Warning: Permanently added '[localhost]:12102' (ECDSA) to the list of known hosts. 2022/09/21 13:13:39 fuzzer started 2022/09/21 13:13:39 dialing manager at localhost:40289 syzkaller login: [ 41.130092] cgroup: Unknown subsys name 'net' [ 41.204502] cgroup: Unknown subsys name 'rlimit' 2022/09/21 13:13:54 syscalls: 2215 2022/09/21 13:13:54 code coverage: enabled 2022/09/21 13:13:54 comparison tracing: enabled 2022/09/21 13:13:54 extra coverage: enabled 2022/09/21 13:13:54 setuid sandbox: enabled 2022/09/21 13:13:54 namespace sandbox: enabled 2022/09/21 13:13:54 Android sandbox: enabled 2022/09/21 13:13:54 fault injection: enabled 2022/09/21 13:13:54 leak checking: enabled 2022/09/21 13:13:54 net packet injection: enabled 2022/09/21 13:13:54 net device setup: enabled 2022/09/21 13:13:54 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/09/21 13:13:54 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/09/21 13:13:54 USB emulation: enabled 2022/09/21 13:13:54 hci packet injection: enabled 2022/09/21 13:13:54 wifi device emulation: failed to parse kernel version (6.0.0-rc6-next-20220921) 2022/09/21 13:13:54 802.15.4 emulation: enabled 2022/09/21 13:13:55 fetching corpus: 0, signal 0/2000 (executing program) 2022/09/21 13:13:55 fetching corpus: 28, signal 17179/20701 (executing program) 2022/09/21 13:13:55 fetching corpus: 78, signal 31233/35939 (executing program) 2022/09/21 13:13:55 fetching corpus: 128, signal 42606/48287 (executing program) 2022/09/21 13:13:55 fetching corpus: 178, signal 50484/57101 (executing program) 2022/09/21 13:13:55 fetching corpus: 228, signal 61586/68608 (executing program) 2022/09/21 13:13:55 fetching corpus: 278, signal 67127/74830 (executing program) 2022/09/21 13:13:55 fetching corpus: 328, signal 70761/79190 (executing program) 2022/09/21 13:13:55 fetching corpus: 378, signal 75485/84375 (executing program) 2022/09/21 13:13:56 fetching corpus: 428, signal 81026/90130 (executing program) 2022/09/21 13:13:56 fetching corpus: 478, signal 83690/93301 (executing program) 2022/09/21 13:13:56 fetching corpus: 528, signal 86865/96916 (executing program) 2022/09/21 13:13:56 fetching corpus: 578, signal 90499/100845 (executing program) 2022/09/21 13:13:56 fetching corpus: 628, signal 93256/103815 (executing program) 2022/09/21 13:13:56 fetching corpus: 678, signal 96416/107114 (executing program) 2022/09/21 13:13:57 fetching corpus: 728, signal 100249/110867 (executing program) 2022/09/21 13:13:57 fetching corpus: 778, signal 102706/113412 (executing program) 2022/09/21 13:13:57 fetching corpus: 828, signal 104809/115639 (executing program) 2022/09/21 13:13:57 fetching corpus: 878, signal 106736/117670 (executing program) 2022/09/21 13:13:57 fetching corpus: 928, signal 108611/119682 (executing program) 2022/09/21 13:13:57 fetching corpus: 978, signal 110399/121526 (executing program) 2022/09/21 13:13:58 fetching corpus: 1028, signal 112367/123587 (executing program) 2022/09/21 13:13:58 fetching corpus: 1078, signal 114616/125687 (executing program) 2022/09/21 13:13:58 fetching corpus: 1128, signal 116963/127736 (executing program) 2022/09/21 13:13:58 fetching corpus: 1178, signal 118278/129089 (executing program) 2022/09/21 13:13:58 fetching corpus: 1228, signal 119829/130581 (executing program) 2022/09/21 13:13:58 fetching corpus: 1278, signal 121430/131943 (executing program) 2022/09/21 13:13:58 fetching corpus: 1328, signal 122590/133071 (executing program) 2022/09/21 13:13:58 fetching corpus: 1378, signal 124958/134905 (executing program) 2022/09/21 13:13:58 fetching corpus: 1428, signal 126215/135999 (executing program) 2022/09/21 13:13:59 fetching corpus: 1478, signal 127904/137447 (executing program) 2022/09/21 13:13:59 fetching corpus: 1528, signal 130462/139473 (executing program) 2022/09/21 13:13:59 fetching corpus: 1578, signal 132029/140718 (executing program) 2022/09/21 13:13:59 fetching corpus: 1628, signal 133781/142087 (executing program) 2022/09/21 13:13:59 fetching corpus: 1678, signal 134785/142967 (executing program) 2022/09/21 13:13:59 fetching corpus: 1728, signal 135738/143691 (executing program) 2022/09/21 13:13:59 fetching corpus: 1778, signal 137721/145016 (executing program) 2022/09/21 13:14:00 fetching corpus: 1828, signal 138980/145850 (executing program) 2022/09/21 13:14:00 fetching corpus: 1878, signal 140532/146749 (executing program) 2022/09/21 13:14:00 fetching corpus: 1928, signal 142119/147639 (executing program) 2022/09/21 13:14:00 fetching corpus: 1978, signal 142874/148131 (executing program) 2022/09/21 13:14:00 fetching corpus: 2028, signal 143794/148675 (executing program) 2022/09/21 13:14:00 fetching corpus: 2078, signal 144951/149228 (executing program) 2022/09/21 13:14:00 fetching corpus: 2128, signal 146519/150001 (executing program) 2022/09/21 13:14:00 fetching corpus: 2178, signal 147487/150464 (executing program) 2022/09/21 13:14:01 fetching corpus: 2195, signal 148406/150974 (executing program) 2022/09/21 13:14:01 fetching corpus: 2195, signal 148406/151024 (executing program) 2022/09/21 13:14:01 fetching corpus: 2195, signal 148406/151072 (executing program) 2022/09/21 13:14:01 fetching corpus: 2195, signal 148406/151131 (executing program) 2022/09/21 13:14:01 fetching corpus: 2195, signal 148406/151188 (executing program) 2022/09/21 13:14:01 fetching corpus: 2195, signal 148406/151241 (executing program) 2022/09/21 13:14:01 fetching corpus: 2195, signal 148406/151288 (executing program) 2022/09/21 13:14:01 fetching corpus: 2195, signal 148406/151350 (executing program) 2022/09/21 13:14:01 fetching corpus: 2195, signal 148406/151405 (executing program) 2022/09/21 13:14:01 fetching corpus: 2195, signal 148406/151458 (executing program) 2022/09/21 13:14:01 fetching corpus: 2195, signal 148406/151517 (executing program) 2022/09/21 13:14:01 fetching corpus: 2195, signal 148406/151578 (executing program) 2022/09/21 13:14:01 fetching corpus: 2195, signal 148406/151615 (executing program) 2022/09/21 13:14:01 fetching corpus: 2195, signal 148406/151674 (executing program) 2022/09/21 13:14:01 fetching corpus: 2195, signal 148406/151735 (executing program) 2022/09/21 13:14:01 fetching corpus: 2195, signal 148406/151786 (executing program) 2022/09/21 13:14:01 fetching corpus: 2195, signal 148406/151841 (executing program) 2022/09/21 13:14:01 fetching corpus: 2195, signal 148406/151885 (executing program) 2022/09/21 13:14:01 fetching corpus: 2195, signal 148406/151933 (executing program) 2022/09/21 13:14:01 fetching corpus: 2195, signal 148406/151980 (executing program) 2022/09/21 13:14:01 fetching corpus: 2195, signal 148406/152041 (executing program) 2022/09/21 13:14:01 fetching corpus: 2195, signal 148406/152083 (executing program) 2022/09/21 13:14:01 fetching corpus: 2195, signal 148406/152128 (executing program) 2022/09/21 13:14:01 fetching corpus: 2195, signal 148406/152191 (executing program) 2022/09/21 13:14:01 fetching corpus: 2195, signal 148406/152244 (executing program) 2022/09/21 13:14:01 fetching corpus: 2195, signal 148406/152302 (executing program) 2022/09/21 13:14:01 fetching corpus: 2195, signal 148406/152327 (executing program) 2022/09/21 13:14:01 fetching corpus: 2195, signal 148406/152327 (executing program) 2022/09/21 13:14:03 starting 8 fuzzer processes 13:14:03 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) 13:14:03 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x2e, &(0x7f0000000200)={0x77359400}, 0x10) 13:14:03 executing program 2: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x47f, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x29}}}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000040)={0x24, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x22, 0x371, {0x9}}}, &(0x7f0000000080)={0xffffffffffffffeb, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_open_dev$hiddev(&(0x7f00000000c0), 0x0, 0x0) 13:14:03 executing program 3: r0 = fork() r1 = getpgrp(r0) process_vm_writev(r1, &(0x7f0000000500)=[{0x0}, {&(0x7f0000000080)=""/168, 0xa8}, {&(0x7f0000000140)=""/229, 0xe5}, {&(0x7f0000000240)=""/245, 0xf5}, {&(0x7f0000000340)=""/180, 0xb4}, {&(0x7f0000000400)=""/42, 0x2a}, {&(0x7f0000000440)=""/132, 0x84}], 0x7, &(0x7f0000000580), 0x0, 0x0) clone3(&(0x7f0000000780)={0x800, &(0x7f00000005c0), &(0x7f0000000600)=0x0, &(0x7f0000000640), {0x1b}, &(0x7f0000000680)=""/70, 0x46, &(0x7f0000000700)=""/36, &(0x7f0000000740)=[r1], 0x1}, 0x58) process_vm_writev(r2, &(0x7f0000001840)=[{&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000001800)=""/12, 0xc}], 0x2, &(0x7f0000001c80)=[{&(0x7f0000001880)=""/143, 0x8f}, {&(0x7f0000001940)=""/139, 0x8b}, {&(0x7f0000001a00)=""/125, 0x7d}, {&(0x7f0000001a80)=""/248, 0xf8}, {&(0x7f0000001b80)=""/253, 0xfd}], 0x5, 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f0000001d00), 0x650040, 0x0) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001e00), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_GET(0xffffffffffffffff, &(0x7f0000001f00)={&(0x7f0000001dc0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001ec0)={&(0x7f0000001e40)={0x4c, r3, 0x20, 0x70bd2c, 0x25dfdbfe, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x4c}}, 0x0) process_vm_writev(r1, &(0x7f0000002480)=[{&(0x7f00000022c0)=""/136, 0x88}, {&(0x7f0000002380)=""/194, 0xc2}], 0x2, &(0x7f0000003600)=[{&(0x7f00000024c0)=""/112, 0x70}, {&(0x7f0000002540)=""/4096, 0x1000}, {&(0x7f0000003540)=""/132, 0x84}], 0x3, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000003780), 0xffffffffffffffff) io_uring_setup(0x4805, &(0x7f00000037c0)={0x0, 0x9447, 0x2, 0x1, 0xcd}) 13:14:03 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, r0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) dup3(r1, r1, 0x0) syz_mount_image$ext4(&(0x7f0000000380)='ext4\x00', &(0x7f00000003c0)='./file0\x00', 0x725a, 0x5, &(0x7f0000000800)=[{&(0x7f0000000400)="ed049a1c43a8ff23bc73c75ae201f2c4d383bc59d765f36a82ac9ecccabd07cb9b25c5ff0c65d06934b9ade45b63866336f31181e786a40a8677b523d3025a18236f3224475404e0a1526277eb57346bd27a5c050ee9f899bcf85cf2aff152d2d2ada189d2bf7f13f3b4eeea5bcc7408f0fec1cce481a80632e4832d94b90deadbf792fb554bc0cf7650731482", 0x8d, 0x9}, {&(0x7f00000004c0)="88eadeec3ca0756880519382257f87a8c864b0b961ca91350b901a302e8cd51e097cd05acebe14d4269efac244a3a82d281d6110c008cf6925d40a0567bb969d2b24923ae4457c74ee4d3596520cc9d69f5f65c7ea79818f0423d631ff1e549c590a84118d8f8b71da1754e4782fa18277d439877af8643404c062505a705640db009479f11708f9b36fcb5ce8c8da7bc24f3c2e192a384be267db8202acb1f7820658c352dc82b01867195a8c11906475a7633ffab8f4cbe7c2a45089aec43872a8b3a6d74be6fc0e487aa2c223", 0xce, 0x8}, {&(0x7f0000000600)="8cb223a632a8f4b64ca4aacc5ff64d56ac83a6b02a653ca1c9e4067e84dc7a99ad187d4ba2211cf9ef7cd889ddd8c97a0c6c4c3eba807ad30ad764402856a63d6b5df17394c4c09b71581ef68e1e85f3a7878b8e4bd4396148351bcaf0ef1bf94c7c4766e9abb72d9c508e88dffa644d23916404e5404c0043736a4f728f4569593ab8c5a3dc2d677ccc5648edc77afdab1596c326c6ae303f9cd03dc217dca1058f32252e26fa5c7a21", 0xaa, 0x2}, {&(0x7f00000006c0)="a82e86b2ca2a8591e2e8f3ca833c828d8fa13b5d403bbb49939c6534f1c1d74bbf0ce6af16fb049cff16e46fb3115e058052fd082ec40a628d6b8605f6516c17900b158b4f925524ca08e072cb701a9fa6c8fd000d4d257e7c54acd1bb0e2e49587de1adfd441a7c4bb1109dc82b070390df0a378d9b2fb24bcc8c238f63f24ed0eb80a6bb458b2b13c42d8ebd7a1cdc8358a4722653f42f0fe64d39c2139f9a5e0de2c566976e3cfb2bdd76a21139e291e3570254c5382314199c73f621007c79110174d386aebf98a5", 0xca, 0x8}, {&(0x7f00000007c0)="13bdc9c558e60f11fc552e5fcbe6dfc2ba0a582601adef2595baf8a728458ee02126de56f53a055ea64c0e1de69ab6dab6d11ff16a9d05", 0x37, 0x8cf}], 0x8010, &(0x7f0000000880)={[{@jqfmt_vfsv0}, {@auto_da_alloc}, {}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x2}}, {@bsdgroups}, {@jqfmt_vfsv0}, {@sb={'sb', 0x3d, 0x6}}, {@nomblk_io_submit}, {@grpquota}], [{@euid_gt}, {@euid_gt}]}) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000002880), 0x4000101, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) pwrite64(r1, &(0x7f0000000300)="89959bbf6b41fbdbb8d3b2476ab22e75f43c50b58ef7d02ac08c714d671536c09c143421a3d8fe3f7e7ba0680d57907800a7b3540ea57701f2910b72af44b050b0c952ad09c834367192b2ee83a8099b789942a9d16f5e60cbc2e971a185a83295d49a", 0x63, 0x3) [ 64.726915] audit: type=1400 audit(1663766043.514:6): avc: denied { execmem } for pid=289 comm="syz-executor.2" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 13:14:03 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0003}]}) shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) mlock(&(0x7f0000ffd000/0x1000)=nil, 0x1000) 13:14:03 executing program 6: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, 0x0, 0x0) 13:14:03 executing program 7: r0 = eventfd2(0x0, 0x801) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="c5d591842dc721cf", 0x8}, {&(0x7f00000000c0)="93ee52744d7239b5", 0x8}], 0x2) [ 65.947029] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 65.949738] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 65.951458] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 65.955224] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 65.957973] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 65.959767] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 65.964446] Bluetooth: hci0: HCI_REQ-0x0c1a [ 66.020738] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 66.022389] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 66.026422] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 66.029199] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 66.031355] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 66.032795] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 66.043759] Bluetooth: hci1: HCI_REQ-0x0c1a [ 66.079584] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 66.082177] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 66.083996] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 66.085862] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 66.088522] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 66.090413] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 66.092125] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 66.093354] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 66.094326] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 66.096402] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 66.098731] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 66.100746] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 66.100920] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 66.104931] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 66.105159] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 66.107288] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 66.107459] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 66.108972] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 66.111017] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 66.114597] Bluetooth: hci6: HCI_REQ-0x0c1a [ 66.121775] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 66.123882] Bluetooth: hci4: HCI_REQ-0x0c1a [ 66.128290] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 66.145263] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 66.147487] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 66.150129] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 66.151376] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 66.153263] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 66.154702] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 66.156524] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 66.158817] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 66.163271] Bluetooth: hci2: HCI_REQ-0x0c1a [ 66.166821] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 66.179695] Bluetooth: hci3: HCI_REQ-0x0c1a [ 66.239797] Bluetooth: hci5: HCI_REQ-0x0c1a [ 66.330665] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 66.336909] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 66.338965] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 66.359060] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 66.367867] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 66.388250] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 66.426160] Bluetooth: hci7: HCI_REQ-0x0c1a [ 68.021128] Bluetooth: hci0: command 0x0409 tx timeout [ 68.084701] Bluetooth: hci1: command 0x0409 tx timeout [ 68.147725] Bluetooth: hci4: command 0x0409 tx timeout [ 68.149073] Bluetooth: hci6: command 0x0409 tx timeout [ 68.211749] Bluetooth: hci2: command 0x0409 tx timeout [ 68.276014] Bluetooth: hci3: command 0x0409 tx timeout [ 68.277174] Bluetooth: hci5: command 0x0409 tx timeout [ 68.532809] Bluetooth: hci7: command 0x0409 tx timeout [ 70.068675] Bluetooth: hci0: command 0x041b tx timeout [ 70.131671] Bluetooth: hci1: command 0x041b tx timeout [ 70.196735] Bluetooth: hci6: command 0x041b tx timeout [ 70.197177] Bluetooth: hci4: command 0x041b tx timeout [ 70.259685] Bluetooth: hci2: command 0x041b tx timeout [ 70.323713] Bluetooth: hci5: command 0x041b tx timeout [ 70.324149] Bluetooth: hci3: command 0x041b tx timeout [ 70.580719] Bluetooth: hci7: command 0x041b tx timeout [ 72.116693] Bluetooth: hci0: command 0x040f tx timeout [ 72.179734] Bluetooth: hci1: command 0x040f tx timeout [ 72.244689] Bluetooth: hci4: command 0x040f tx timeout [ 72.245153] Bluetooth: hci6: command 0x040f tx timeout [ 72.308670] Bluetooth: hci2: command 0x040f tx timeout [ 72.371729] Bluetooth: hci3: command 0x040f tx timeout [ 72.372206] Bluetooth: hci5: command 0x040f tx timeout [ 72.627697] Bluetooth: hci7: command 0x040f tx timeout [ 74.163665] Bluetooth: hci0: command 0x0419 tx timeout [ 74.227680] Bluetooth: hci1: command 0x0419 tx timeout [ 74.292680] Bluetooth: hci6: command 0x0419 tx timeout [ 74.293109] Bluetooth: hci4: command 0x0419 tx timeout [ 74.356707] Bluetooth: hci2: command 0x0419 tx timeout [ 74.419683] Bluetooth: hci5: command 0x0419 tx timeout [ 74.420116] Bluetooth: hci3: command 0x0419 tx timeout [ 74.675862] Bluetooth: hci7: command 0x0419 tx timeout 13:14:58 executing program 6: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, 0x0, 0x0) 13:14:58 executing program 6: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, 0x0, 0x0) 13:14:58 executing program 6: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, 0x0, 0x0) 13:14:58 executing program 6: r0 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000140)=""/131, 0x83) [ 119.764052] audit: type=1400 audit(1663766098.550:7): avc: denied { open } for pid=3760 comm="syz-executor.6" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 119.766383] audit: type=1400 audit(1663766098.550:8): avc: denied { kernel } for pid=3760 comm="syz-executor.6" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 119.806789] ------------[ cut here ]------------ [ 119.806830] [ 119.806836] ====================================================== [ 119.806843] WARNING: possible circular locking dependency detected [ 119.806851] 6.0.0-rc6-next-20220921 #1 Not tainted [ 119.806866] ------------------------------------------------------ [ 119.806873] syz-executor.6/3763 is trying to acquire lock: [ 119.806887] ffffffff853faab8 ((console_sem).lock){....}-{2:2}, at: down_trylock+0xe/0x70 [ 119.806965] [ 119.806965] but task is already holding lock: [ 119.806971] ffff88801f2d3420 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 119.807034] [ 119.807034] which lock already depends on the new lock. [ 119.807034] [ 119.807041] [ 119.807041] the existing dependency chain (in reverse order) is: [ 119.807048] [ 119.807048] -> #3 (&ctx->lock){....}-{2:2}: [ 119.807080] _raw_spin_lock+0x2a/0x40 [ 119.807123] __perf_event_task_sched_out+0x53b/0x18d0 [ 119.807153] __schedule+0xedd/0x2470 [ 119.807183] preempt_schedule_common+0x45/0xc0 [ 119.807216] __cond_resched+0x17/0x30 [ 119.807247] __mutex_lock+0xa3/0x14d0 [ 119.807280] __do_sys_perf_event_open+0x1eec/0x32c0 [ 119.807311] do_syscall_64+0x3b/0x90 [ 119.807349] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 119.807376] [ 119.807376] -> #2 (&rq->__lock){-.-.}-{2:2}: [ 119.807408] _raw_spin_lock_nested+0x30/0x40 [ 119.807451] raw_spin_rq_lock_nested+0x1e/0x30 [ 119.807480] task_fork_fair+0x63/0x4d0 [ 119.807521] sched_cgroup_fork+0x3d0/0x540 [ 119.807554] copy_process+0x4183/0x6e20 [ 119.807577] kernel_clone+0xe7/0x890 [ 119.807599] user_mode_thread+0xad/0xf0 [ 119.807623] rest_init+0x24/0x250 [ 119.807648] arch_call_rest_init+0xf/0x14 [ 119.807686] start_kernel+0x4c1/0x4e6 [ 119.807732] secondary_startup_64_no_verify+0xe0/0xeb [ 119.807765] [ 119.807765] -> #1 (&p->pi_lock){-.-.}-{2:2}: [ 119.807797] _raw_spin_lock_irqsave+0x39/0x60 [ 119.807841] try_to_wake_up+0xab/0x1930 [ 119.807873] up+0x75/0xb0 [ 119.807904] __up_console_sem+0x6e/0x80 [ 119.807942] console_unlock+0x46a/0x590 [ 119.807981] vt_ioctl+0x2822/0x2ca0 [ 119.808010] tty_ioctl+0x7c4/0x1700 [ 119.808036] __x64_sys_ioctl+0x19a/0x210 [ 119.808071] do_syscall_64+0x3b/0x90 [ 119.808109] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 119.808136] [ 119.808136] -> #0 ((console_sem).lock){....}-{2:2}: [ 119.808168] __lock_acquire+0x2a02/0x5e70 [ 119.808208] lock_acquire+0x1a2/0x530 [ 119.808246] _raw_spin_lock_irqsave+0x39/0x60 [ 119.808290] down_trylock+0xe/0x70 [ 119.808324] __down_trylock_console_sem+0x3b/0xd0 [ 119.808363] vprintk_emit+0x16b/0x560 [ 119.808402] vprintk+0x84/0xa0 [ 119.808442] _printk+0xba/0xf1 [ 119.808465] report_bug.cold+0x72/0xab [ 119.808502] handle_bug+0x3c/0x70 [ 119.808540] exc_invalid_op+0x14/0x50 [ 119.808579] asm_exc_invalid_op+0x16/0x20 [ 119.808604] group_sched_out.part.0+0x2c7/0x460 [ 119.808629] ctx_sched_out+0x8f1/0xc10 [ 119.808652] __perf_event_task_sched_out+0x6d0/0x18d0 [ 119.808681] __schedule+0xedd/0x2470 [ 119.808711] preempt_schedule_common+0x45/0xc0 [ 119.808744] __cond_resched+0x17/0x30 [ 119.808774] __mutex_lock+0xa3/0x14d0 [ 119.808808] __do_sys_perf_event_open+0x1eec/0x32c0 [ 119.808838] do_syscall_64+0x3b/0x90 [ 119.808877] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 119.808903] [ 119.808903] other info that might help us debug this: [ 119.808903] [ 119.808909] Chain exists of: [ 119.808909] (console_sem).lock --> &rq->__lock --> &ctx->lock [ 119.808909] [ 119.808944] Possible unsafe locking scenario: [ 119.808944] [ 119.808949] CPU0 CPU1 [ 119.808954] ---- ---- [ 119.808960] lock(&ctx->lock); [ 119.808973] lock(&rq->__lock); [ 119.808988] lock(&ctx->lock); [ 119.809002] lock((console_sem).lock); [ 119.809016] [ 119.809016] *** DEADLOCK *** [ 119.809016] [ 119.809020] 2 locks held by syz-executor.6/3763: [ 119.809036] #0: ffff88806ce37d18 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x1cf/0x2470 [ 119.809103] #1: ffff88801f2d3420 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 119.809168] [ 119.809168] stack backtrace: [ 119.809174] CPU: 0 PID: 3763 Comm: syz-executor.6 Not tainted 6.0.0-rc6-next-20220921 #1 [ 119.809203] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 119.809220] Call Trace: [ 119.809226] [ 119.809235] dump_stack_lvl+0x8b/0xb3 [ 119.809277] check_noncircular+0x263/0x2e0 [ 119.809317] ? format_decode+0x26c/0xb50 [ 119.809353] ? print_circular_bug+0x450/0x450 [ 119.809394] ? enable_ptr_key_workfn+0x20/0x20 [ 119.809431] ? lock_release+0x547/0x750 [ 119.809471] ? format_decode+0x26c/0xb50 [ 119.809510] ? alloc_chain_hlocks+0x1ec/0x5a0 [ 119.809555] __lock_acquire+0x2a02/0x5e70 [ 119.809608] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 119.809662] lock_acquire+0x1a2/0x530 [ 119.809703] ? down_trylock+0xe/0x70 [ 119.809742] ? lock_release+0x750/0x750 [ 119.809791] ? vprintk+0x84/0xa0 [ 119.809835] _raw_spin_lock_irqsave+0x39/0x60 [ 119.809880] ? down_trylock+0xe/0x70 [ 119.809916] down_trylock+0xe/0x70 [ 119.809952] ? vprintk+0x84/0xa0 [ 119.809993] __down_trylock_console_sem+0x3b/0xd0 [ 119.810067] vprintk_emit+0x16b/0x560 [ 119.810114] vprintk+0x84/0xa0 [ 119.810156] _printk+0xba/0xf1 [ 119.810181] ? record_print_text.cold+0x16/0x16 [ 119.810214] ? perf_event_update_userpage+0x4e8/0x7c0 [ 119.810245] ? report_bug.cold+0x66/0xab [ 119.810286] ? group_sched_out.part.0+0x2c7/0x460 [ 119.810313] report_bug.cold+0x72/0xab [ 119.810356] handle_bug+0x3c/0x70 [ 119.810396] exc_invalid_op+0x14/0x50 [ 119.810438] asm_exc_invalid_op+0x16/0x20 [ 119.810465] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 119.810496] Code: 5e 41 5f e9 9b b9 ef ff e8 96 b9 ef ff 65 8b 1d 2b 12 ac 7e 31 ff 89 de e8 36 b6 ef ff 85 db 0f 84 8a 00 00 00 e8 79 b9 ef ff <0f> 0b e9 a5 fe ff ff e8 6d b9 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 119.810522] RSP: 0018:ffff88803e5ff978 EFLAGS: 00010006 [ 119.810543] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 119.810561] RDX: ffff88801da39ac0 RSI: ffffffff815663a7 RDI: 0000000000000005 [ 119.810579] RBP: ffff888008668000 R08: 0000000000000005 R09: 0000000000000001 [ 119.810596] R10: 0000000000000000 R11: 0000000000000001 R12: ffff88801f2d3400 [ 119.810613] R13: ffff88806ce3f000 R14: ffffffff85238040 R15: 0000000000000002 [ 119.810639] ? group_sched_out.part.0+0x2c7/0x460 [ 119.810670] ? group_sched_out.part.0+0x2c7/0x460 [ 119.810700] ctx_sched_out+0x8f1/0xc10 [ 119.810730] __perf_event_task_sched_out+0x6d0/0x18d0 [ 119.810767] ? lock_is_held_type+0xd7/0x130 [ 119.810796] ? __perf_cgroup_move+0x160/0x160 [ 119.810825] ? set_next_entity+0x304/0x550 [ 119.810868] ? update_curr+0x267/0x740 [ 119.810913] ? lock_is_held_type+0xd7/0x130 [ 119.810943] __schedule+0xedd/0x2470 [ 119.810981] ? io_schedule_timeout+0x150/0x150 [ 119.811015] ? find_held_lock+0x2c/0x110 [ 119.811054] ? lock_is_held_type+0xd7/0x130 [ 119.811082] ? __cond_resched+0x17/0x30 [ 119.811117] preempt_schedule_common+0x45/0xc0 [ 119.811154] __cond_resched+0x17/0x30 [ 119.811186] __mutex_lock+0xa3/0x14d0 [ 119.811224] ? lock_is_held_type+0xd7/0x130 [ 119.811251] ? __do_sys_perf_event_open+0x1eec/0x32c0 [ 119.811287] ? mutex_lock_io_nested+0x1310/0x1310 [ 119.811324] ? lock_release+0x3b2/0x750 [ 119.811367] ? __up_read+0x192/0x730 [ 119.811402] ? up_write+0x520/0x520 [ 119.811437] ? _raw_spin_unlock_irqrestore+0x28/0x60 [ 119.811489] __do_sys_perf_event_open+0x1eec/0x32c0 [ 119.811528] ? __up_read+0x192/0x730 [ 119.811561] ? perf_compat_ioctl+0x130/0x130 [ 119.811592] ? up_write+0x520/0x520 [ 119.811635] ? syscall_enter_from_user_mode+0x1d/0x50 [ 119.811665] ? syscall_enter_from_user_mode+0x1d/0x50 [ 119.811699] do_syscall_64+0x3b/0x90 [ 119.811740] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 119.811768] RIP: 0033:0x7ff91e6acb19 [ 119.811788] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 119.811813] RSP: 002b:00007ff91bc22188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 119.811838] RAX: ffffffffffffffda RBX: 00007ff91e7bff60 RCX: 00007ff91e6acb19 [ 119.811857] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000280 [ 119.811874] RBP: 00007ff91e706f6d R08: 0000000000000000 R09: 0000000000000000 [ 119.811891] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000000 [ 119.811908] R13: 00007ffd694ca78f R14: 00007ff91bc22300 R15: 0000000000022000 [ 119.811938] [ 119.930513] WARNING: CPU: 0 PID: 3763 at kernel/events/core.c:2309 group_sched_out.part.0+0x2c7/0x460 [ 119.931762] Modules linked in: [ 119.932210] CPU: 0 PID: 3763 Comm: syz-executor.6 Not tainted 6.0.0-rc6-next-20220921 #1 [ 119.933292] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 119.934784] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 119.935515] Code: 5e 41 5f e9 9b b9 ef ff e8 96 b9 ef ff 65 8b 1d 2b 12 ac 7e 31 ff 89 de e8 36 b6 ef ff 85 db 0f 84 8a 00 00 00 e8 79 b9 ef ff <0f> 0b e9 a5 fe ff ff e8 6d b9 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 119.937940] RSP: 0018:ffff88803e5ff978 EFLAGS: 00010006 [ 119.938679] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 119.939632] RDX: ffff88801da39ac0 RSI: ffffffff815663a7 RDI: 0000000000000005 [ 119.940591] RBP: ffff888008668000 R08: 0000000000000005 R09: 0000000000000001 [ 119.941539] R10: 0000000000000000 R11: 0000000000000001 R12: ffff88801f2d3400 [ 119.942509] R13: ffff88806ce3f000 R14: ffffffff85238040 R15: 0000000000000002 [ 119.943461] FS: 00007ff91bc22700(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 119.944531] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 119.945309] CR2: 00007f9592a2f028 CR3: 0000000017cb0000 CR4: 0000000000350ef0 [ 119.946272] Call Trace: [ 119.946626] [ 119.946941] ctx_sched_out+0x8f1/0xc10 [ 119.947477] __perf_event_task_sched_out+0x6d0/0x18d0 [ 119.948183] ? lock_is_held_type+0xd7/0x130 [ 119.948775] ? __perf_cgroup_move+0x160/0x160 [ 119.949392] ? set_next_entity+0x304/0x550 [ 119.949979] ? update_curr+0x267/0x740 [ 119.950551] ? lock_is_held_type+0xd7/0x130 [ 119.951139] __schedule+0xedd/0x2470 [ 119.951660] ? io_schedule_timeout+0x150/0x150 [ 119.952292] ? find_held_lock+0x2c/0x110 [ 119.952857] ? lock_is_held_type+0xd7/0x130 [ 119.953447] ? __cond_resched+0x17/0x30 [ 119.954007] preempt_schedule_common+0x45/0xc0 [ 119.954644] __cond_resched+0x17/0x30 [ 119.955177] __mutex_lock+0xa3/0x14d0 [ 119.955713] ? lock_is_held_type+0xd7/0x130 [ 119.956299] ? __do_sys_perf_event_open+0x1eec/0x32c0 [ 119.957017] ? mutex_lock_io_nested+0x1310/0x1310 [ 119.957688] ? lock_release+0x3b2/0x750 [ 119.958273] ? __up_read+0x192/0x730 [ 119.958795] ? up_write+0x520/0x520 [ 119.959309] ? _raw_spin_unlock_irqrestore+0x28/0x60 [ 119.960019] __do_sys_perf_event_open+0x1eec/0x32c0 [ 119.960704] ? __up_read+0x192/0x730 [ 119.961224] ? perf_compat_ioctl+0x130/0x130 [ 119.961834] ? up_write+0x520/0x520 [ 119.962367] ? syscall_enter_from_user_mode+0x1d/0x50 [ 119.963067] ? syscall_enter_from_user_mode+0x1d/0x50 [ 119.963772] do_syscall_64+0x3b/0x90 [ 119.964305] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 119.965004] RIP: 0033:0x7ff91e6acb19 [ 119.965517] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 119.967939] RSP: 002b:00007ff91bc22188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 119.968954] RAX: ffffffffffffffda RBX: 00007ff91e7bff60 RCX: 00007ff91e6acb19 [ 119.969913] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000280 [ 119.970877] RBP: 00007ff91e706f6d R08: 0000000000000000 R09: 0000000000000000 [ 119.971830] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000000 [ 119.972786] R13: 00007ffd694ca78f R14: 00007ff91bc22300 R15: 0000000000022000 [ 119.973748] [ 119.974098] irq event stamp: 630 [ 119.974557] hardirqs last enabled at (629): [] _raw_spin_unlock_irqrestore+0x28/0x60 [ 119.975829] hardirqs last disabled at (630): [] __schedule+0x1225/0x2470 [ 119.976957] softirqs last enabled at (626): [] __irq_exit_rcu+0x11b/0x180 [ 119.978118] softirqs last disabled at (563): [] __irq_exit_rcu+0x11b/0x180 [ 119.979265] ---[ end trace 0000000000000000 ]--- 13:14:58 executing program 6: r0 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000140)=""/131, 0x83) [ 120.230768] audit: type=1400 audit(1663766099.017:9): avc: denied { read } for pid=3782 comm="syz-executor.6" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 13:14:59 executing program 6: r0 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000140)=""/131, 0x83) 13:14:59 executing program 6: r0 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000140)=""/131, 0x83) 13:14:59 executing program 6: syz_usb_connect(0x4, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x47, 0x50, 0x3f, 0x0, 0x5ac, 0x821a, 0xbcd2, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xf6, 0xb2, 0x3}}]}}]}}, 0x0) [ 122.147630] hrtimer: interrupt took 15639 ns [ 122.198455] loop4: detected capacity change from 0 to 57 [ 122.200510] EXT4-fs: Ignoring removed nomblk_io_submit option [ 122.201134] ext4: Unknown parameter 'euid>00000000000000000000' [ 122.483885] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 122.484994] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 122.577143] loop4: detected capacity change from 0 to 57 [ 122.577899] EXT4-fs: Ignoring removed nomblk_io_submit option [ 122.578351] ext4: Unknown parameter 'euid>00000000000000000000' [ 122.990018] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 122.990848] misc raw-gadget: fail, usb_gadget_register_driver returned -16 13:15:03 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) 13:15:03 executing program 6: syz_usb_connect(0x4, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x47, 0x50, 0x3f, 0x0, 0x5ac, 0x821a, 0xbcd2, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xf6, 0xb2, 0x3}}]}}]}}, 0x0) 13:15:03 executing program 3: r0 = fork() r1 = getpgrp(r0) process_vm_writev(r1, &(0x7f0000000500)=[{0x0}, {&(0x7f0000000080)=""/168, 0xa8}, {&(0x7f0000000140)=""/229, 0xe5}, {&(0x7f0000000240)=""/245, 0xf5}, {&(0x7f0000000340)=""/180, 0xb4}, {&(0x7f0000000400)=""/42, 0x2a}, {&(0x7f0000000440)=""/132, 0x84}], 0x7, &(0x7f0000000580), 0x0, 0x0) clone3(&(0x7f0000000780)={0x800, &(0x7f00000005c0), &(0x7f0000000600)=0x0, &(0x7f0000000640), {0x1b}, &(0x7f0000000680)=""/70, 0x46, &(0x7f0000000700)=""/36, &(0x7f0000000740)=[r1], 0x1}, 0x58) process_vm_writev(r2, &(0x7f0000001840)=[{&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000001800)=""/12, 0xc}], 0x2, &(0x7f0000001c80)=[{&(0x7f0000001880)=""/143, 0x8f}, {&(0x7f0000001940)=""/139, 0x8b}, {&(0x7f0000001a00)=""/125, 0x7d}, {&(0x7f0000001a80)=""/248, 0xf8}, {&(0x7f0000001b80)=""/253, 0xfd}], 0x5, 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f0000001d00), 0x650040, 0x0) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001e00), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_GET(0xffffffffffffffff, &(0x7f0000001f00)={&(0x7f0000001dc0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001ec0)={&(0x7f0000001e40)={0x4c, r3, 0x20, 0x70bd2c, 0x25dfdbfe, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x4c}}, 0x0) process_vm_writev(r1, &(0x7f0000002480)=[{&(0x7f00000022c0)=""/136, 0x88}, {&(0x7f0000002380)=""/194, 0xc2}], 0x2, &(0x7f0000003600)=[{&(0x7f00000024c0)=""/112, 0x70}, {&(0x7f0000002540)=""/4096, 0x1000}, {&(0x7f0000003540)=""/132, 0x84}], 0x3, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000003780), 0xffffffffffffffff) io_uring_setup(0x4805, &(0x7f00000037c0)={0x0, 0x9447, 0x2, 0x1, 0xcd}) 13:15:03 executing program 7: r0 = eventfd2(0x0, 0x801) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="c5d591842dc721cf", 0x8}, {&(0x7f00000000c0)="93ee52744d7239b5", 0x8}], 0x2) 13:15:03 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x2e, &(0x7f0000000200)={0x77359400}, 0x10) 13:15:03 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, r0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) dup3(r1, r1, 0x0) syz_mount_image$ext4(&(0x7f0000000380)='ext4\x00', &(0x7f00000003c0)='./file0\x00', 0x725a, 0x5, &(0x7f0000000800)=[{&(0x7f0000000400)="ed049a1c43a8ff23bc73c75ae201f2c4d383bc59d765f36a82ac9ecccabd07cb9b25c5ff0c65d06934b9ade45b63866336f31181e786a40a8677b523d3025a18236f3224475404e0a1526277eb57346bd27a5c050ee9f899bcf85cf2aff152d2d2ada189d2bf7f13f3b4eeea5bcc7408f0fec1cce481a80632e4832d94b90deadbf792fb554bc0cf7650731482", 0x8d, 0x9}, {&(0x7f00000004c0)="88eadeec3ca0756880519382257f87a8c864b0b961ca91350b901a302e8cd51e097cd05acebe14d4269efac244a3a82d281d6110c008cf6925d40a0567bb969d2b24923ae4457c74ee4d3596520cc9d69f5f65c7ea79818f0423d631ff1e549c590a84118d8f8b71da1754e4782fa18277d439877af8643404c062505a705640db009479f11708f9b36fcb5ce8c8da7bc24f3c2e192a384be267db8202acb1f7820658c352dc82b01867195a8c11906475a7633ffab8f4cbe7c2a45089aec43872a8b3a6d74be6fc0e487aa2c223", 0xce, 0x8}, {&(0x7f0000000600)="8cb223a632a8f4b64ca4aacc5ff64d56ac83a6b02a653ca1c9e4067e84dc7a99ad187d4ba2211cf9ef7cd889ddd8c97a0c6c4c3eba807ad30ad764402856a63d6b5df17394c4c09b71581ef68e1e85f3a7878b8e4bd4396148351bcaf0ef1bf94c7c4766e9abb72d9c508e88dffa644d23916404e5404c0043736a4f728f4569593ab8c5a3dc2d677ccc5648edc77afdab1596c326c6ae303f9cd03dc217dca1058f32252e26fa5c7a21", 0xaa, 0x2}, {&(0x7f00000006c0)="a82e86b2ca2a8591e2e8f3ca833c828d8fa13b5d403bbb49939c6534f1c1d74bbf0ce6af16fb049cff16e46fb3115e058052fd082ec40a628d6b8605f6516c17900b158b4f925524ca08e072cb701a9fa6c8fd000d4d257e7c54acd1bb0e2e49587de1adfd441a7c4bb1109dc82b070390df0a378d9b2fb24bcc8c238f63f24ed0eb80a6bb458b2b13c42d8ebd7a1cdc8358a4722653f42f0fe64d39c2139f9a5e0de2c566976e3cfb2bdd76a21139e291e3570254c5382314199c73f621007c79110174d386aebf98a5", 0xca, 0x8}, {&(0x7f00000007c0)="13bdc9c558e60f11fc552e5fcbe6dfc2ba0a582601adef2595baf8a728458ee02126de56f53a055ea64c0e1de69ab6dab6d11ff16a9d05", 0x37, 0x8cf}], 0x8010, &(0x7f0000000880)={[{@jqfmt_vfsv0}, {@auto_da_alloc}, {}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x2}}, {@bsdgroups}, {@jqfmt_vfsv0}, {@sb={'sb', 0x3d, 0x6}}, {@nomblk_io_submit}, {@grpquota}], [{@euid_gt}, {@euid_gt}]}) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000002880), 0x4000101, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) pwrite64(r1, &(0x7f0000000300)="89959bbf6b41fbdbb8d3b2476ab22e75f43c50b58ef7d02ac08c714d671536c09c143421a3d8fe3f7e7ba0680d57907800a7b3540ea57701f2910b72af44b050b0c952ad09c834367192b2ee83a8099b789942a9d16f5e60cbc2e971a185a83295d49a", 0x63, 0x3) 13:15:03 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0003}]}) shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) mlock(&(0x7f0000ffd000/0x1000)=nil, 0x1000) 13:15:03 executing program 2: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x47f, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x29}}}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000040)={0x24, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x22, 0x371, {0x9}}}, &(0x7f0000000080)={0xffffffffffffffeb, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_open_dev$hiddev(&(0x7f00000000c0), 0x0, 0x0) 13:15:03 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0003}]}) shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) mlock(&(0x7f0000ffd000/0x1000)=nil, 0x1000) [ 124.477884] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 124.484239] misc raw-gadget: fail, usb_gadget_register_driver returned -16 13:15:03 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0003}]}) shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) mlock(&(0x7f0000ffd000/0x1000)=nil, 0x1000) [ 124.573158] loop4: detected capacity change from 0 to 57 [ 124.586372] EXT4-fs: Ignoring removed nomblk_io_submit option [ 124.587051] ext4: Unknown parameter 'euid>00000000000000000000' 13:15:03 executing program 2: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x47f, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x29}}}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000040)={0x24, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x22, 0x371, {0x9}}}, &(0x7f0000000080)={0xffffffffffffffeb, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_open_dev$hiddev(&(0x7f00000000c0), 0x0, 0x0) 13:15:03 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) 13:15:03 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) 13:15:03 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x2e, &(0x7f0000000200)={0x77359400}, 0x10) 13:15:03 executing program 3: r0 = fork() r1 = getpgrp(r0) process_vm_writev(r1, &(0x7f0000000500)=[{0x0}, {&(0x7f0000000080)=""/168, 0xa8}, {&(0x7f0000000140)=""/229, 0xe5}, {&(0x7f0000000240)=""/245, 0xf5}, {&(0x7f0000000340)=""/180, 0xb4}, {&(0x7f0000000400)=""/42, 0x2a}, {&(0x7f0000000440)=""/132, 0x84}], 0x7, &(0x7f0000000580), 0x0, 0x0) clone3(&(0x7f0000000780)={0x800, &(0x7f00000005c0), &(0x7f0000000600)=0x0, &(0x7f0000000640), {0x1b}, &(0x7f0000000680)=""/70, 0x46, &(0x7f0000000700)=""/36, &(0x7f0000000740)=[r1], 0x1}, 0x58) process_vm_writev(r2, &(0x7f0000001840)=[{&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000001800)=""/12, 0xc}], 0x2, &(0x7f0000001c80)=[{&(0x7f0000001880)=""/143, 0x8f}, {&(0x7f0000001940)=""/139, 0x8b}, {&(0x7f0000001a00)=""/125, 0x7d}, {&(0x7f0000001a80)=""/248, 0xf8}, {&(0x7f0000001b80)=""/253, 0xfd}], 0x5, 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f0000001d00), 0x650040, 0x0) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001e00), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_GET(0xffffffffffffffff, &(0x7f0000001f00)={&(0x7f0000001dc0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001ec0)={&(0x7f0000001e40)={0x4c, r3, 0x20, 0x70bd2c, 0x25dfdbfe, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x4c}}, 0x0) process_vm_writev(r1, &(0x7f0000002480)=[{&(0x7f00000022c0)=""/136, 0x88}, {&(0x7f0000002380)=""/194, 0xc2}], 0x2, &(0x7f0000003600)=[{&(0x7f00000024c0)=""/112, 0x70}, {&(0x7f0000002540)=""/4096, 0x1000}, {&(0x7f0000003540)=""/132, 0x84}], 0x3, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000003780), 0xffffffffffffffff) io_uring_setup(0x4805, &(0x7f00000037c0)={0x0, 0x9447, 0x2, 0x1, 0xcd}) 13:15:03 executing program 7: r0 = eventfd2(0x0, 0x801) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="c5d591842dc721cf", 0x8}, {&(0x7f00000000c0)="93ee52744d7239b5", 0x8}], 0x2) 13:15:03 executing program 6: syz_usb_connect(0x4, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x47, 0x50, 0x3f, 0x0, 0x5ac, 0x821a, 0xbcd2, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xf6, 0xb2, 0x3}}]}}]}}, 0x0) 13:15:03 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, r0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) dup3(r1, r1, 0x0) syz_mount_image$ext4(&(0x7f0000000380)='ext4\x00', &(0x7f00000003c0)='./file0\x00', 0x725a, 0x5, &(0x7f0000000800)=[{&(0x7f0000000400)="ed049a1c43a8ff23bc73c75ae201f2c4d383bc59d765f36a82ac9ecccabd07cb9b25c5ff0c65d06934b9ade45b63866336f31181e786a40a8677b523d3025a18236f3224475404e0a1526277eb57346bd27a5c050ee9f899bcf85cf2aff152d2d2ada189d2bf7f13f3b4eeea5bcc7408f0fec1cce481a80632e4832d94b90deadbf792fb554bc0cf7650731482", 0x8d, 0x9}, {&(0x7f00000004c0)="88eadeec3ca0756880519382257f87a8c864b0b961ca91350b901a302e8cd51e097cd05acebe14d4269efac244a3a82d281d6110c008cf6925d40a0567bb969d2b24923ae4457c74ee4d3596520cc9d69f5f65c7ea79818f0423d631ff1e549c590a84118d8f8b71da1754e4782fa18277d439877af8643404c062505a705640db009479f11708f9b36fcb5ce8c8da7bc24f3c2e192a384be267db8202acb1f7820658c352dc82b01867195a8c11906475a7633ffab8f4cbe7c2a45089aec43872a8b3a6d74be6fc0e487aa2c223", 0xce, 0x8}, {&(0x7f0000000600)="8cb223a632a8f4b64ca4aacc5ff64d56ac83a6b02a653ca1c9e4067e84dc7a99ad187d4ba2211cf9ef7cd889ddd8c97a0c6c4c3eba807ad30ad764402856a63d6b5df17394c4c09b71581ef68e1e85f3a7878b8e4bd4396148351bcaf0ef1bf94c7c4766e9abb72d9c508e88dffa644d23916404e5404c0043736a4f728f4569593ab8c5a3dc2d677ccc5648edc77afdab1596c326c6ae303f9cd03dc217dca1058f32252e26fa5c7a21", 0xaa, 0x2}, {&(0x7f00000006c0)="a82e86b2ca2a8591e2e8f3ca833c828d8fa13b5d403bbb49939c6534f1c1d74bbf0ce6af16fb049cff16e46fb3115e058052fd082ec40a628d6b8605f6516c17900b158b4f925524ca08e072cb701a9fa6c8fd000d4d257e7c54acd1bb0e2e49587de1adfd441a7c4bb1109dc82b070390df0a378d9b2fb24bcc8c238f63f24ed0eb80a6bb458b2b13c42d8ebd7a1cdc8358a4722653f42f0fe64d39c2139f9a5e0de2c566976e3cfb2bdd76a21139e291e3570254c5382314199c73f621007c79110174d386aebf98a5", 0xca, 0x8}, {&(0x7f00000007c0)="13bdc9c558e60f11fc552e5fcbe6dfc2ba0a582601adef2595baf8a728458ee02126de56f53a055ea64c0e1de69ab6dab6d11ff16a9d05", 0x37, 0x8cf}], 0x8010, &(0x7f0000000880)={[{@jqfmt_vfsv0}, {@auto_da_alloc}, {}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x2}}, {@bsdgroups}, {@jqfmt_vfsv0}, {@sb={'sb', 0x3d, 0x6}}, {@nomblk_io_submit}, {@grpquota}], [{@euid_gt}, {@euid_gt}]}) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000002880), 0x4000101, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) pwrite64(r1, &(0x7f0000000300)="89959bbf6b41fbdbb8d3b2476ab22e75f43c50b58ef7d02ac08c714d671536c09c143421a3d8fe3f7e7ba0680d57907800a7b3540ea57701f2910b72af44b050b0c952ad09c834367192b2ee83a8099b789942a9d16f5e60cbc2e971a185a83295d49a", 0x63, 0x3) [ 125.061250] loop4: detected capacity change from 0 to 57 [ 125.072383] EXT4-fs: Ignoring removed nomblk_io_submit option [ 125.072903] ext4: Unknown parameter 'euid>00000000000000000000' 13:15:03 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) 13:15:03 executing program 7: r0 = eventfd2(0x0, 0x801) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="c5d591842dc721cf", 0x8}, {&(0x7f00000000c0)="93ee52744d7239b5", 0x8}], 0x2) [ 125.152063] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 125.156880] misc raw-gadget: fail, usb_gadget_register_driver returned -16 13:15:04 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, r0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) dup3(r1, r1, 0x0) syz_mount_image$ext4(&(0x7f0000000380)='ext4\x00', &(0x7f00000003c0)='./file0\x00', 0x725a, 0x5, &(0x7f0000000800)=[{&(0x7f0000000400)="ed049a1c43a8ff23bc73c75ae201f2c4d383bc59d765f36a82ac9ecccabd07cb9b25c5ff0c65d06934b9ade45b63866336f31181e786a40a8677b523d3025a18236f3224475404e0a1526277eb57346bd27a5c050ee9f899bcf85cf2aff152d2d2ada189d2bf7f13f3b4eeea5bcc7408f0fec1cce481a80632e4832d94b90deadbf792fb554bc0cf7650731482", 0x8d, 0x9}, {&(0x7f00000004c0)="88eadeec3ca0756880519382257f87a8c864b0b961ca91350b901a302e8cd51e097cd05acebe14d4269efac244a3a82d281d6110c008cf6925d40a0567bb969d2b24923ae4457c74ee4d3596520cc9d69f5f65c7ea79818f0423d631ff1e549c590a84118d8f8b71da1754e4782fa18277d439877af8643404c062505a705640db009479f11708f9b36fcb5ce8c8da7bc24f3c2e192a384be267db8202acb1f7820658c352dc82b01867195a8c11906475a7633ffab8f4cbe7c2a45089aec43872a8b3a6d74be6fc0e487aa2c223", 0xce, 0x8}, {&(0x7f0000000600)="8cb223a632a8f4b64ca4aacc5ff64d56ac83a6b02a653ca1c9e4067e84dc7a99ad187d4ba2211cf9ef7cd889ddd8c97a0c6c4c3eba807ad30ad764402856a63d6b5df17394c4c09b71581ef68e1e85f3a7878b8e4bd4396148351bcaf0ef1bf94c7c4766e9abb72d9c508e88dffa644d23916404e5404c0043736a4f728f4569593ab8c5a3dc2d677ccc5648edc77afdab1596c326c6ae303f9cd03dc217dca1058f32252e26fa5c7a21", 0xaa, 0x2}, {&(0x7f00000006c0)="a82e86b2ca2a8591e2e8f3ca833c828d8fa13b5d403bbb49939c6534f1c1d74bbf0ce6af16fb049cff16e46fb3115e058052fd082ec40a628d6b8605f6516c17900b158b4f925524ca08e072cb701a9fa6c8fd000d4d257e7c54acd1bb0e2e49587de1adfd441a7c4bb1109dc82b070390df0a378d9b2fb24bcc8c238f63f24ed0eb80a6bb458b2b13c42d8ebd7a1cdc8358a4722653f42f0fe64d39c2139f9a5e0de2c566976e3cfb2bdd76a21139e291e3570254c5382314199c73f621007c79110174d386aebf98a5", 0xca, 0x8}, {&(0x7f00000007c0)="13bdc9c558e60f11fc552e5fcbe6dfc2ba0a582601adef2595baf8a728458ee02126de56f53a055ea64c0e1de69ab6dab6d11ff16a9d05", 0x37, 0x8cf}], 0x8010, &(0x7f0000000880)={[{@jqfmt_vfsv0}, {@auto_da_alloc}, {}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x2}}, {@bsdgroups}, {@jqfmt_vfsv0}, {@sb={'sb', 0x3d, 0x6}}, {@nomblk_io_submit}, {@grpquota}], [{@euid_gt}, {@euid_gt}]}) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000002880), 0x4000101, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) pwrite64(r1, &(0x7f0000000300)="89959bbf6b41fbdbb8d3b2476ab22e75f43c50b58ef7d02ac08c714d671536c09c143421a3d8fe3f7e7ba0680d57907800a7b3540ea57701f2910b72af44b050b0c952ad09c834367192b2ee83a8099b789942a9d16f5e60cbc2e971a185a83295d49a", 0x63, 0x3) 13:15:04 executing program 3: r0 = fork() r1 = getpgrp(r0) process_vm_writev(r1, &(0x7f0000000500)=[{0x0}, {&(0x7f0000000080)=""/168, 0xa8}, {&(0x7f0000000140)=""/229, 0xe5}, {&(0x7f0000000240)=""/245, 0xf5}, {&(0x7f0000000340)=""/180, 0xb4}, {&(0x7f0000000400)=""/42, 0x2a}, {&(0x7f0000000440)=""/132, 0x84}], 0x7, &(0x7f0000000580), 0x0, 0x0) clone3(&(0x7f0000000780)={0x800, &(0x7f00000005c0), &(0x7f0000000600)=0x0, &(0x7f0000000640), {0x1b}, &(0x7f0000000680)=""/70, 0x46, &(0x7f0000000700)=""/36, &(0x7f0000000740)=[r1], 0x1}, 0x58) process_vm_writev(r2, &(0x7f0000001840)=[{&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000001800)=""/12, 0xc}], 0x2, &(0x7f0000001c80)=[{&(0x7f0000001880)=""/143, 0x8f}, {&(0x7f0000001940)=""/139, 0x8b}, {&(0x7f0000001a00)=""/125, 0x7d}, {&(0x7f0000001a80)=""/248, 0xf8}, {&(0x7f0000001b80)=""/253, 0xfd}], 0x5, 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f0000001d00), 0x650040, 0x0) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001e00), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_GET(0xffffffffffffffff, &(0x7f0000001f00)={&(0x7f0000001dc0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001ec0)={&(0x7f0000001e40)={0x4c, r3, 0x20, 0x70bd2c, 0x25dfdbfe, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x4c}}, 0x0) process_vm_writev(r1, &(0x7f0000002480)=[{&(0x7f00000022c0)=""/136, 0x88}, {&(0x7f0000002380)=""/194, 0xc2}], 0x2, &(0x7f0000003600)=[{&(0x7f00000024c0)=""/112, 0x70}, {&(0x7f0000002540)=""/4096, 0x1000}, {&(0x7f0000003540)=""/132, 0x84}], 0x3, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000003780), 0xffffffffffffffff) io_uring_setup(0x4805, &(0x7f00000037c0)={0x0, 0x9447, 0x2, 0x1, 0xcd}) 13:15:04 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) 13:15:04 executing program 6: syz_usb_connect(0x4, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x47, 0x50, 0x3f, 0x0, 0x5ac, 0x821a, 0xbcd2, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xf6, 0xb2, 0x3}}]}}]}}, 0x0) 13:15:04 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x2e, &(0x7f0000000200)={0x77359400}, 0x10) 13:15:04 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, r0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) dup3(r1, r1, 0x0) syz_mount_image$ext4(&(0x7f0000000380)='ext4\x00', &(0x7f00000003c0)='./file0\x00', 0x725a, 0x5, &(0x7f0000000800)=[{&(0x7f0000000400)="ed049a1c43a8ff23bc73c75ae201f2c4d383bc59d765f36a82ac9ecccabd07cb9b25c5ff0c65d06934b9ade45b63866336f31181e786a40a8677b523d3025a18236f3224475404e0a1526277eb57346bd27a5c050ee9f899bcf85cf2aff152d2d2ada189d2bf7f13f3b4eeea5bcc7408f0fec1cce481a80632e4832d94b90deadbf792fb554bc0cf7650731482", 0x8d, 0x9}, {&(0x7f00000004c0)="88eadeec3ca0756880519382257f87a8c864b0b961ca91350b901a302e8cd51e097cd05acebe14d4269efac244a3a82d281d6110c008cf6925d40a0567bb969d2b24923ae4457c74ee4d3596520cc9d69f5f65c7ea79818f0423d631ff1e549c590a84118d8f8b71da1754e4782fa18277d439877af8643404c062505a705640db009479f11708f9b36fcb5ce8c8da7bc24f3c2e192a384be267db8202acb1f7820658c352dc82b01867195a8c11906475a7633ffab8f4cbe7c2a45089aec43872a8b3a6d74be6fc0e487aa2c223", 0xce, 0x8}, {&(0x7f0000000600)="8cb223a632a8f4b64ca4aacc5ff64d56ac83a6b02a653ca1c9e4067e84dc7a99ad187d4ba2211cf9ef7cd889ddd8c97a0c6c4c3eba807ad30ad764402856a63d6b5df17394c4c09b71581ef68e1e85f3a7878b8e4bd4396148351bcaf0ef1bf94c7c4766e9abb72d9c508e88dffa644d23916404e5404c0043736a4f728f4569593ab8c5a3dc2d677ccc5648edc77afdab1596c326c6ae303f9cd03dc217dca1058f32252e26fa5c7a21", 0xaa, 0x2}, {&(0x7f00000006c0)="a82e86b2ca2a8591e2e8f3ca833c828d8fa13b5d403bbb49939c6534f1c1d74bbf0ce6af16fb049cff16e46fb3115e058052fd082ec40a628d6b8605f6516c17900b158b4f925524ca08e072cb701a9fa6c8fd000d4d257e7c54acd1bb0e2e49587de1adfd441a7c4bb1109dc82b070390df0a378d9b2fb24bcc8c238f63f24ed0eb80a6bb458b2b13c42d8ebd7a1cdc8358a4722653f42f0fe64d39c2139f9a5e0de2c566976e3cfb2bdd76a21139e291e3570254c5382314199c73f621007c79110174d386aebf98a5", 0xca, 0x8}, {&(0x7f00000007c0)="13bdc9c558e60f11fc552e5fcbe6dfc2ba0a582601adef2595baf8a728458ee02126de56f53a055ea64c0e1de69ab6dab6d11ff16a9d05", 0x37, 0x8cf}], 0x8010, &(0x7f0000000880)={[{@jqfmt_vfsv0}, {@auto_da_alloc}, {}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x2}}, {@bsdgroups}, {@jqfmt_vfsv0}, {@sb={'sb', 0x3d, 0x6}}, {@nomblk_io_submit}, {@grpquota}], [{@euid_gt}, {@euid_gt}]}) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000002880), 0x4000101, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) pwrite64(r1, &(0x7f0000000300)="89959bbf6b41fbdbb8d3b2476ab22e75f43c50b58ef7d02ac08c714d671536c09c143421a3d8fe3f7e7ba0680d57907800a7b3540ea57701f2910b72af44b050b0c952ad09c834367192b2ee83a8099b789942a9d16f5e60cbc2e971a185a83295d49a", 0x63, 0x3) 13:15:04 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0003}]}) shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) mlock(&(0x7f0000ffd000/0x1000)=nil, 0x1000) 13:15:04 executing program 2: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x47f, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x29}}}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000040)={0x24, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x22, 0x371, {0x9}}}, &(0x7f0000000080)={0xffffffffffffffeb, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_open_dev$hiddev(&(0x7f00000000c0), 0x0, 0x0) [ 125.782347] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy 13:15:04 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0003}]}) shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) mlock(&(0x7f0000ffd000/0x1000)=nil, 0x1000) [ 125.808943] misc raw-gadget: fail, usb_gadget_register_driver returned -16 13:15:04 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) 13:15:04 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0003}]}) shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) mlock(&(0x7f0000ffd000/0x1000)=nil, 0x1000) [ 125.892677] loop4: detected capacity change from 0 to 57 [ 125.897900] EXT4-fs: Ignoring removed nomblk_io_submit option [ 125.898424] ext4: Unknown parameter 'euid>00000000000000000000' [ 125.981332] loop7: detected capacity change from 0 to 57 [ 125.982561] EXT4-fs: Ignoring removed nomblk_io_submit option [ 125.983262] ext4: Unknown parameter 'euid>00000000000000000000' 13:15:04 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, r0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) dup3(r1, r1, 0x0) syz_mount_image$ext4(&(0x7f0000000380)='ext4\x00', &(0x7f00000003c0)='./file0\x00', 0x725a, 0x5, &(0x7f0000000800)=[{&(0x7f0000000400)="ed049a1c43a8ff23bc73c75ae201f2c4d383bc59d765f36a82ac9ecccabd07cb9b25c5ff0c65d06934b9ade45b63866336f31181e786a40a8677b523d3025a18236f3224475404e0a1526277eb57346bd27a5c050ee9f899bcf85cf2aff152d2d2ada189d2bf7f13f3b4eeea5bcc7408f0fec1cce481a80632e4832d94b90deadbf792fb554bc0cf7650731482", 0x8d, 0x9}, {&(0x7f00000004c0)="88eadeec3ca0756880519382257f87a8c864b0b961ca91350b901a302e8cd51e097cd05acebe14d4269efac244a3a82d281d6110c008cf6925d40a0567bb969d2b24923ae4457c74ee4d3596520cc9d69f5f65c7ea79818f0423d631ff1e549c590a84118d8f8b71da1754e4782fa18277d439877af8643404c062505a705640db009479f11708f9b36fcb5ce8c8da7bc24f3c2e192a384be267db8202acb1f7820658c352dc82b01867195a8c11906475a7633ffab8f4cbe7c2a45089aec43872a8b3a6d74be6fc0e487aa2c223", 0xce, 0x8}, {&(0x7f0000000600)="8cb223a632a8f4b64ca4aacc5ff64d56ac83a6b02a653ca1c9e4067e84dc7a99ad187d4ba2211cf9ef7cd889ddd8c97a0c6c4c3eba807ad30ad764402856a63d6b5df17394c4c09b71581ef68e1e85f3a7878b8e4bd4396148351bcaf0ef1bf94c7c4766e9abb72d9c508e88dffa644d23916404e5404c0043736a4f728f4569593ab8c5a3dc2d677ccc5648edc77afdab1596c326c6ae303f9cd03dc217dca1058f32252e26fa5c7a21", 0xaa, 0x2}, {&(0x7f00000006c0)="a82e86b2ca2a8591e2e8f3ca833c828d8fa13b5d403bbb49939c6534f1c1d74bbf0ce6af16fb049cff16e46fb3115e058052fd082ec40a628d6b8605f6516c17900b158b4f925524ca08e072cb701a9fa6c8fd000d4d257e7c54acd1bb0e2e49587de1adfd441a7c4bb1109dc82b070390df0a378d9b2fb24bcc8c238f63f24ed0eb80a6bb458b2b13c42d8ebd7a1cdc8358a4722653f42f0fe64d39c2139f9a5e0de2c566976e3cfb2bdd76a21139e291e3570254c5382314199c73f621007c79110174d386aebf98a5", 0xca, 0x8}, {&(0x7f00000007c0)="13bdc9c558e60f11fc552e5fcbe6dfc2ba0a582601adef2595baf8a728458ee02126de56f53a055ea64c0e1de69ab6dab6d11ff16a9d05", 0x37, 0x8cf}], 0x8010, &(0x7f0000000880)={[{@jqfmt_vfsv0}, {@auto_da_alloc}, {}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x2}}, {@bsdgroups}, {@jqfmt_vfsv0}, {@sb={'sb', 0x3d, 0x6}}, {@nomblk_io_submit}, {@grpquota}], [{@euid_gt}, {@euid_gt}]}) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000002880), 0x4000101, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) pwrite64(r1, &(0x7f0000000300)="89959bbf6b41fbdbb8d3b2476ab22e75f43c50b58ef7d02ac08c714d671536c09c143421a3d8fe3f7e7ba0680d57907800a7b3540ea57701f2910b72af44b050b0c952ad09c834367192b2ee83a8099b789942a9d16f5e60cbc2e971a185a83295d49a", 0x63, 0x3) 13:15:04 executing program 5: r0 = fork() r1 = getpgrp(r0) process_vm_writev(r1, &(0x7f0000000500)=[{0x0}, {&(0x7f0000000080)=""/168, 0xa8}, {&(0x7f0000000140)=""/229, 0xe5}, {&(0x7f0000000240)=""/245, 0xf5}, {&(0x7f0000000340)=""/180, 0xb4}, {&(0x7f0000000400)=""/42, 0x2a}, {&(0x7f0000000440)=""/132, 0x84}], 0x7, &(0x7f0000000580), 0x0, 0x0) clone3(&(0x7f0000000780)={0x800, &(0x7f00000005c0), &(0x7f0000000600)=0x0, &(0x7f0000000640), {0x1b}, &(0x7f0000000680)=""/70, 0x46, &(0x7f0000000700)=""/36, &(0x7f0000000740)=[r1], 0x1}, 0x58) process_vm_writev(r2, &(0x7f0000001840)=[{&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000001800)=""/12, 0xc}], 0x2, &(0x7f0000001c80)=[{&(0x7f0000001880)=""/143, 0x8f}, {&(0x7f0000001940)=""/139, 0x8b}, {&(0x7f0000001a00)=""/125, 0x7d}, {&(0x7f0000001a80)=""/248, 0xf8}, {&(0x7f0000001b80)=""/253, 0xfd}], 0x5, 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f0000001d00), 0x650040, 0x0) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001e00), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_GET(0xffffffffffffffff, &(0x7f0000001f00)={&(0x7f0000001dc0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001ec0)={&(0x7f0000001e40)={0x4c, r3, 0x20, 0x70bd2c, 0x25dfdbfe, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x4c}}, 0x0) process_vm_writev(r1, &(0x7f0000002480)=[{&(0x7f00000022c0)=""/136, 0x88}, {&(0x7f0000002380)=""/194, 0xc2}], 0x2, &(0x7f0000003600)=[{&(0x7f00000024c0)=""/112, 0x70}, {&(0x7f0000002540)=""/4096, 0x1000}, {&(0x7f0000003540)=""/132, 0x84}], 0x3, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000003780), 0xffffffffffffffff) io_uring_setup(0x4805, &(0x7f00000037c0)={0x0, 0x9447, 0x2, 0x1, 0xcd}) [ 126.116026] loop1: detected capacity change from 0 to 57 [ 126.117166] EXT4-fs: Ignoring removed nomblk_io_submit option [ 126.117633] ext4: Unknown parameter 'euid>00000000000000000000' 13:15:05 executing program 5: r0 = fork() r1 = getpgrp(r0) process_vm_writev(r1, &(0x7f0000000500)=[{0x0}, {&(0x7f0000000080)=""/168, 0xa8}, {&(0x7f0000000140)=""/229, 0xe5}, {&(0x7f0000000240)=""/245, 0xf5}, {&(0x7f0000000340)=""/180, 0xb4}, {&(0x7f0000000400)=""/42, 0x2a}, {&(0x7f0000000440)=""/132, 0x84}], 0x7, &(0x7f0000000580), 0x0, 0x0) clone3(&(0x7f0000000780)={0x800, &(0x7f00000005c0), &(0x7f0000000600)=0x0, &(0x7f0000000640), {0x1b}, &(0x7f0000000680)=""/70, 0x46, &(0x7f0000000700)=""/36, &(0x7f0000000740)=[r1], 0x1}, 0x58) process_vm_writev(r2, &(0x7f0000001840)=[{&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000001800)=""/12, 0xc}], 0x2, &(0x7f0000001c80)=[{&(0x7f0000001880)=""/143, 0x8f}, {&(0x7f0000001940)=""/139, 0x8b}, {&(0x7f0000001a00)=""/125, 0x7d}, {&(0x7f0000001a80)=""/248, 0xf8}, {&(0x7f0000001b80)=""/253, 0xfd}], 0x5, 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f0000001d00), 0x650040, 0x0) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001e00), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_GET(0xffffffffffffffff, &(0x7f0000001f00)={&(0x7f0000001dc0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001ec0)={&(0x7f0000001e40)={0x4c, r3, 0x20, 0x70bd2c, 0x25dfdbfe, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x4c}}, 0x0) process_vm_writev(r1, &(0x7f0000002480)=[{&(0x7f00000022c0)=""/136, 0x88}, {&(0x7f0000002380)=""/194, 0xc2}], 0x2, &(0x7f0000003600)=[{&(0x7f00000024c0)=""/112, 0x70}, {&(0x7f0000002540)=""/4096, 0x1000}, {&(0x7f0000003540)=""/132, 0x84}], 0x3, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000003780), 0xffffffffffffffff) io_uring_setup(0x4805, &(0x7f00000037c0)={0x0, 0x9447, 0x2, 0x1, 0xcd}) 13:15:05 executing program 3: r0 = fork() r1 = getpgrp(r0) process_vm_writev(r1, &(0x7f0000000500)=[{0x0}, {&(0x7f0000000080)=""/168, 0xa8}, {&(0x7f0000000140)=""/229, 0xe5}, {&(0x7f0000000240)=""/245, 0xf5}, {&(0x7f0000000340)=""/180, 0xb4}, {&(0x7f0000000400)=""/42, 0x2a}, {&(0x7f0000000440)=""/132, 0x84}], 0x7, &(0x7f0000000580), 0x0, 0x0) clone3(&(0x7f0000000780)={0x800, &(0x7f00000005c0), &(0x7f0000000600)=0x0, &(0x7f0000000640), {0x1b}, &(0x7f0000000680)=""/70, 0x46, &(0x7f0000000700)=""/36, &(0x7f0000000740)=[r1], 0x1}, 0x58) process_vm_writev(r2, &(0x7f0000001840)=[{&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000001800)=""/12, 0xc}], 0x2, &(0x7f0000001c80)=[{&(0x7f0000001880)=""/143, 0x8f}, {&(0x7f0000001940)=""/139, 0x8b}, {&(0x7f0000001a00)=""/125, 0x7d}, {&(0x7f0000001a80)=""/248, 0xf8}, {&(0x7f0000001b80)=""/253, 0xfd}], 0x5, 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f0000001d00), 0x650040, 0x0) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001e00), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_GET(0xffffffffffffffff, &(0x7f0000001f00)={&(0x7f0000001dc0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001ec0)={&(0x7f0000001e40)={0x4c, r3, 0x20, 0x70bd2c, 0x25dfdbfe, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x4c}}, 0x0) process_vm_writev(r1, &(0x7f0000002480)=[{&(0x7f00000022c0)=""/136, 0x88}, {&(0x7f0000002380)=""/194, 0xc2}], 0x2, &(0x7f0000003600)=[{&(0x7f00000024c0)=""/112, 0x70}, {&(0x7f0000002540)=""/4096, 0x1000}, {&(0x7f0000003540)=""/132, 0x84}], 0x3, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000003780), 0xffffffffffffffff) io_uring_setup(0x4805, &(0x7f00000037c0)={0x0, 0x9447, 0x2, 0x1, 0xcd}) 13:15:05 executing program 6: setresuid(0x0, 0xee00, 0x0) clock_settime(0x0, &(0x7f0000000080)={0x0, 0x3938700}) 13:15:05 executing program 0: r0 = fork() r1 = getpgrp(r0) process_vm_writev(r1, &(0x7f0000000500)=[{0x0}, {&(0x7f0000000080)=""/168, 0xa8}, {&(0x7f0000000140)=""/229, 0xe5}, {&(0x7f0000000240)=""/245, 0xf5}, {&(0x7f0000000340)=""/180, 0xb4}, {&(0x7f0000000400)=""/42, 0x2a}, {&(0x7f0000000440)=""/132, 0x84}], 0x7, &(0x7f0000000580), 0x0, 0x0) clone3(&(0x7f0000000780)={0x800, &(0x7f00000005c0), &(0x7f0000000600)=0x0, &(0x7f0000000640), {0x1b}, &(0x7f0000000680)=""/70, 0x46, &(0x7f0000000700)=""/36, &(0x7f0000000740)=[r1], 0x1}, 0x58) process_vm_writev(r2, &(0x7f0000001840)=[{&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000001800)=""/12, 0xc}], 0x2, &(0x7f0000001c80)=[{&(0x7f0000001880)=""/143, 0x8f}, {&(0x7f0000001940)=""/139, 0x8b}, {&(0x7f0000001a00)=""/125, 0x7d}, {&(0x7f0000001a80)=""/248, 0xf8}, {&(0x7f0000001b80)=""/253, 0xfd}], 0x5, 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f0000001d00), 0x650040, 0x0) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001e00), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_GET(0xffffffffffffffff, &(0x7f0000001f00)={&(0x7f0000001dc0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001ec0)={&(0x7f0000001e40)={0x4c, r3, 0x20, 0x70bd2c, 0x25dfdbfe, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x4c}}, 0x0) process_vm_writev(r1, &(0x7f0000002480)=[{&(0x7f00000022c0)=""/136, 0x88}, {&(0x7f0000002380)=""/194, 0xc2}], 0x2, &(0x7f0000003600)=[{&(0x7f00000024c0)=""/112, 0x70}, {&(0x7f0000002540)=""/4096, 0x1000}, {&(0x7f0000003540)=""/132, 0x84}], 0x3, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000003780), 0xffffffffffffffff) io_uring_setup(0x4805, &(0x7f00000037c0)={0x0, 0x9447, 0x2, 0x1, 0xcd}) 13:15:05 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, r0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) dup3(r1, r1, 0x0) syz_mount_image$ext4(&(0x7f0000000380)='ext4\x00', &(0x7f00000003c0)='./file0\x00', 0x725a, 0x5, &(0x7f0000000800)=[{&(0x7f0000000400)="ed049a1c43a8ff23bc73c75ae201f2c4d383bc59d765f36a82ac9ecccabd07cb9b25c5ff0c65d06934b9ade45b63866336f31181e786a40a8677b523d3025a18236f3224475404e0a1526277eb57346bd27a5c050ee9f899bcf85cf2aff152d2d2ada189d2bf7f13f3b4eeea5bcc7408f0fec1cce481a80632e4832d94b90deadbf792fb554bc0cf7650731482", 0x8d, 0x9}, {&(0x7f00000004c0)="88eadeec3ca0756880519382257f87a8c864b0b961ca91350b901a302e8cd51e097cd05acebe14d4269efac244a3a82d281d6110c008cf6925d40a0567bb969d2b24923ae4457c74ee4d3596520cc9d69f5f65c7ea79818f0423d631ff1e549c590a84118d8f8b71da1754e4782fa18277d439877af8643404c062505a705640db009479f11708f9b36fcb5ce8c8da7bc24f3c2e192a384be267db8202acb1f7820658c352dc82b01867195a8c11906475a7633ffab8f4cbe7c2a45089aec43872a8b3a6d74be6fc0e487aa2c223", 0xce, 0x8}, {&(0x7f0000000600)="8cb223a632a8f4b64ca4aacc5ff64d56ac83a6b02a653ca1c9e4067e84dc7a99ad187d4ba2211cf9ef7cd889ddd8c97a0c6c4c3eba807ad30ad764402856a63d6b5df17394c4c09b71581ef68e1e85f3a7878b8e4bd4396148351bcaf0ef1bf94c7c4766e9abb72d9c508e88dffa644d23916404e5404c0043736a4f728f4569593ab8c5a3dc2d677ccc5648edc77afdab1596c326c6ae303f9cd03dc217dca1058f32252e26fa5c7a21", 0xaa, 0x2}, {&(0x7f00000006c0)="a82e86b2ca2a8591e2e8f3ca833c828d8fa13b5d403bbb49939c6534f1c1d74bbf0ce6af16fb049cff16e46fb3115e058052fd082ec40a628d6b8605f6516c17900b158b4f925524ca08e072cb701a9fa6c8fd000d4d257e7c54acd1bb0e2e49587de1adfd441a7c4bb1109dc82b070390df0a378d9b2fb24bcc8c238f63f24ed0eb80a6bb458b2b13c42d8ebd7a1cdc8358a4722653f42f0fe64d39c2139f9a5e0de2c566976e3cfb2bdd76a21139e291e3570254c5382314199c73f621007c79110174d386aebf98a5", 0xca, 0x8}, {&(0x7f00000007c0)="13bdc9c558e60f11fc552e5fcbe6dfc2ba0a582601adef2595baf8a728458ee02126de56f53a055ea64c0e1de69ab6dab6d11ff16a9d05", 0x37, 0x8cf}], 0x8010, &(0x7f0000000880)={[{@jqfmt_vfsv0}, {@auto_da_alloc}, {}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x2}}, {@bsdgroups}, {@jqfmt_vfsv0}, {@sb={'sb', 0x3d, 0x6}}, {@nomblk_io_submit}, {@grpquota}], [{@euid_gt}, {@euid_gt}]}) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000002880), 0x4000101, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) pwrite64(r1, &(0x7f0000000300)="89959bbf6b41fbdbb8d3b2476ab22e75f43c50b58ef7d02ac08c714d671536c09c143421a3d8fe3f7e7ba0680d57907800a7b3540ea57701f2910b72af44b050b0c952ad09c834367192b2ee83a8099b789942a9d16f5e60cbc2e971a185a83295d49a", 0x63, 0x3) 13:15:05 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, r0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) dup3(r1, r1, 0x0) syz_mount_image$ext4(&(0x7f0000000380)='ext4\x00', &(0x7f00000003c0)='./file0\x00', 0x725a, 0x5, &(0x7f0000000800)=[{&(0x7f0000000400)="ed049a1c43a8ff23bc73c75ae201f2c4d383bc59d765f36a82ac9ecccabd07cb9b25c5ff0c65d06934b9ade45b63866336f31181e786a40a8677b523d3025a18236f3224475404e0a1526277eb57346bd27a5c050ee9f899bcf85cf2aff152d2d2ada189d2bf7f13f3b4eeea5bcc7408f0fec1cce481a80632e4832d94b90deadbf792fb554bc0cf7650731482", 0x8d, 0x9}, {&(0x7f00000004c0)="88eadeec3ca0756880519382257f87a8c864b0b961ca91350b901a302e8cd51e097cd05acebe14d4269efac244a3a82d281d6110c008cf6925d40a0567bb969d2b24923ae4457c74ee4d3596520cc9d69f5f65c7ea79818f0423d631ff1e549c590a84118d8f8b71da1754e4782fa18277d439877af8643404c062505a705640db009479f11708f9b36fcb5ce8c8da7bc24f3c2e192a384be267db8202acb1f7820658c352dc82b01867195a8c11906475a7633ffab8f4cbe7c2a45089aec43872a8b3a6d74be6fc0e487aa2c223", 0xce, 0x8}, {&(0x7f0000000600)="8cb223a632a8f4b64ca4aacc5ff64d56ac83a6b02a653ca1c9e4067e84dc7a99ad187d4ba2211cf9ef7cd889ddd8c97a0c6c4c3eba807ad30ad764402856a63d6b5df17394c4c09b71581ef68e1e85f3a7878b8e4bd4396148351bcaf0ef1bf94c7c4766e9abb72d9c508e88dffa644d23916404e5404c0043736a4f728f4569593ab8c5a3dc2d677ccc5648edc77afdab1596c326c6ae303f9cd03dc217dca1058f32252e26fa5c7a21", 0xaa, 0x2}, {&(0x7f00000006c0)="a82e86b2ca2a8591e2e8f3ca833c828d8fa13b5d403bbb49939c6534f1c1d74bbf0ce6af16fb049cff16e46fb3115e058052fd082ec40a628d6b8605f6516c17900b158b4f925524ca08e072cb701a9fa6c8fd000d4d257e7c54acd1bb0e2e49587de1adfd441a7c4bb1109dc82b070390df0a378d9b2fb24bcc8c238f63f24ed0eb80a6bb458b2b13c42d8ebd7a1cdc8358a4722653f42f0fe64d39c2139f9a5e0de2c566976e3cfb2bdd76a21139e291e3570254c5382314199c73f621007c79110174d386aebf98a5", 0xca, 0x8}, {&(0x7f00000007c0)="13bdc9c558e60f11fc552e5fcbe6dfc2ba0a582601adef2595baf8a728458ee02126de56f53a055ea64c0e1de69ab6dab6d11ff16a9d05", 0x37, 0x8cf}], 0x8010, &(0x7f0000000880)={[{@jqfmt_vfsv0}, {@auto_da_alloc}, {}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x2}}, {@bsdgroups}, {@jqfmt_vfsv0}, {@sb={'sb', 0x3d, 0x6}}, {@nomblk_io_submit}, {@grpquota}], [{@euid_gt}, {@euid_gt}]}) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000002880), 0x4000101, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) pwrite64(r1, &(0x7f0000000300)="89959bbf6b41fbdbb8d3b2476ab22e75f43c50b58ef7d02ac08c714d671536c09c143421a3d8fe3f7e7ba0680d57907800a7b3540ea57701f2910b72af44b050b0c952ad09c834367192b2ee83a8099b789942a9d16f5e60cbc2e971a185a83295d49a", 0x63, 0x3) 13:15:05 executing program 4: r0 = fork() r1 = getpgrp(r0) process_vm_writev(r1, &(0x7f0000000500)=[{0x0}, {&(0x7f0000000080)=""/168, 0xa8}, {&(0x7f0000000140)=""/229, 0xe5}, {&(0x7f0000000240)=""/245, 0xf5}, {&(0x7f0000000340)=""/180, 0xb4}, {&(0x7f0000000400)=""/42, 0x2a}, {&(0x7f0000000440)=""/132, 0x84}], 0x7, &(0x7f0000000580), 0x0, 0x0) clone3(&(0x7f0000000780)={0x800, &(0x7f00000005c0), &(0x7f0000000600)=0x0, &(0x7f0000000640), {0x1b}, &(0x7f0000000680)=""/70, 0x46, &(0x7f0000000700)=""/36, &(0x7f0000000740)=[r1], 0x1}, 0x58) process_vm_writev(r2, &(0x7f0000001840)=[{&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000001800)=""/12, 0xc}], 0x2, &(0x7f0000001c80)=[{&(0x7f0000001880)=""/143, 0x8f}, {&(0x7f0000001940)=""/139, 0x8b}, {&(0x7f0000001a00)=""/125, 0x7d}, {&(0x7f0000001a80)=""/248, 0xf8}, {&(0x7f0000001b80)=""/253, 0xfd}], 0x5, 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f0000001d00), 0x650040, 0x0) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001e00), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_GET(0xffffffffffffffff, &(0x7f0000001f00)={&(0x7f0000001dc0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001ec0)={&(0x7f0000001e40)={0x4c, r3, 0x20, 0x70bd2c, 0x25dfdbfe, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x4c}}, 0x0) process_vm_writev(r1, &(0x7f0000002480)=[{&(0x7f00000022c0)=""/136, 0x88}, {&(0x7f0000002380)=""/194, 0xc2}], 0x2, &(0x7f0000003600)=[{&(0x7f00000024c0)=""/112, 0x70}, {&(0x7f0000002540)=""/4096, 0x1000}, {&(0x7f0000003540)=""/132, 0x84}], 0x3, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000003780), 0xffffffffffffffff) io_uring_setup(0x4805, &(0x7f00000037c0)={0x0, 0x9447, 0x2, 0x1, 0xcd}) [ 126.446704] loop1: detected capacity change from 0 to 57 [ 126.461007] EXT4-fs: Ignoring removed nomblk_io_submit option [ 126.461562] ext4: Unknown parameter 'euid>00000000000000000000' 13:15:05 executing program 6: setresuid(0x0, 0xee00, 0x0) clock_settime(0x0, &(0x7f0000000080)={0x0, 0x3938700}) [ 126.519999] loop7: detected capacity change from 0 to 57 13:15:05 executing program 2: symlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file1\x00') readlink(&(0x7f0000000680)='./file1\x00', &(0x7f0000000100)=""/251, 0xfb) readlinkat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', &(0x7f0000000200)=""/209, 0xd1) 13:15:05 executing program 5: r0 = fork() r1 = getpgrp(r0) process_vm_writev(r1, &(0x7f0000000500)=[{0x0}, {&(0x7f0000000080)=""/168, 0xa8}, {&(0x7f0000000140)=""/229, 0xe5}, {&(0x7f0000000240)=""/245, 0xf5}, {&(0x7f0000000340)=""/180, 0xb4}, {&(0x7f0000000400)=""/42, 0x2a}, {&(0x7f0000000440)=""/132, 0x84}], 0x7, &(0x7f0000000580), 0x0, 0x0) clone3(&(0x7f0000000780)={0x800, &(0x7f00000005c0), &(0x7f0000000600)=0x0, &(0x7f0000000640), {0x1b}, &(0x7f0000000680)=""/70, 0x46, &(0x7f0000000700)=""/36, &(0x7f0000000740)=[r1], 0x1}, 0x58) process_vm_writev(r2, &(0x7f0000001840)=[{&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000001800)=""/12, 0xc}], 0x2, &(0x7f0000001c80)=[{&(0x7f0000001880)=""/143, 0x8f}, {&(0x7f0000001940)=""/139, 0x8b}, {&(0x7f0000001a00)=""/125, 0x7d}, {&(0x7f0000001a80)=""/248, 0xf8}, {&(0x7f0000001b80)=""/253, 0xfd}], 0x5, 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f0000001d00), 0x650040, 0x0) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001e00), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_GET(0xffffffffffffffff, &(0x7f0000001f00)={&(0x7f0000001dc0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001ec0)={&(0x7f0000001e40)={0x4c, r3, 0x20, 0x70bd2c, 0x25dfdbfe, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x4c}}, 0x0) process_vm_writev(r1, &(0x7f0000002480)=[{&(0x7f00000022c0)=""/136, 0x88}, {&(0x7f0000002380)=""/194, 0xc2}], 0x2, &(0x7f0000003600)=[{&(0x7f00000024c0)=""/112, 0x70}, {&(0x7f0000002540)=""/4096, 0x1000}, {&(0x7f0000003540)=""/132, 0x84}], 0x3, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000003780), 0xffffffffffffffff) io_uring_setup(0x4805, &(0x7f00000037c0)={0x0, 0x9447, 0x2, 0x1, 0xcd}) 13:15:05 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, r0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) dup3(r1, r1, 0x0) syz_mount_image$ext4(&(0x7f0000000380)='ext4\x00', &(0x7f00000003c0)='./file0\x00', 0x725a, 0x5, &(0x7f0000000800)=[{&(0x7f0000000400)="ed049a1c43a8ff23bc73c75ae201f2c4d383bc59d765f36a82ac9ecccabd07cb9b25c5ff0c65d06934b9ade45b63866336f31181e786a40a8677b523d3025a18236f3224475404e0a1526277eb57346bd27a5c050ee9f899bcf85cf2aff152d2d2ada189d2bf7f13f3b4eeea5bcc7408f0fec1cce481a80632e4832d94b90deadbf792fb554bc0cf7650731482", 0x8d, 0x9}, {&(0x7f00000004c0)="88eadeec3ca0756880519382257f87a8c864b0b961ca91350b901a302e8cd51e097cd05acebe14d4269efac244a3a82d281d6110c008cf6925d40a0567bb969d2b24923ae4457c74ee4d3596520cc9d69f5f65c7ea79818f0423d631ff1e549c590a84118d8f8b71da1754e4782fa18277d439877af8643404c062505a705640db009479f11708f9b36fcb5ce8c8da7bc24f3c2e192a384be267db8202acb1f7820658c352dc82b01867195a8c11906475a7633ffab8f4cbe7c2a45089aec43872a8b3a6d74be6fc0e487aa2c223", 0xce, 0x8}, {&(0x7f0000000600)="8cb223a632a8f4b64ca4aacc5ff64d56ac83a6b02a653ca1c9e4067e84dc7a99ad187d4ba2211cf9ef7cd889ddd8c97a0c6c4c3eba807ad30ad764402856a63d6b5df17394c4c09b71581ef68e1e85f3a7878b8e4bd4396148351bcaf0ef1bf94c7c4766e9abb72d9c508e88dffa644d23916404e5404c0043736a4f728f4569593ab8c5a3dc2d677ccc5648edc77afdab1596c326c6ae303f9cd03dc217dca1058f32252e26fa5c7a21", 0xaa, 0x2}, {&(0x7f00000006c0)="a82e86b2ca2a8591e2e8f3ca833c828d8fa13b5d403bbb49939c6534f1c1d74bbf0ce6af16fb049cff16e46fb3115e058052fd082ec40a628d6b8605f6516c17900b158b4f925524ca08e072cb701a9fa6c8fd000d4d257e7c54acd1bb0e2e49587de1adfd441a7c4bb1109dc82b070390df0a378d9b2fb24bcc8c238f63f24ed0eb80a6bb458b2b13c42d8ebd7a1cdc8358a4722653f42f0fe64d39c2139f9a5e0de2c566976e3cfb2bdd76a21139e291e3570254c5382314199c73f621007c79110174d386aebf98a5", 0xca, 0x8}, {&(0x7f00000007c0)="13bdc9c558e60f11fc552e5fcbe6dfc2ba0a582601adef2595baf8a728458ee02126de56f53a055ea64c0e1de69ab6dab6d11ff16a9d05", 0x37, 0x8cf}], 0x8010, &(0x7f0000000880)={[{@jqfmt_vfsv0}, {@auto_da_alloc}, {}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x2}}, {@bsdgroups}, {@jqfmt_vfsv0}, {@sb={'sb', 0x3d, 0x6}}, {@nomblk_io_submit}, {@grpquota}], [{@euid_gt}, {@euid_gt}]}) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000002880), 0x4000101, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) pwrite64(r1, &(0x7f0000000300)="89959bbf6b41fbdbb8d3b2476ab22e75f43c50b58ef7d02ac08c714d671536c09c143421a3d8fe3f7e7ba0680d57907800a7b3540ea57701f2910b72af44b050b0c952ad09c834367192b2ee83a8099b789942a9d16f5e60cbc2e971a185a83295d49a", 0x63, 0x3) 13:15:05 executing program 6: setresuid(0x0, 0xee00, 0x0) clock_settime(0x0, &(0x7f0000000080)={0x0, 0x3938700}) 13:15:05 executing program 3: r0 = fork() r1 = getpgrp(r0) process_vm_writev(r1, &(0x7f0000000500)=[{0x0}, {&(0x7f0000000080)=""/168, 0xa8}, {&(0x7f0000000140)=""/229, 0xe5}, {&(0x7f0000000240)=""/245, 0xf5}, {&(0x7f0000000340)=""/180, 0xb4}, {&(0x7f0000000400)=""/42, 0x2a}, {&(0x7f0000000440)=""/132, 0x84}], 0x7, &(0x7f0000000580), 0x0, 0x0) clone3(&(0x7f0000000780)={0x800, &(0x7f00000005c0), &(0x7f0000000600)=0x0, &(0x7f0000000640), {0x1b}, &(0x7f0000000680)=""/70, 0x46, &(0x7f0000000700)=""/36, &(0x7f0000000740)=[r1], 0x1}, 0x58) process_vm_writev(r2, &(0x7f0000001840)=[{&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000001800)=""/12, 0xc}], 0x2, &(0x7f0000001c80)=[{&(0x7f0000001880)=""/143, 0x8f}, {&(0x7f0000001940)=""/139, 0x8b}, {&(0x7f0000001a00)=""/125, 0x7d}, {&(0x7f0000001a80)=""/248, 0xf8}, {&(0x7f0000001b80)=""/253, 0xfd}], 0x5, 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f0000001d00), 0x650040, 0x0) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001e00), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_GET(0xffffffffffffffff, &(0x7f0000001f00)={&(0x7f0000001dc0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001ec0)={&(0x7f0000001e40)={0x4c, r3, 0x20, 0x70bd2c, 0x25dfdbfe, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x4c}}, 0x0) process_vm_writev(r1, &(0x7f0000002480)=[{&(0x7f00000022c0)=""/136, 0x88}, {&(0x7f0000002380)=""/194, 0xc2}], 0x2, &(0x7f0000003600)=[{&(0x7f00000024c0)=""/112, 0x70}, {&(0x7f0000002540)=""/4096, 0x1000}, {&(0x7f0000003540)=""/132, 0x84}], 0x3, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000003780), 0xffffffffffffffff) io_uring_setup(0x4805, &(0x7f00000037c0)={0x0, 0x9447, 0x2, 0x1, 0xcd}) 13:15:05 executing program 0: r0 = fork() r1 = getpgrp(r0) process_vm_writev(r1, &(0x7f0000000500)=[{0x0}, {&(0x7f0000000080)=""/168, 0xa8}, {&(0x7f0000000140)=""/229, 0xe5}, {&(0x7f0000000240)=""/245, 0xf5}, {&(0x7f0000000340)=""/180, 0xb4}, {&(0x7f0000000400)=""/42, 0x2a}, {&(0x7f0000000440)=""/132, 0x84}], 0x7, &(0x7f0000000580), 0x0, 0x0) clone3(&(0x7f0000000780)={0x800, &(0x7f00000005c0), &(0x7f0000000600)=0x0, &(0x7f0000000640), {0x1b}, &(0x7f0000000680)=""/70, 0x46, &(0x7f0000000700)=""/36, &(0x7f0000000740)=[r1], 0x1}, 0x58) process_vm_writev(r2, &(0x7f0000001840)=[{&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000001800)=""/12, 0xc}], 0x2, &(0x7f0000001c80)=[{&(0x7f0000001880)=""/143, 0x8f}, {&(0x7f0000001940)=""/139, 0x8b}, {&(0x7f0000001a00)=""/125, 0x7d}, {&(0x7f0000001a80)=""/248, 0xf8}, {&(0x7f0000001b80)=""/253, 0xfd}], 0x5, 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f0000001d00), 0x650040, 0x0) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001e00), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_GET(0xffffffffffffffff, &(0x7f0000001f00)={&(0x7f0000001dc0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001ec0)={&(0x7f0000001e40)={0x4c, r3, 0x20, 0x70bd2c, 0x25dfdbfe, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x4c}}, 0x0) process_vm_writev(r1, &(0x7f0000002480)=[{&(0x7f00000022c0)=""/136, 0x88}, {&(0x7f0000002380)=""/194, 0xc2}], 0x2, &(0x7f0000003600)=[{&(0x7f00000024c0)=""/112, 0x70}, {&(0x7f0000002540)=""/4096, 0x1000}, {&(0x7f0000003540)=""/132, 0x84}], 0x3, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000003780), 0xffffffffffffffff) io_uring_setup(0x4805, &(0x7f00000037c0)={0x0, 0x9447, 0x2, 0x1, 0xcd}) 13:15:05 executing program 4: r0 = fork() r1 = getpgrp(r0) process_vm_writev(r1, &(0x7f0000000500)=[{0x0}, {&(0x7f0000000080)=""/168, 0xa8}, {&(0x7f0000000140)=""/229, 0xe5}, {&(0x7f0000000240)=""/245, 0xf5}, {&(0x7f0000000340)=""/180, 0xb4}, {&(0x7f0000000400)=""/42, 0x2a}, {&(0x7f0000000440)=""/132, 0x84}], 0x7, &(0x7f0000000580), 0x0, 0x0) clone3(&(0x7f0000000780)={0x800, &(0x7f00000005c0), &(0x7f0000000600)=0x0, &(0x7f0000000640), {0x1b}, &(0x7f0000000680)=""/70, 0x46, &(0x7f0000000700)=""/36, &(0x7f0000000740)=[r1], 0x1}, 0x58) process_vm_writev(r2, &(0x7f0000001840)=[{&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000001800)=""/12, 0xc}], 0x2, &(0x7f0000001c80)=[{&(0x7f0000001880)=""/143, 0x8f}, {&(0x7f0000001940)=""/139, 0x8b}, {&(0x7f0000001a00)=""/125, 0x7d}, {&(0x7f0000001a80)=""/248, 0xf8}, {&(0x7f0000001b80)=""/253, 0xfd}], 0x5, 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f0000001d00), 0x650040, 0x0) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001e00), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_GET(0xffffffffffffffff, &(0x7f0000001f00)={&(0x7f0000001dc0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001ec0)={&(0x7f0000001e40)={0x4c, r3, 0x20, 0x70bd2c, 0x25dfdbfe, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x4c}}, 0x0) process_vm_writev(r1, &(0x7f0000002480)=[{&(0x7f00000022c0)=""/136, 0x88}, {&(0x7f0000002380)=""/194, 0xc2}], 0x2, &(0x7f0000003600)=[{&(0x7f00000024c0)=""/112, 0x70}, {&(0x7f0000002540)=""/4096, 0x1000}, {&(0x7f0000003540)=""/132, 0x84}], 0x3, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000003780), 0xffffffffffffffff) io_uring_setup(0x4805, &(0x7f00000037c0)={0x0, 0x9447, 0x2, 0x1, 0xcd}) 13:15:05 executing program 2: symlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file1\x00') readlink(&(0x7f0000000680)='./file1\x00', &(0x7f0000000100)=""/251, 0xfb) readlinkat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', &(0x7f0000000200)=""/209, 0xd1) [ 126.616827] loop1: detected capacity change from 0 to 57 [ 126.634216] EXT4-fs: Ignoring removed nomblk_io_submit option [ 126.634776] ext4: Unknown parameter 'euid>00000000000000000000' [ 126.648043] EXT4-fs: Ignoring removed nomblk_io_submit option [ 126.649126] ext4: Unknown parameter 'euid>00000000000000000000' 13:15:05 executing program 6: setresuid(0x0, 0xee00, 0x0) clock_settime(0x0, &(0x7f0000000080)={0x0, 0x3938700}) 13:15:05 executing program 4: r0 = fork() r1 = getpgrp(r0) process_vm_writev(r1, &(0x7f0000000500)=[{0x0}, {&(0x7f0000000080)=""/168, 0xa8}, {&(0x7f0000000140)=""/229, 0xe5}, {&(0x7f0000000240)=""/245, 0xf5}, {&(0x7f0000000340)=""/180, 0xb4}, {&(0x7f0000000400)=""/42, 0x2a}, {&(0x7f0000000440)=""/132, 0x84}], 0x7, &(0x7f0000000580), 0x0, 0x0) clone3(&(0x7f0000000780)={0x800, &(0x7f00000005c0), &(0x7f0000000600)=0x0, &(0x7f0000000640), {0x1b}, &(0x7f0000000680)=""/70, 0x46, &(0x7f0000000700)=""/36, &(0x7f0000000740)=[r1], 0x1}, 0x58) process_vm_writev(r2, &(0x7f0000001840)=[{&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000001800)=""/12, 0xc}], 0x2, &(0x7f0000001c80)=[{&(0x7f0000001880)=""/143, 0x8f}, {&(0x7f0000001940)=""/139, 0x8b}, {&(0x7f0000001a00)=""/125, 0x7d}, {&(0x7f0000001a80)=""/248, 0xf8}, {&(0x7f0000001b80)=""/253, 0xfd}], 0x5, 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f0000001d00), 0x650040, 0x0) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001e00), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_GET(0xffffffffffffffff, &(0x7f0000001f00)={&(0x7f0000001dc0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001ec0)={&(0x7f0000001e40)={0x4c, r3, 0x20, 0x70bd2c, 0x25dfdbfe, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x4c}}, 0x0) process_vm_writev(r1, &(0x7f0000002480)=[{&(0x7f00000022c0)=""/136, 0x88}, {&(0x7f0000002380)=""/194, 0xc2}], 0x2, &(0x7f0000003600)=[{&(0x7f00000024c0)=""/112, 0x70}, {&(0x7f0000002540)=""/4096, 0x1000}, {&(0x7f0000003540)=""/132, 0x84}], 0x3, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000003780), 0xffffffffffffffff) io_uring_setup(0x4805, &(0x7f00000037c0)={0x0, 0x9447, 0x2, 0x1, 0xcd}) 13:15:05 executing program 2: symlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file1\x00') readlink(&(0x7f0000000680)='./file1\x00', &(0x7f0000000100)=""/251, 0xfb) readlinkat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', &(0x7f0000000200)=""/209, 0xd1) 13:15:05 executing program 3: r0 = fork() r1 = getpgrp(r0) process_vm_writev(r1, &(0x7f0000000500)=[{0x0}, {&(0x7f0000000080)=""/168, 0xa8}, {&(0x7f0000000140)=""/229, 0xe5}, {&(0x7f0000000240)=""/245, 0xf5}, {&(0x7f0000000340)=""/180, 0xb4}, {&(0x7f0000000400)=""/42, 0x2a}, {&(0x7f0000000440)=""/132, 0x84}], 0x7, &(0x7f0000000580), 0x0, 0x0) clone3(&(0x7f0000000780)={0x800, &(0x7f00000005c0), &(0x7f0000000600)=0x0, &(0x7f0000000640), {0x1b}, &(0x7f0000000680)=""/70, 0x46, &(0x7f0000000700)=""/36, &(0x7f0000000740)=[r1], 0x1}, 0x58) process_vm_writev(r2, &(0x7f0000001840)=[{&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000001800)=""/12, 0xc}], 0x2, &(0x7f0000001c80)=[{&(0x7f0000001880)=""/143, 0x8f}, {&(0x7f0000001940)=""/139, 0x8b}, {&(0x7f0000001a00)=""/125, 0x7d}, {&(0x7f0000001a80)=""/248, 0xf8}, {&(0x7f0000001b80)=""/253, 0xfd}], 0x5, 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f0000001d00), 0x650040, 0x0) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001e00), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_GET(0xffffffffffffffff, &(0x7f0000001f00)={&(0x7f0000001dc0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001ec0)={&(0x7f0000001e40)={0x4c, r3, 0x20, 0x70bd2c, 0x25dfdbfe, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x4c}}, 0x0) process_vm_writev(r1, &(0x7f0000002480)=[{&(0x7f00000022c0)=""/136, 0x88}, {&(0x7f0000002380)=""/194, 0xc2}], 0x2, &(0x7f0000003600)=[{&(0x7f00000024c0)=""/112, 0x70}, {&(0x7f0000002540)=""/4096, 0x1000}, {&(0x7f0000003540)=""/132, 0x84}], 0x3, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000003780), 0xffffffffffffffff) io_uring_setup(0x4805, &(0x7f00000037c0)={0x0, 0x9447, 0x2, 0x1, 0xcd}) 13:15:05 executing program 6: symlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file1\x00') readlink(&(0x7f0000000680)='./file1\x00', &(0x7f0000000100)=""/251, 0xfb) readlinkat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', &(0x7f0000000200)=""/209, 0xd1) 13:15:05 executing program 1: syz_mount_image$iso9660(&(0x7f0000000a40), &(0x7f0000000a80)='./file0\x00', 0x0, 0x0, &(0x7f0000000b80), 0x0, &(0x7f0000000bc0)={[{@hide}, {@map_acorn}, {@sbsector}, {@overriderock}], [{@fowner_gt={'fowner>', 0xee01}}]}) 13:15:05 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, r0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) dup3(r1, r1, 0x0) syz_mount_image$ext4(&(0x7f0000000380)='ext4\x00', &(0x7f00000003c0)='./file0\x00', 0x725a, 0x5, &(0x7f0000000800)=[{&(0x7f0000000400)="ed049a1c43a8ff23bc73c75ae201f2c4d383bc59d765f36a82ac9ecccabd07cb9b25c5ff0c65d06934b9ade45b63866336f31181e786a40a8677b523d3025a18236f3224475404e0a1526277eb57346bd27a5c050ee9f899bcf85cf2aff152d2d2ada189d2bf7f13f3b4eeea5bcc7408f0fec1cce481a80632e4832d94b90deadbf792fb554bc0cf7650731482", 0x8d, 0x9}, {&(0x7f00000004c0)="88eadeec3ca0756880519382257f87a8c864b0b961ca91350b901a302e8cd51e097cd05acebe14d4269efac244a3a82d281d6110c008cf6925d40a0567bb969d2b24923ae4457c74ee4d3596520cc9d69f5f65c7ea79818f0423d631ff1e549c590a84118d8f8b71da1754e4782fa18277d439877af8643404c062505a705640db009479f11708f9b36fcb5ce8c8da7bc24f3c2e192a384be267db8202acb1f7820658c352dc82b01867195a8c11906475a7633ffab8f4cbe7c2a45089aec43872a8b3a6d74be6fc0e487aa2c223", 0xce, 0x8}, {&(0x7f0000000600)="8cb223a632a8f4b64ca4aacc5ff64d56ac83a6b02a653ca1c9e4067e84dc7a99ad187d4ba2211cf9ef7cd889ddd8c97a0c6c4c3eba807ad30ad764402856a63d6b5df17394c4c09b71581ef68e1e85f3a7878b8e4bd4396148351bcaf0ef1bf94c7c4766e9abb72d9c508e88dffa644d23916404e5404c0043736a4f728f4569593ab8c5a3dc2d677ccc5648edc77afdab1596c326c6ae303f9cd03dc217dca1058f32252e26fa5c7a21", 0xaa, 0x2}, {&(0x7f00000006c0)="a82e86b2ca2a8591e2e8f3ca833c828d8fa13b5d403bbb49939c6534f1c1d74bbf0ce6af16fb049cff16e46fb3115e058052fd082ec40a628d6b8605f6516c17900b158b4f925524ca08e072cb701a9fa6c8fd000d4d257e7c54acd1bb0e2e49587de1adfd441a7c4bb1109dc82b070390df0a378d9b2fb24bcc8c238f63f24ed0eb80a6bb458b2b13c42d8ebd7a1cdc8358a4722653f42f0fe64d39c2139f9a5e0de2c566976e3cfb2bdd76a21139e291e3570254c5382314199c73f621007c79110174d386aebf98a5", 0xca, 0x8}, {&(0x7f00000007c0)="13bdc9c558e60f11fc552e5fcbe6dfc2ba0a582601adef2595baf8a728458ee02126de56f53a055ea64c0e1de69ab6dab6d11ff16a9d05", 0x37, 0x8cf}], 0x8010, &(0x7f0000000880)={[{@jqfmt_vfsv0}, {@auto_da_alloc}, {}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x2}}, {@bsdgroups}, {@jqfmt_vfsv0}, {@sb={'sb', 0x3d, 0x6}}, {@nomblk_io_submit}, {@grpquota}], [{@euid_gt}, {@euid_gt}]}) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000002880), 0x4000101, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) pwrite64(r1, &(0x7f0000000300)="89959bbf6b41fbdbb8d3b2476ab22e75f43c50b58ef7d02ac08c714d671536c09c143421a3d8fe3f7e7ba0680d57907800a7b3540ea57701f2910b72af44b050b0c952ad09c834367192b2ee83a8099b789942a9d16f5e60cbc2e971a185a83295d49a", 0x63, 0x3) 13:15:05 executing program 5: symlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file1\x00') readlink(&(0x7f0000000680)='./file1\x00', &(0x7f0000000100)=""/251, 0xfb) readlinkat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', &(0x7f0000000200)=""/209, 0xd1) 13:15:05 executing program 0: r0 = fork() r1 = getpgrp(r0) process_vm_writev(r1, &(0x7f0000000500)=[{0x0}, {&(0x7f0000000080)=""/168, 0xa8}, {&(0x7f0000000140)=""/229, 0xe5}, {&(0x7f0000000240)=""/245, 0xf5}, {&(0x7f0000000340)=""/180, 0xb4}, {&(0x7f0000000400)=""/42, 0x2a}, {&(0x7f0000000440)=""/132, 0x84}], 0x7, &(0x7f0000000580), 0x0, 0x0) clone3(&(0x7f0000000780)={0x800, &(0x7f00000005c0), &(0x7f0000000600)=0x0, &(0x7f0000000640), {0x1b}, &(0x7f0000000680)=""/70, 0x46, &(0x7f0000000700)=""/36, &(0x7f0000000740)=[r1], 0x1}, 0x58) process_vm_writev(r2, &(0x7f0000001840)=[{&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000001800)=""/12, 0xc}], 0x2, &(0x7f0000001c80)=[{&(0x7f0000001880)=""/143, 0x8f}, {&(0x7f0000001940)=""/139, 0x8b}, {&(0x7f0000001a00)=""/125, 0x7d}, {&(0x7f0000001a80)=""/248, 0xf8}, {&(0x7f0000001b80)=""/253, 0xfd}], 0x5, 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f0000001d00), 0x650040, 0x0) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001e00), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_GET(0xffffffffffffffff, &(0x7f0000001f00)={&(0x7f0000001dc0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001ec0)={&(0x7f0000001e40)={0x4c, r3, 0x20, 0x70bd2c, 0x25dfdbfe, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x4c}}, 0x0) process_vm_writev(r1, &(0x7f0000002480)=[{&(0x7f00000022c0)=""/136, 0x88}, {&(0x7f0000002380)=""/194, 0xc2}], 0x2, &(0x7f0000003600)=[{&(0x7f00000024c0)=""/112, 0x70}, {&(0x7f0000002540)=""/4096, 0x1000}, {&(0x7f0000003540)=""/132, 0x84}], 0x3, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000003780), 0xffffffffffffffff) io_uring_setup(0x4805, &(0x7f00000037c0)={0x0, 0x9447, 0x2, 0x1, 0xcd}) 13:15:05 executing program 4: mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, 0x0, 0x0) mremap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) syz_io_uring_setup(0x2e59, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x23}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000500), &(0x7f0000000540)) [ 126.865241] loop7: detected capacity change from 0 to 57 [ 126.882842] EXT4-fs: Ignoring removed nomblk_io_submit option [ 126.883333] ext4: Unknown parameter 'euid>00000000000000000000' 13:15:05 executing program 2: symlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file1\x00') readlink(&(0x7f0000000680)='./file1\x00', &(0x7f0000000100)=""/251, 0xfb) readlinkat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', &(0x7f0000000200)=""/209, 0xd1) 13:15:05 executing program 6: symlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file1\x00') readlink(&(0x7f0000000680)='./file1\x00', &(0x7f0000000100)=""/251, 0xfb) readlinkat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', &(0x7f0000000200)=""/209, 0xd1) 13:15:05 executing program 5: symlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file1\x00') readlink(&(0x7f0000000680)='./file1\x00', &(0x7f0000000100)=""/251, 0xfb) readlinkat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', &(0x7f0000000200)=""/209, 0xd1) 13:15:05 executing program 1: syz_mount_image$iso9660(&(0x7f0000000a40), &(0x7f0000000a80)='./file0\x00', 0x0, 0x0, &(0x7f0000000b80), 0x0, &(0x7f0000000bc0)={[{@hide}, {@map_acorn}, {@sbsector}, {@overriderock}], [{@fowner_gt={'fowner>', 0xee01}}]}) 13:15:05 executing program 4: mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, 0x0, 0x0) mremap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) syz_io_uring_setup(0x2e59, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x23}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000500), &(0x7f0000000540)) 13:15:05 executing program 5: symlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file1\x00') readlink(&(0x7f0000000680)='./file1\x00', &(0x7f0000000100)=""/251, 0xfb) readlinkat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', &(0x7f0000000200)=""/209, 0xd1) 13:15:05 executing program 2: mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, 0x0, 0x0) mremap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) syz_io_uring_setup(0x2e59, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x23}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000500), &(0x7f0000000540)) 13:15:05 executing program 3: mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, 0x0, 0x0) mremap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) syz_io_uring_setup(0x2e59, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x23}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000500), &(0x7f0000000540)) 13:15:05 executing program 6: symlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file1\x00') readlink(&(0x7f0000000680)='./file1\x00', &(0x7f0000000100)=""/251, 0xfb) readlinkat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', &(0x7f0000000200)=""/209, 0xd1) 13:15:05 executing program 7: mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, 0x0, 0x0) mremap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) syz_io_uring_setup(0x2e59, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x23}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000500), &(0x7f0000000540)) 13:15:05 executing program 1: syz_mount_image$iso9660(&(0x7f0000000a40), &(0x7f0000000a80)='./file0\x00', 0x0, 0x0, &(0x7f0000000b80), 0x0, &(0x7f0000000bc0)={[{@hide}, {@map_acorn}, {@sbsector}, {@overriderock}], [{@fowner_gt={'fowner>', 0xee01}}]}) 13:15:05 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x3}, 0x4) close_range(r0, 0xffffffffffffffff, 0x0) 13:15:05 executing program 4: mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, 0x0, 0x0) mremap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) syz_io_uring_setup(0x2e59, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x23}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000500), &(0x7f0000000540)) 13:15:05 executing program 7: mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, 0x0, 0x0) mremap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) syz_io_uring_setup(0x2e59, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x23}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000500), &(0x7f0000000540)) 13:15:05 executing program 3: mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, 0x0, 0x0) mremap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) syz_io_uring_setup(0x2e59, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x23}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000500), &(0x7f0000000540)) 13:15:05 executing program 2: mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, 0x0, 0x0) mremap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) syz_io_uring_setup(0x2e59, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x23}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000500), &(0x7f0000000540)) 13:15:05 executing program 1: syz_mount_image$iso9660(&(0x7f0000000a40), &(0x7f0000000a80)='./file0\x00', 0x0, 0x0, &(0x7f0000000b80), 0x0, &(0x7f0000000bc0)={[{@hide}, {@map_acorn}, {@sbsector}, {@overriderock}], [{@fowner_gt={'fowner>', 0xee01}}]}) 13:15:05 executing program 3: mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, 0x0, 0x0) mremap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) syz_io_uring_setup(0x2e59, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x23}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000500), &(0x7f0000000540)) 13:15:05 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x3}, 0x4) close_range(r0, 0xffffffffffffffff, 0x0) 13:15:05 executing program 7: mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, 0x0, 0x0) mremap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) syz_io_uring_setup(0x2e59, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x23}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000500), &(0x7f0000000540)) 13:15:05 executing program 4: mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, 0x0, 0x0) mremap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) syz_io_uring_setup(0x2e59, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x23}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000500), &(0x7f0000000540)) 13:15:05 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x3}, 0x4) close_range(r0, 0xffffffffffffffff, 0x0) 13:15:05 executing program 2: mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, 0x0, 0x0) mremap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) syz_io_uring_setup(0x2e59, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x23}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000500), &(0x7f0000000540)) 13:15:06 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x3}, 0x4) close_range(r0, 0xffffffffffffffff, 0x0) 13:15:06 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x3}, 0x4) close_range(r0, 0xffffffffffffffff, 0x0) 13:15:06 executing program 5: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r1 = dup(r0) setsockopt$inet6_udp_int(r1, 0x11, 0x0, 0x0, 0x0) 13:15:06 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f000000c340)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)={0x14, 0x32, 0xe21, 0x0, 0x0, "", [@generic="8e"]}, 0x14}], 0x1}, 0x0) 13:15:06 executing program 1: socketpair(0x2d, 0x0, 0x0, &(0x7f0000000480)) [ 127.305254] tc_dump_action: action bad kind 13:15:06 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x3}, 0x4) close_range(r0, 0xffffffffffffffff, 0x0) 13:15:06 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x3}, 0x4) close_range(r0, 0xffffffffffffffff, 0x0) 13:15:06 executing program 5: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r1 = dup(r0) setsockopt$inet6_udp_int(r1, 0x11, 0x0, 0x0, 0x0) 13:15:06 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f000000c340)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)={0x14, 0x32, 0xe21, 0x0, 0x0, "", [@generic="8e"]}, 0x14}], 0x1}, 0x0) 13:15:06 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47290ed385e6e3b3}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x0, @in=@broadcast}}, 0xe8) [ 127.385788] tc_dump_action: action bad kind 13:15:06 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47290ed385e6e3b3}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x0, @in=@broadcast}}, 0xe8) 13:15:06 executing program 5: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r1 = dup(r0) setsockopt$inet6_udp_int(r1, 0x11, 0x0, 0x0, 0x0) 13:15:06 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f000000c340)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)={0x14, 0x32, 0xe21, 0x0, 0x0, "", [@generic="8e"]}, 0x14}], 0x1}, 0x0) 13:15:06 executing program 2: r0 = msgget(0x3, 0x0) msgsnd(r0, &(0x7f0000000000)={0x3, "623b57efd3953eec5c5fb075d81c1c63befd1d0693e40f7fb98550fa935f5671881b62f32d4338500818627a4e2718bda8ce2b0c5921f47dd59d93b0c7656a3b3884cf0b5a540e784ed77c3c92d2a5b547e2b9dcaffa5efe444d0b5b4b333178edba7c38c237da9b3b085c8e220b7eba4e3ea02584501e8e03df0ce041e1eab5aeed25a8cd7e13524a709c83d732064fcd2a041752e5277b22095323729e81fa25c2e6fd1e94bbb847b6b25f16f7addd150172fe62f0c0d4f76952c28cbb3a74bab4a1e32449bb571debb25f8523ede2c4887a30e5b9e09ce0b60a1126ced385a7cd1af64f4f092443774b96551891c9"}, 0xf8, 0x0) msgctl$MSG_INFO(r0, 0xc, &(0x7f0000000100)=""/63) r1 = msgget$private(0x0, 0x408) msgctl$MSG_STAT(r1, 0xb, &(0x7f0000000140)=""/231) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000240)={{0x2, 0xee00, 0xffffffffffffffff, 0xee01, 0xee01, 0x65, 0x8001}, 0x0, 0x0, 0x9, 0x4, 0xdd47, 0x3, 0x2, 0x6, 0x0, 0x102, 0xffffffffffffffff}) r2 = msgget(0x3, 0x81) msgctl$IPC_RMID(r2, 0x0) msgctl$IPC_INFO(r0, 0x3, &(0x7f00000002c0)=""/162) msgget$private(0x0, 0x84) msgget(0x2, 0x20) msgget$private(0x0, 0x0) msgctl$MSG_STAT_ANY(0x0, 0xd, &(0x7f0000000380)=""/28) 13:15:06 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47290ed385e6e3b3}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x0, @in=@broadcast}}, 0xe8) 13:15:06 executing program 1: socketpair(0x2d, 0x0, 0x0, &(0x7f0000000480)) 13:15:06 executing program 2: r0 = msgget(0x3, 0x0) msgsnd(r0, &(0x7f0000000000)={0x3, "623b57efd3953eec5c5fb075d81c1c63befd1d0693e40f7fb98550fa935f5671881b62f32d4338500818627a4e2718bda8ce2b0c5921f47dd59d93b0c7656a3b3884cf0b5a540e784ed77c3c92d2a5b547e2b9dcaffa5efe444d0b5b4b333178edba7c38c237da9b3b085c8e220b7eba4e3ea02584501e8e03df0ce041e1eab5aeed25a8cd7e13524a709c83d732064fcd2a041752e5277b22095323729e81fa25c2e6fd1e94bbb847b6b25f16f7addd150172fe62f0c0d4f76952c28cbb3a74bab4a1e32449bb571debb25f8523ede2c4887a30e5b9e09ce0b60a1126ced385a7cd1af64f4f092443774b96551891c9"}, 0xf8, 0x0) msgctl$MSG_INFO(r0, 0xc, &(0x7f0000000100)=""/63) r1 = msgget$private(0x0, 0x408) msgctl$MSG_STAT(r1, 0xb, &(0x7f0000000140)=""/231) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000240)={{0x2, 0xee00, 0xffffffffffffffff, 0xee01, 0xee01, 0x65, 0x8001}, 0x0, 0x0, 0x9, 0x4, 0xdd47, 0x3, 0x2, 0x6, 0x0, 0x102, 0xffffffffffffffff}) r2 = msgget(0x3, 0x81) msgctl$IPC_RMID(r2, 0x0) msgctl$IPC_INFO(r0, 0x3, &(0x7f00000002c0)=""/162) msgget$private(0x0, 0x84) msgget(0x2, 0x20) msgget$private(0x0, 0x0) msgctl$MSG_STAT_ANY(0x0, 0xd, &(0x7f0000000380)=""/28) 13:15:06 executing program 7: r0 = msgget(0x3, 0x0) msgsnd(r0, &(0x7f0000000000)={0x3, "623b57efd3953eec5c5fb075d81c1c63befd1d0693e40f7fb98550fa935f5671881b62f32d4338500818627a4e2718bda8ce2b0c5921f47dd59d93b0c7656a3b3884cf0b5a540e784ed77c3c92d2a5b547e2b9dcaffa5efe444d0b5b4b333178edba7c38c237da9b3b085c8e220b7eba4e3ea02584501e8e03df0ce041e1eab5aeed25a8cd7e13524a709c83d732064fcd2a041752e5277b22095323729e81fa25c2e6fd1e94bbb847b6b25f16f7addd150172fe62f0c0d4f76952c28cbb3a74bab4a1e32449bb571debb25f8523ede2c4887a30e5b9e09ce0b60a1126ced385a7cd1af64f4f092443774b96551891c9"}, 0xf8, 0x0) msgctl$MSG_INFO(r0, 0xc, &(0x7f0000000100)=""/63) r1 = msgget$private(0x0, 0x408) msgctl$MSG_STAT(r1, 0xb, &(0x7f0000000140)=""/231) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000240)={{0x2, 0xee00, 0xffffffffffffffff, 0xee01, 0xee01, 0x65, 0x8001}, 0x0, 0x0, 0x9, 0x4, 0xdd47, 0x3, 0x2, 0x6, 0x0, 0x102, 0xffffffffffffffff}) r2 = msgget(0x3, 0x81) msgctl$IPC_RMID(r2, 0x0) msgctl$IPC_INFO(r0, 0x3, &(0x7f00000002c0)=""/162) msgget$private(0x0, 0x84) msgget(0x2, 0x20) msgget$private(0x0, 0x0) msgctl$MSG_STAT_ANY(0x0, 0xd, &(0x7f0000000380)=""/28) [ 127.473591] tc_dump_action: action bad kind 13:15:06 executing program 0: r0 = syz_io_uring_setup(0x5823, &(0x7f0000000440), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00000004c0), &(0x7f0000000500)) r1 = memfd_create(&(0x7f0000000040)='/dev/vcsa\x00', 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x401a012, r1, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x8, &(0x7f0000000540), 0x0) 13:15:06 executing program 6: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x3, &(0x7f0000000380)={0x6, {}, {{0x2, 0x0, @local}}}, 0x108) sendmmsg$inet(r0, &(0x7f0000004cc0)=[{{&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000080)="592dd67e0200000000010200000000000000000093e0959f652315edfed58f111bd616eb", 0x2c}], 0x1}}], 0x1, 0x0) 13:15:06 executing program 5: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r1 = dup(r0) setsockopt$inet6_udp_int(r1, 0x11, 0x0, 0x0, 0x0) 13:15:06 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47290ed385e6e3b3}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x0, @in=@broadcast}}, 0xe8) 13:15:06 executing program 6: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x3, &(0x7f0000000380)={0x6, {}, {{0x2, 0x0, @local}}}, 0x108) sendmmsg$inet(r0, &(0x7f0000004cc0)=[{{&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000080)="592dd67e0200000000010200000000000000000093e0959f652315edfed58f111bd616eb", 0x2c}], 0x1}}], 0x1, 0x0) 13:15:06 executing program 7: r0 = msgget(0x3, 0x0) msgsnd(r0, &(0x7f0000000000)={0x3, "623b57efd3953eec5c5fb075d81c1c63befd1d0693e40f7fb98550fa935f5671881b62f32d4338500818627a4e2718bda8ce2b0c5921f47dd59d93b0c7656a3b3884cf0b5a540e784ed77c3c92d2a5b547e2b9dcaffa5efe444d0b5b4b333178edba7c38c237da9b3b085c8e220b7eba4e3ea02584501e8e03df0ce041e1eab5aeed25a8cd7e13524a709c83d732064fcd2a041752e5277b22095323729e81fa25c2e6fd1e94bbb847b6b25f16f7addd150172fe62f0c0d4f76952c28cbb3a74bab4a1e32449bb571debb25f8523ede2c4887a30e5b9e09ce0b60a1126ced385a7cd1af64f4f092443774b96551891c9"}, 0xf8, 0x0) msgctl$MSG_INFO(r0, 0xc, &(0x7f0000000100)=""/63) r1 = msgget$private(0x0, 0x408) msgctl$MSG_STAT(r1, 0xb, &(0x7f0000000140)=""/231) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000240)={{0x2, 0xee00, 0xffffffffffffffff, 0xee01, 0xee01, 0x65, 0x8001}, 0x0, 0x0, 0x9, 0x4, 0xdd47, 0x3, 0x2, 0x6, 0x0, 0x102, 0xffffffffffffffff}) r2 = msgget(0x3, 0x81) msgctl$IPC_RMID(r2, 0x0) msgctl$IPC_INFO(r0, 0x3, &(0x7f00000002c0)=""/162) msgget$private(0x0, 0x84) msgget(0x2, 0x20) msgget$private(0x0, 0x0) msgctl$MSG_STAT_ANY(0x0, 0xd, &(0x7f0000000380)=""/28) 13:15:06 executing program 2: r0 = msgget(0x3, 0x0) msgsnd(r0, &(0x7f0000000000)={0x3, "623b57efd3953eec5c5fb075d81c1c63befd1d0693e40f7fb98550fa935f5671881b62f32d4338500818627a4e2718bda8ce2b0c5921f47dd59d93b0c7656a3b3884cf0b5a540e784ed77c3c92d2a5b547e2b9dcaffa5efe444d0b5b4b333178edba7c38c237da9b3b085c8e220b7eba4e3ea02584501e8e03df0ce041e1eab5aeed25a8cd7e13524a709c83d732064fcd2a041752e5277b22095323729e81fa25c2e6fd1e94bbb847b6b25f16f7addd150172fe62f0c0d4f76952c28cbb3a74bab4a1e32449bb571debb25f8523ede2c4887a30e5b9e09ce0b60a1126ced385a7cd1af64f4f092443774b96551891c9"}, 0xf8, 0x0) msgctl$MSG_INFO(r0, 0xc, &(0x7f0000000100)=""/63) r1 = msgget$private(0x0, 0x408) msgctl$MSG_STAT(r1, 0xb, &(0x7f0000000140)=""/231) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000240)={{0x2, 0xee00, 0xffffffffffffffff, 0xee01, 0xee01, 0x65, 0x8001}, 0x0, 0x0, 0x9, 0x4, 0xdd47, 0x3, 0x2, 0x6, 0x0, 0x102, 0xffffffffffffffff}) r2 = msgget(0x3, 0x81) msgctl$IPC_RMID(r2, 0x0) msgctl$IPC_INFO(r0, 0x3, &(0x7f00000002c0)=""/162) msgget$private(0x0, 0x84) msgget(0x2, 0x20) msgget$private(0x0, 0x0) msgctl$MSG_STAT_ANY(0x0, 0xd, &(0x7f0000000380)=""/28) 13:15:06 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f000000c340)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)={0x14, 0x32, 0xe21, 0x0, 0x0, "", [@generic="8e"]}, 0x14}], 0x1}, 0x0) 13:15:06 executing program 0: r0 = syz_io_uring_setup(0x5823, &(0x7f0000000440), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00000004c0), &(0x7f0000000500)) r1 = memfd_create(&(0x7f0000000040)='/dev/vcsa\x00', 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x401a012, r1, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x8, &(0x7f0000000540), 0x0) 13:15:06 executing program 1: socketpair(0x2d, 0x0, 0x0, &(0x7f0000000480)) 13:15:06 executing program 5: r0 = syz_io_uring_setup(0x5823, &(0x7f0000000440), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00000004c0), &(0x7f0000000500)) r1 = memfd_create(&(0x7f0000000040)='/dev/vcsa\x00', 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x401a012, r1, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x8, &(0x7f0000000540), 0x0) [ 127.592058] tc_dump_action: action bad kind 13:15:06 executing program 7: r0 = msgget(0x3, 0x0) msgsnd(r0, &(0x7f0000000000)={0x3, "623b57efd3953eec5c5fb075d81c1c63befd1d0693e40f7fb98550fa935f5671881b62f32d4338500818627a4e2718bda8ce2b0c5921f47dd59d93b0c7656a3b3884cf0b5a540e784ed77c3c92d2a5b547e2b9dcaffa5efe444d0b5b4b333178edba7c38c237da9b3b085c8e220b7eba4e3ea02584501e8e03df0ce041e1eab5aeed25a8cd7e13524a709c83d732064fcd2a041752e5277b22095323729e81fa25c2e6fd1e94bbb847b6b25f16f7addd150172fe62f0c0d4f76952c28cbb3a74bab4a1e32449bb571debb25f8523ede2c4887a30e5b9e09ce0b60a1126ced385a7cd1af64f4f092443774b96551891c9"}, 0xf8, 0x0) msgctl$MSG_INFO(r0, 0xc, &(0x7f0000000100)=""/63) r1 = msgget$private(0x0, 0x408) msgctl$MSG_STAT(r1, 0xb, &(0x7f0000000140)=""/231) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000240)={{0x2, 0xee00, 0xffffffffffffffff, 0xee01, 0xee01, 0x65, 0x8001}, 0x0, 0x0, 0x9, 0x4, 0xdd47, 0x3, 0x2, 0x6, 0x0, 0x102, 0xffffffffffffffff}) r2 = msgget(0x3, 0x81) msgctl$IPC_RMID(r2, 0x0) msgctl$IPC_INFO(r0, 0x3, &(0x7f00000002c0)=""/162) msgget$private(0x0, 0x84) msgget(0x2, 0x20) msgget$private(0x0, 0x0) msgctl$MSG_STAT_ANY(0x0, 0xd, &(0x7f0000000380)=""/28) 13:15:06 executing program 2: r0 = msgget(0x3, 0x0) msgsnd(r0, &(0x7f0000000000)={0x3, "623b57efd3953eec5c5fb075d81c1c63befd1d0693e40f7fb98550fa935f5671881b62f32d4338500818627a4e2718bda8ce2b0c5921f47dd59d93b0c7656a3b3884cf0b5a540e784ed77c3c92d2a5b547e2b9dcaffa5efe444d0b5b4b333178edba7c38c237da9b3b085c8e220b7eba4e3ea02584501e8e03df0ce041e1eab5aeed25a8cd7e13524a709c83d732064fcd2a041752e5277b22095323729e81fa25c2e6fd1e94bbb847b6b25f16f7addd150172fe62f0c0d4f76952c28cbb3a74bab4a1e32449bb571debb25f8523ede2c4887a30e5b9e09ce0b60a1126ced385a7cd1af64f4f092443774b96551891c9"}, 0xf8, 0x0) msgctl$MSG_INFO(r0, 0xc, &(0x7f0000000100)=""/63) r1 = msgget$private(0x0, 0x408) msgctl$MSG_STAT(r1, 0xb, &(0x7f0000000140)=""/231) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000240)={{0x2, 0xee00, 0xffffffffffffffff, 0xee01, 0xee01, 0x65, 0x8001}, 0x0, 0x0, 0x9, 0x4, 0xdd47, 0x3, 0x2, 0x6, 0x0, 0x102, 0xffffffffffffffff}) r2 = msgget(0x3, 0x81) msgctl$IPC_RMID(r2, 0x0) msgctl$IPC_INFO(r0, 0x3, &(0x7f00000002c0)=""/162) msgget$private(0x0, 0x84) msgget(0x2, 0x20) msgget$private(0x0, 0x0) msgctl$MSG_STAT_ANY(0x0, 0xd, &(0x7f0000000380)=""/28) 13:15:06 executing program 6: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x3, &(0x7f0000000380)={0x6, {}, {{0x2, 0x0, @local}}}, 0x108) sendmmsg$inet(r0, &(0x7f0000004cc0)=[{{&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000080)="592dd67e0200000000010200000000000000000093e0959f652315edfed58f111bd616eb", 0x2c}], 0x1}}], 0x1, 0x0) 13:15:06 executing program 5: r0 = syz_io_uring_setup(0x5823, &(0x7f0000000440), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00000004c0), &(0x7f0000000500)) r1 = memfd_create(&(0x7f0000000040)='/dev/vcsa\x00', 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x401a012, r1, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x8, &(0x7f0000000540), 0x0) 13:15:06 executing program 0: r0 = syz_io_uring_setup(0x5823, &(0x7f0000000440), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00000004c0), &(0x7f0000000500)) r1 = memfd_create(&(0x7f0000000040)='/dev/vcsa\x00', 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x401a012, r1, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x8, &(0x7f0000000540), 0x0) 13:15:06 executing program 3: r0 = syz_io_uring_setup(0x5823, &(0x7f0000000440), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00000004c0), &(0x7f0000000500)) r1 = memfd_create(&(0x7f0000000040)='/dev/vcsa\x00', 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x401a012, r1, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x8, &(0x7f0000000540), 0x0) 13:15:06 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x3, &(0x7f0000000380)={0x6, {}, {{0x2, 0x0, @local}}}, 0x108) sendmmsg$inet(r0, &(0x7f0000004cc0)=[{{&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000080)="592dd67e0200000000010200000000000000000093e0959f652315edfed58f111bd616eb", 0x2c}], 0x1}}], 0x1, 0x0) 13:15:06 executing program 1: socketpair(0x2d, 0x0, 0x0, &(0x7f0000000480)) 13:15:06 executing program 6: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x3, &(0x7f0000000380)={0x6, {}, {{0x2, 0x0, @local}}}, 0x108) sendmmsg$inet(r0, &(0x7f0000004cc0)=[{{&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000080)="592dd67e0200000000010200000000000000000093e0959f652315edfed58f111bd616eb", 0x2c}], 0x1}}], 0x1, 0x0) 13:15:06 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000009c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_REG(r0, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={&(0x7f0000000a00)={0x14, r1, 0x1}, 0x14}}, 0x0) 13:15:06 executing program 3: r0 = syz_io_uring_setup(0x5823, &(0x7f0000000440), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00000004c0), &(0x7f0000000500)) r1 = memfd_create(&(0x7f0000000040)='/dev/vcsa\x00', 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x401a012, r1, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x8, &(0x7f0000000540), 0x0) 13:15:06 executing program 5: r0 = syz_io_uring_setup(0x5823, &(0x7f0000000440), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00000004c0), &(0x7f0000000500)) r1 = memfd_create(&(0x7f0000000040)='/dev/vcsa\x00', 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x401a012, r1, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x8, &(0x7f0000000540), 0x0) 13:15:06 executing program 0: r0 = syz_io_uring_setup(0x5823, &(0x7f0000000440), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00000004c0), &(0x7f0000000500)) r1 = memfd_create(&(0x7f0000000040)='/dev/vcsa\x00', 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x401a012, r1, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x8, &(0x7f0000000540), 0x0) 13:15:06 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x3, &(0x7f0000000380)={0x6, {}, {{0x2, 0x0, @local}}}, 0x108) sendmmsg$inet(r0, &(0x7f0000004cc0)=[{{&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000080)="592dd67e0200000000010200000000000000000093e0959f652315edfed58f111bd616eb", 0x2c}], 0x1}}], 0x1, 0x0) 13:15:06 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/nfsfs\x00') openat$incfs(r0, &(0x7f0000000240)='.log\x00', 0x0, 0x0) 13:15:06 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/nfsfs\x00') openat$incfs(r0, &(0x7f0000000240)='.log\x00', 0x0, 0x0) 13:15:06 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000009c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_REG(r0, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={&(0x7f0000000a00)={0x14, r1, 0x1}, 0x14}}, 0x0) 13:15:06 executing program 3: r0 = syz_io_uring_setup(0x5823, &(0x7f0000000440), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00000004c0), &(0x7f0000000500)) r1 = memfd_create(&(0x7f0000000040)='/dev/vcsa\x00', 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x401a012, r1, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x8, &(0x7f0000000540), 0x0) 13:15:06 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x3, &(0x7f0000000380)={0x6, {}, {{0x2, 0x0, @local}}}, 0x108) sendmmsg$inet(r0, &(0x7f0000004cc0)=[{{&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000080)="592dd67e0200000000010200000000000000000093e0959f652315edfed58f111bd616eb", 0x2c}], 0x1}}], 0x1, 0x0) 13:15:06 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000009c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_REG(r0, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={&(0x7f0000000a00)={0x14, r1, 0x1}, 0x14}}, 0x0) 13:15:06 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/nfsfs\x00') openat$incfs(r0, &(0x7f0000000240)='.log\x00', 0x0, 0x0) 13:15:06 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x1) ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, &(0x7f0000000040)) ioctl$BTRFS_IOC_QUOTA_RESCAN(r0, 0x4040942c, &(0x7f0000000240)={0x0, 0x8, [0x1, 0xebb, 0x7fffffff, 0x6, 0x0, 0x3]}) io_setup(0x3ff, &(0x7f0000000140)=0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') write$P9_RREMOVE(0xffffffffffffffff, &(0x7f00000002c0)={0x7, 0x7b, 0x1}, 0x7) io_submit(r2, 0x1, &(0x7f0000001340)=[&(0x7f0000001300)={0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x200000}]) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB]) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) ioctl$VFAT_IOCTL_READDIR_BOTH(0xffffffffffffffff, 0x82307201, &(0x7f00000004c0)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r6 = getpgid(0xffffffffffffffff) r7 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r8, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r7}, './file0\x00'}) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x7, 0x1, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x7fffffff}, 0x802c, 0x5d4, 0xfffffff7, 0x7, 0x7, 0xa166, 0x1f49, 0x0, 0x101, 0x0, 0x2}, r6, 0xe, r7, 0x2) dup2(r4, r5) 13:15:06 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9184}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c0000734100", @ANYRES16, @ANYBLOB="010000000000000000007e00000008000300", @ANYRES32=0x0, @ANYBLOB], 0x1c}}, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000480)=""/156, 0x9c}, {&(0x7f00000003c0)=""/41, 0x29}, {&(0x7f0000000540)=""/253, 0xfd}], 0x3, 0x7706170c, 0x4) move_pages(0x0, 0x205f, &(0x7f0000000000), &(0x7f00000011c0), &(0x7f0000000040)=[0x0, 0x0], 0x0) 13:15:06 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f00000009c0)=@allocspi={0xf8, 0x16, 0x1, 0x0, 0x0, {{{@in6=@dev, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {@in6=@remote, 0x0, 0x6c}, @in6=@mcast2}}}, 0xf8}}, 0x0) [ 127.937259] audit: type=1400 audit(1663766106.724:10): avc: denied { write } for pid=4289 comm="syz-executor.6" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 13:15:06 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x1) ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, &(0x7f0000000040)) ioctl$BTRFS_IOC_QUOTA_RESCAN(r0, 0x4040942c, &(0x7f0000000240)={0x0, 0x8, [0x1, 0xebb, 0x7fffffff, 0x6, 0x0, 0x3]}) io_setup(0x3ff, &(0x7f0000000140)=0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') write$P9_RREMOVE(0xffffffffffffffff, &(0x7f00000002c0)={0x7, 0x7b, 0x1}, 0x7) io_submit(r2, 0x1, &(0x7f0000001340)=[&(0x7f0000001300)={0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x200000}]) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB]) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) ioctl$VFAT_IOCTL_READDIR_BOTH(0xffffffffffffffff, 0x82307201, &(0x7f00000004c0)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r6 = getpgid(0xffffffffffffffff) r7 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r8, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r7}, './file0\x00'}) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x7, 0x1, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x7fffffff}, 0x802c, 0x5d4, 0xfffffff7, 0x7, 0x7, 0xa166, 0x1f49, 0x0, 0x101, 0x0, 0x2}, r6, 0xe, r7, 0x2) dup2(r4, r5) 13:15:06 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x29, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='devpts\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) 13:15:06 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000009c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_REG(r0, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={&(0x7f0000000a00)={0x14, r1, 0x1}, 0x14}}, 0x0) 13:15:06 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/nfsfs\x00') openat$incfs(r0, &(0x7f0000000240)='.log\x00', 0x0, 0x0) 13:15:06 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9184}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c0000734100", @ANYRES16, @ANYBLOB="010000000000000000007e00000008000300", @ANYRES32=0x0, @ANYBLOB], 0x1c}}, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000480)=""/156, 0x9c}, {&(0x7f00000003c0)=""/41, 0x29}, {&(0x7f0000000540)=""/253, 0xfd}], 0x3, 0x7706170c, 0x4) move_pages(0x0, 0x205f, &(0x7f0000000000), &(0x7f00000011c0), &(0x7f0000000040)=[0x0, 0x0], 0x0) 13:15:06 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f00000009c0)=@allocspi={0xf8, 0x16, 0x1, 0x0, 0x0, {{{@in6=@dev, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {@in6=@remote, 0x0, 0x6c}, @in6=@mcast2}}}, 0xf8}}, 0x0) 13:15:06 executing program 4: perf_event_open(&(0x7f0000000040)={0x8, 0x80, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:15:06 executing program 3: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9184}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c0000734100", @ANYRES16, @ANYBLOB="010000000000000000007e00000008000300", @ANYRES32=0x0, @ANYBLOB], 0x1c}}, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000480)=""/156, 0x9c}, {&(0x7f00000003c0)=""/41, 0x29}, {&(0x7f0000000540)=""/253, 0xfd}], 0x3, 0x7706170c, 0x4) move_pages(0x0, 0x205f, &(0x7f0000000000), &(0x7f00000011c0), &(0x7f0000000040)=[0x0, 0x0], 0x0) 13:15:06 executing program 4: perf_event_open(&(0x7f0000000040)={0x8, 0x80, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:15:06 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x29, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='devpts\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) 13:15:06 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f00000009c0)=@allocspi={0xf8, 0x16, 0x1, 0x0, 0x0, {{{@in6=@dev, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {@in6=@remote, 0x0, 0x6c}, @in6=@mcast2}}}, 0xf8}}, 0x0) 13:15:06 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x29, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='devpts\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) 13:15:06 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x1) ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, &(0x7f0000000040)) ioctl$BTRFS_IOC_QUOTA_RESCAN(r0, 0x4040942c, &(0x7f0000000240)={0x0, 0x8, [0x1, 0xebb, 0x7fffffff, 0x6, 0x0, 0x3]}) io_setup(0x3ff, &(0x7f0000000140)=0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') write$P9_RREMOVE(0xffffffffffffffff, &(0x7f00000002c0)={0x7, 0x7b, 0x1}, 0x7) io_submit(r2, 0x1, &(0x7f0000001340)=[&(0x7f0000001300)={0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x200000}]) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB]) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) ioctl$VFAT_IOCTL_READDIR_BOTH(0xffffffffffffffff, 0x82307201, &(0x7f00000004c0)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r6 = getpgid(0xffffffffffffffff) r7 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r8, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r7}, './file0\x00'}) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x7, 0x1, 0x5a, 0x0, 0x0, 0x0, 0x200, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x7fffffff}, 0x802c, 0x5d4, 0xfffffff7, 0x7, 0x7, 0xa166, 0x1f49, 0x0, 0x101, 0x0, 0x2}, r6, 0xe, r7, 0x2) dup2(r4, r5) 13:15:07 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x29, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='devpts\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) 13:15:07 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f00000009c0)=@allocspi={0xf8, 0x16, 0x1, 0x0, 0x0, {{{@in6=@dev, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {@in6=@remote, 0x0, 0x6c}, @in6=@mcast2}}}, 0xf8}}, 0x0) 13:15:07 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9184}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c0000734100", @ANYRES16, @ANYBLOB="010000000000000000007e00000008000300", @ANYRES32=0x0, @ANYBLOB], 0x1c}}, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000480)=""/156, 0x9c}, {&(0x7f00000003c0)=""/41, 0x29}, {&(0x7f0000000540)=""/253, 0xfd}], 0x3, 0x7706170c, 0x4) move_pages(0x0, 0x205f, &(0x7f0000000000), &(0x7f00000011c0), &(0x7f0000000040)=[0x0, 0x0], 0x0) 13:15:07 executing program 4: perf_event_open(&(0x7f0000000040)={0x8, 0x80, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:15:07 executing program 3: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9184}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c0000734100", @ANYRES16, @ANYBLOB="010000000000000000007e00000008000300", @ANYRES32=0x0, @ANYBLOB], 0x1c}}, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000480)=""/156, 0x9c}, {&(0x7f00000003c0)=""/41, 0x29}, {&(0x7f0000000540)=""/253, 0xfd}], 0x3, 0x7706170c, 0x4) move_pages(0x0, 0x205f, &(0x7f0000000000), &(0x7f00000011c0), &(0x7f0000000040)=[0x0, 0x0], 0x0) 13:15:07 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x29, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='devpts\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) 13:15:07 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9184}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c0 VM DIAGNOSIS: 13:14:58 Registers: info registers vcpu 0 RAX=0000000000000039 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff822b1c91 RDI=ffffffff87645ba0 RBP=ffffffff87645b60 RSP=ffff88803e5ff3c8 R8 =0000000000000001 R9 =000000000000000a R10=0000000000000039 R11=0000000000000001 R12=0000000000000039 R13=ffffffff87645b60 R14=0000000000000010 R15=ffffffff822b1c80 RIP=ffffffff822b1ce9 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007ff91bc22700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f9592a2f028 CR3=0000000017cb0000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 ffffffffffffffff ffffffffffffffff YMM02=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM03=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM04=0000000000000000 0000000000000000 0000000000000000 00000000000000ff YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=1ffffffff0b77427 RBX=ffffffff85bba13c RCX=ffffffff8178694d RDX=0000000000000000 RSI=ffffffff85edcda6 RDI=ffffffff85bba130 RBP=ffffffff85bba130 RSP=ffff88802f03f430 R8 =ffffffff85edcda6 R9 =ffffffff85e7cda4 R10=ffffed1005e07eac R11=000000000003603d R12=ffffffff85bba14c R13=ffffffff85bba130 R14=ffffffff85bba130 R15=dffffc0000000000 RIP=ffffffff8111ab9f RFL=00000217 [----APC] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f50a04ff44e CR3=000000003f922000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 00ff000000000000 0000000000ff0000 YMM01=0000000000000000 0000000000000000 ff00ffffffffffff ffffffffff00ffff YMM02=0000000000000000 0000000000000000 494c4700362e322e 325f4342494c4700 YMM03=0000000000000000 0000000000000000 0000000000000000 0000000000004700 YMM04=0000000000000000 0000000000000000 4342494c4700362e 322e325f4342494c YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000