x0) r6 = dup3(r5, r5, 0x0) r7 = openat(r6, &(0x7f0000000180)='./file0\x00', 0x4143, 0x0) pwritev2(r7, &(0x7f0000000080)=[{&(0x7f00000001c0)='(', 0x1}], 0x1, 0x0, 0x0, 0x2) r8 = socket$inet6_udp(0xa, 0x2, 0x0) r9 = dup(r8) connect$inet6(r9, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) connect$inet6(r9, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) sendmmsg$inet6(r9, &(0x7f0000002880), 0x4000101, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000100)={'ipvlan1\x00'}) close_range(r0, 0xffffffffffffffff, 0x0) 16:53:12 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x33f) r1 = open(&(0x7f0000000400)='./file1\x00', 0x117c80, 0x48) r2 = open_tree(r1, &(0x7f0000000480)='./file1\x00', 0x8100) mount_setattr(r2, &(0x7f00000000c0)='./file1\x00', 0x1000, &(0x7f0000000180)={0x8, 0x80, 0x1e0000}, 0x20) lseek(0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @broadcast}}}], 0x20}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x80200, 0x2) 16:53:12 executing program 7: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x33f) r1 = open(&(0x7f0000000400)='./file1\x00', 0x117c80, 0x48) r2 = open_tree(r1, &(0x7f0000000480)='./file1\x00', 0x8100) mount_setattr(r2, &(0x7f00000000c0)='./file1\x00', 0x1000, &(0x7f0000000180)={0x8, 0x80, 0x1e0000}, 0x20) lseek(0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @broadcast}}}], 0x20}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x80200, 0x2) 16:53:12 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x33f) r1 = open(&(0x7f0000000400)='./file1\x00', 0x117c80, 0x48) r2 = open_tree(r1, &(0x7f0000000480)='./file1\x00', 0x8100) mount_setattr(r2, &(0x7f00000000c0)='./file1\x00', 0x1000, &(0x7f0000000180)={0x8, 0x80, 0x1e0000}, 0x20) lseek(0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @broadcast}}}], 0x20}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x80200, 0x2) 16:53:12 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x18140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f0000000000)='/usr/sbin/cups-browsed\x00', 0x17) syz_open_dev$evdev(0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, r1, 0x0) r3 = dup3(r2, r2, 0x0) openat(r3, &(0x7f0000000180)='./file0\x00', 0x4143, 0x0) r4 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, r4, 0x0) r6 = dup3(r5, r5, 0x0) r7 = openat(r6, &(0x7f0000000180)='./file0\x00', 0x4143, 0x0) pwritev2(r7, &(0x7f0000000080)=[{&(0x7f00000001c0)='(', 0x1}], 0x1, 0x0, 0x0, 0x2) r8 = socket$inet6_udp(0xa, 0x2, 0x0) r9 = dup(r8) connect$inet6(r9, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) connect$inet6(r9, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) sendmmsg$inet6(r9, &(0x7f0000002880), 0x4000101, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000100)={'ipvlan1\x00'}) close_range(r0, 0xffffffffffffffff, 0x0) 16:53:12 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x18140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f0000000000)='/usr/sbin/cups-browsed\x00', 0x17) syz_open_dev$evdev(0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, r1, 0x0) r3 = dup3(r2, r2, 0x0) openat(r3, &(0x7f0000000180)='./file0\x00', 0x4143, 0x0) r4 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, r4, 0x0) r6 = dup3(r5, r5, 0x0) r7 = openat(r6, &(0x7f0000000180)='./file0\x00', 0x4143, 0x0) pwritev2(r7, &(0x7f0000000080)=[{&(0x7f00000001c0)='(', 0x1}], 0x1, 0x0, 0x0, 0x2) r8 = socket$inet6_udp(0xa, 0x2, 0x0) r9 = dup(r8) connect$inet6(r9, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) connect$inet6(r9, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) sendmmsg$inet6(r9, &(0x7f0000002880), 0x4000101, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000100)={'ipvlan1\x00'}) close_range(r0, 0xffffffffffffffff, 0x0) 16:53:12 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r1 = socket$nl_audit(0x10, 0x3, 0x9) dup3(r1, r0, 0x0) 16:53:13 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x33f) r1 = open(&(0x7f0000000400)='./file1\x00', 0x117c80, 0x48) r2 = open_tree(r1, &(0x7f0000000480)='./file1\x00', 0x8100) mount_setattr(r2, &(0x7f00000000c0)='./file1\x00', 0x1000, &(0x7f0000000180)={0x8, 0x80, 0x1e0000}, 0x20) lseek(0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @broadcast}}}], 0x20}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x80200, 0x2) 16:53:13 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x33f) r1 = open(&(0x7f0000000400)='./file1\x00', 0x117c80, 0x48) r2 = open_tree(r1, &(0x7f0000000480)='./file1\x00', 0x8100) mount_setattr(r2, &(0x7f00000000c0)='./file1\x00', 0x1000, &(0x7f0000000180)={0x8, 0x80, 0x1e0000}, 0x20) lseek(0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @broadcast}}}], 0x20}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x80200, 0x2) 16:53:13 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x18140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f0000000000)='/usr/sbin/cups-browsed\x00', 0x17) syz_open_dev$evdev(0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, r1, 0x0) r3 = dup3(r2, r2, 0x0) openat(r3, &(0x7f0000000180)='./file0\x00', 0x4143, 0x0) r4 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, r4, 0x0) r6 = dup3(r5, r5, 0x0) r7 = openat(r6, &(0x7f0000000180)='./file0\x00', 0x4143, 0x0) pwritev2(r7, &(0x7f0000000080)=[{&(0x7f00000001c0)='(', 0x1}], 0x1, 0x0, 0x0, 0x2) r8 = socket$inet6_udp(0xa, 0x2, 0x0) r9 = dup(r8) connect$inet6(r9, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) connect$inet6(r9, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) sendmmsg$inet6(r9, &(0x7f0000002880), 0x4000101, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000100)={'ipvlan1\x00'}) close_range(r0, 0xffffffffffffffff, 0x0) 16:53:13 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x33f) r1 = open(&(0x7f0000000400)='./file1\x00', 0x117c80, 0x48) r2 = open_tree(r1, &(0x7f0000000480)='./file1\x00', 0x8100) mount_setattr(r2, &(0x7f00000000c0)='./file1\x00', 0x1000, &(0x7f0000000180)={0x8, 0x80, 0x1e0000}, 0x20) lseek(0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @broadcast}}}], 0x20}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x80200, 0x2) 16:53:13 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x33f) r1 = open(&(0x7f0000000400)='./file1\x00', 0x117c80, 0x48) r2 = open_tree(r1, &(0x7f0000000480)='./file1\x00', 0x8100) mount_setattr(r2, &(0x7f00000000c0)='./file1\x00', 0x1000, &(0x7f0000000180)={0x8, 0x80, 0x1e0000}, 0x20) lseek(0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @broadcast}}}], 0x20}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x80200, 0x2) 16:53:13 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x33f) r1 = open(&(0x7f0000000400)='./file1\x00', 0x117c80, 0x48) r2 = open_tree(r1, &(0x7f0000000480)='./file1\x00', 0x8100) mount_setattr(r2, &(0x7f00000000c0)='./file1\x00', 0x1000, &(0x7f0000000180)={0x8, 0x80, 0x1e0000}, 0x20) lseek(0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @broadcast}}}], 0x20}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x80200, 0x2) 16:53:13 executing program 7: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x33f) r1 = open(&(0x7f0000000400)='./file1\x00', 0x117c80, 0x48) r2 = open_tree(r1, &(0x7f0000000480)='./file1\x00', 0x8100) mount_setattr(r2, &(0x7f00000000c0)='./file1\x00', 0x1000, &(0x7f0000000180)={0x8, 0x80, 0x1e0000}, 0x20) lseek(0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @broadcast}}}], 0x20}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x80200, 0x2) 16:53:13 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4, 0x2}]}, 0x18}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x33f) r1 = open(&(0x7f0000000400)='./file1\x00', 0x117c80, 0x48) r2 = open_tree(r1, &(0x7f0000000480)='./file1\x00', 0x8100) mount_setattr(r2, &(0x7f00000000c0)='./file1\x00', 0x1000, &(0x7f0000000180)={0x8, 0x80, 0x1e0000}, 0x20) lseek(0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @broadcast}}}], 0x20}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x80200, 0x2) 16:53:13 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x18140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f0000000000)='/usr/sbin/cups-browsed\x00', 0x17) syz_open_dev$evdev(0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, r1, 0x0) r3 = dup3(r2, r2, 0x0) openat(r3, &(0x7f0000000180)='./file0\x00', 0x4143, 0x0) r4 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, r4, 0x0) r6 = dup3(r5, r5, 0x0) r7 = openat(r6, &(0x7f0000000180)='./file0\x00', 0x4143, 0x0) pwritev2(r7, &(0x7f0000000080)=[{&(0x7f00000001c0)='(', 0x1}], 0x1, 0x0, 0x0, 0x2) r8 = socket$inet6_udp(0xa, 0x2, 0x0) r9 = dup(r8) connect$inet6(r9, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) connect$inet6(r9, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) sendmmsg$inet6(r9, &(0x7f0000002880), 0x4000101, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000100)={'ipvlan1\x00'}) close_range(r0, 0xffffffffffffffff, 0x0) VM DIAGNOSIS: 16:53:04 Registers: info registers vcpu 0 RAX=0000000000000000 RBX=00000000000003f9 RCX=0000000000000000 RDX=00000000000003f9 RSI=ffffffff822b1e41 RDI=ffffffff8763fae0 RBP=ffffffff8763faa0 RSP=ffff88801d547328 R8 =0000000000000005 R9 =0000000000000000 R10=0000000000000000 R11=0000000000000001 R12=0000000000000000 R13=ffffffff8763faa0 R14=ffffffff8763faf0 R15=ffffffff8763fd48 RIP=ffffffff822b1e99 RFL=00000006 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f4cc18b5700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f724da76170 CR3=000000001ba38000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 00007f4cc44267c0 00007f4cc44267c8 YMM02=0000000000000000 0000000000000000 00007f4cc44267e0 00007f4cc44267c0 YMM03=0000000000000000 0000000000000000 00007f4cc44267c8 00007f4cc44267c0 YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffff00000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=0000000000000000 RBX=ffff88806ce3eda0 RCX=0000000000000000 RDX=ffff88800feb3580 RSI=ffffffff813bccdb RDI=0000000000000005 RBP=0000000000000003 RSP=ffff888041dd7960 R8 =0000000000000005 R9 =0000000000000000 R10=0000000000000001 R11=0000000000000001 R12=ffffed100d9c7db5 R13=ffff88806ce3eda8 R14=0000000000000001 R15=dffffc0000000000 RIP=ffffffff813bccdd RFL=00000293 [--S-A-C] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0000 0000000000000000 00000000 00000000 DS =0000 0000000000000000 00000000 00000000 FS =0000 0000555555bfe400 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f4cc444f0a0 CR3=000000001ba38000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 00007f4cc44267c0 00007f4cc44267c8 YMM02=0000000000000000 0000000000000000 00007f4cc44267e0 00007f4cc44267c0 YMM03=0000000000000000 0000000000000000 00007f4cc44267c8 00007f4cc44267c0 YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffff00000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000