Warning: Permanently added '[localhost]:51157' (ECDSA) to the list of known hosts. 2022/09/23 11:47:27 fuzzer started 2022/09/23 11:47:27 dialing manager at localhost:38881 syzkaller login: [ 36.185426] cgroup: Unknown subsys name 'net' [ 36.275202] cgroup: Unknown subsys name 'rlimit' 2022/09/23 11:47:41 syscalls: 2215 2022/09/23 11:47:41 code coverage: enabled 2022/09/23 11:47:41 comparison tracing: enabled 2022/09/23 11:47:41 extra coverage: enabled 2022/09/23 11:47:41 setuid sandbox: enabled 2022/09/23 11:47:41 namespace sandbox: enabled 2022/09/23 11:47:41 Android sandbox: enabled 2022/09/23 11:47:41 fault injection: enabled 2022/09/23 11:47:41 leak checking: enabled 2022/09/23 11:47:41 net packet injection: enabled 2022/09/23 11:47:41 net device setup: enabled 2022/09/23 11:47:41 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/09/23 11:47:41 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/09/23 11:47:41 USB emulation: enabled 2022/09/23 11:47:41 hci packet injection: enabled 2022/09/23 11:47:41 wifi device emulation: failed to parse kernel version (6.0.0-rc6-next-20220923) 2022/09/23 11:47:41 802.15.4 emulation: enabled 2022/09/23 11:47:41 fetching corpus: 0, signal 0/2000 (executing program) 2022/09/23 11:47:41 fetching corpus: 23, signal 17967/21055 (executing program) 2022/09/23 11:47:41 fetching corpus: 41, signal 29756/33425 (executing program) 2022/09/23 11:47:42 fetching corpus: 90, signal 42505/46099 (executing program) 2022/09/23 11:47:42 fetching corpus: 140, signal 48036/51776 (executing program) 2022/09/23 11:47:42 fetching corpus: 190, signal 56041/59254 (executing program) 2022/09/23 11:47:42 fetching corpus: 240, signal 63949/66273 (executing program) 2022/09/23 11:47:42 fetching corpus: 289, signal 68387/70070 (executing program) 2022/09/23 11:47:43 fetching corpus: 339, signal 71799/72911 (executing program) 2022/09/23 11:47:43 fetching corpus: 357, signal 73043/73947 (executing program) 2022/09/23 11:47:43 fetching corpus: 357, signal 73043/74044 (executing program) 2022/09/23 11:47:43 fetching corpus: 357, signal 73043/74136 (executing program) 2022/09/23 11:47:43 fetching corpus: 357, signal 73043/74237 (executing program) 2022/09/23 11:47:43 fetching corpus: 357, signal 73043/74323 (executing program) 2022/09/23 11:47:43 fetching corpus: 357, signal 73043/74418 (executing program) 2022/09/23 11:47:43 fetching corpus: 357, signal 73043/74505 (executing program) 2022/09/23 11:47:43 fetching corpus: 357, signal 73043/74609 (executing program) 2022/09/23 11:47:43 fetching corpus: 357, signal 73043/74701 (executing program) 2022/09/23 11:47:43 fetching corpus: 357, signal 73043/74806 (executing program) 2022/09/23 11:47:43 fetching corpus: 357, signal 73043/74892 (executing program) 2022/09/23 11:47:43 fetching corpus: 357, signal 73043/74983 (executing program) 2022/09/23 11:47:43 fetching corpus: 357, signal 73043/75065 (executing program) 2022/09/23 11:47:43 fetching corpus: 357, signal 73043/75145 (executing program) 2022/09/23 11:47:43 fetching corpus: 357, signal 73043/75235 (executing program) 2022/09/23 11:47:43 fetching corpus: 357, signal 73043/75318 (executing program) 2022/09/23 11:47:43 fetching corpus: 357, signal 73043/75421 (executing program) 2022/09/23 11:47:43 fetching corpus: 357, signal 73043/75516 (executing program) 2022/09/23 11:47:43 fetching corpus: 357, signal 73043/75621 (executing program) 2022/09/23 11:47:43 fetching corpus: 357, signal 73043/75721 (executing program) 2022/09/23 11:47:43 fetching corpus: 357, signal 73043/75810 (executing program) 2022/09/23 11:47:43 fetching corpus: 357, signal 73043/75899 (executing program) 2022/09/23 11:47:43 fetching corpus: 357, signal 73043/75983 (executing program) 2022/09/23 11:47:43 fetching corpus: 357, signal 73043/76075 (executing program) 2022/09/23 11:47:43 fetching corpus: 357, signal 73043/76166 (executing program) 2022/09/23 11:47:43 fetching corpus: 357, signal 73043/76248 (executing program) 2022/09/23 11:47:43 fetching corpus: 357, signal 73043/76334 (executing program) 2022/09/23 11:47:43 fetching corpus: 357, signal 73043/76438 (executing program) 2022/09/23 11:47:43 fetching corpus: 357, signal 73043/76487 (executing program) 2022/09/23 11:47:43 fetching corpus: 357, signal 73043/76487 (executing program) 2022/09/23 11:47:45 starting 8 fuzzer processes 11:47:45 executing program 0: unshare(0x20020400) unshare(0x8000000) unshare(0x4050400) unshare(0x4010280) unshare(0xa040000) unshare(0x60000000) unshare(0x40000) semget$private(0x0, 0x3, 0x141) unshare(0x10000200) unshare(0x2010000) unshare(0x2000000) 11:47:45 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) connect$inet6(r1, &(0x7f00000003c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xff}}}, 0x1c) 11:47:45 executing program 2: syz_io_uring_setup(0x5e2a, &(0x7f0000000000), &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) [ 53.675975] audit: type=1400 audit(1663933665.711:6): avc: denied { execmem } for pid=285 comm="syz-executor.1" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 11:47:45 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=@polexpire={0xcc, 0x1b, 0x1, 0x0, 0x0, {{{@in=@multicast1, @in6=@local}}}, [@policy_type={0xa, 0x10, {0x1}}]}, 0xcc}}, 0x0) 11:47:45 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000000080)=[{{&(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000001640)=[{&(0x7f0000000100)='x', 0x1}], 0x1, &(0x7f00000016c0)=[@ip_tos_int={{0x14}}], 0x18}}], 0x1, 0x0) 11:47:45 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000300), r0) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000980)={&(0x7f0000000880), 0xc, &(0x7f0000000940)={&(0x7f00000008c0)={0x24, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_PAGE={0x5}]}, 0x24}}, 0x0) 11:47:45 executing program 6: fsmount(0xffffffffffffffff, 0x0, 0x0) 11:47:45 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x6) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)={0xc0, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x10, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}]}]}, @ETHTOOL_A_STRSET_HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_STRSET_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_STRSET_STRINGSETS={0x50, 0x2, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}]}]}]}, 0xc0}}, 0x0) [ 54.923467] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 54.924994] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 54.928168] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 54.933462] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 54.936855] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 54.939816] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 54.946740] Bluetooth: hci0: HCI_REQ-0x0c1a [ 54.979937] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 54.981425] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 54.983511] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 54.984695] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 54.988110] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 54.992815] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 54.998178] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 54.999960] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 55.001164] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 55.006329] Bluetooth: hci1: HCI_REQ-0x0c1a [ 55.011189] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 55.018305] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 55.019833] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 55.034341] Bluetooth: hci2: HCI_REQ-0x0c1a [ 55.040266] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 55.042769] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 55.044467] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 55.056692] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 55.058826] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 55.060432] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 55.068339] Bluetooth: hci3: HCI_REQ-0x0c1a [ 55.099963] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 55.101581] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 55.103111] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 55.107054] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 55.108732] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 55.110164] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 55.114287] Bluetooth: hci7: HCI_REQ-0x0c1a [ 55.189010] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 55.198435] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 55.199724] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 55.208124] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 55.210401] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 55.212169] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 55.217642] Bluetooth: hci4: HCI_REQ-0x0c1a [ 57.007869] Bluetooth: hci0: command 0x0409 tx timeout [ 57.071311] Bluetooth: hci2: command 0x0409 tx timeout [ 57.071334] Bluetooth: hci5: Opcode 0x c03 failed: -110 [ 57.072155] Bluetooth: hci1: command 0x0409 tx timeout [ 57.135334] Bluetooth: hci7: command 0x0409 tx timeout [ 57.135353] Bluetooth: hci3: command 0x0409 tx timeout [ 57.137101] Bluetooth: hci6: Opcode 0x c03 failed: -110 [ 57.263433] Bluetooth: hci4: command 0x0409 tx timeout [ 59.055365] Bluetooth: hci0: command 0x041b tx timeout [ 59.119337] Bluetooth: hci2: command 0x041b tx timeout [ 59.120486] Bluetooth: hci1: command 0x041b tx timeout [ 59.183313] Bluetooth: hci3: command 0x041b tx timeout [ 59.184123] Bluetooth: hci7: command 0x041b tx timeout [ 59.311388] Bluetooth: hci4: command 0x041b tx timeout [ 60.267529] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 60.270043] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 60.274101] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 60.293435] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 60.303429] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 60.313978] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 60.331295] Bluetooth: hci5: HCI_REQ-0x0c1a [ 61.103325] Bluetooth: hci0: command 0x040f tx timeout [ 61.167330] Bluetooth: hci1: command 0x040f tx timeout [ 61.167816] Bluetooth: hci2: command 0x040f tx timeout [ 61.231361] Bluetooth: hci7: command 0x040f tx timeout [ 61.231838] Bluetooth: hci3: command 0x040f tx timeout [ 61.359377] Bluetooth: hci4: command 0x040f tx timeout [ 62.383389] Bluetooth: hci5: command 0x0409 tx timeout [ 62.384469] Bluetooth: hci6: Opcode 0x c03 failed: -110 [ 63.151277] Bluetooth: hci0: command 0x0419 tx timeout [ 63.215303] Bluetooth: hci2: command 0x0419 tx timeout [ 63.215746] Bluetooth: hci1: command 0x0419 tx timeout [ 63.279322] Bluetooth: hci3: command 0x0419 tx timeout [ 63.279782] Bluetooth: hci7: command 0x0419 tx timeout [ 63.407348] Bluetooth: hci4: command 0x0419 tx timeout [ 64.431262] Bluetooth: hci5: command 0x041b tx timeout [ 64.756208] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 64.759303] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 64.760038] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 64.761917] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 64.763659] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 64.764747] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 64.770332] Bluetooth: hci6: HCI_REQ-0x0c1a [ 66.480056] Bluetooth: hci5: command 0x040f tx timeout [ 66.799355] Bluetooth: hci6: command 0x0409 tx timeout [ 68.527309] Bluetooth: hci5: command 0x0419 tx timeout [ 68.847335] Bluetooth: hci6: command 0x041b tx timeout [ 70.895264] Bluetooth: hci6: command 0x040f tx timeout [ 72.943437] Bluetooth: hci6: command 0x0419 tx timeout 11:48:37 executing program 2: syz_io_uring_setup(0x5e2a, &(0x7f0000000000), &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) 11:48:37 executing program 2: syz_io_uring_setup(0x5e2a, &(0x7f0000000000), &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) 11:48:37 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=@polexpire={0xcc, 0x1b, 0x1, 0x0, 0x0, {{{@in=@multicast1, @in6=@local}}}, [@policy_type={0xa, 0x10, {0x1}}]}, 0xcc}}, 0x0) 11:48:37 executing program 2: syz_io_uring_setup(0x5e2a, &(0x7f0000000000), &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) 11:48:38 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=@polexpire={0xcc, 0x1b, 0x1, 0x0, 0x0, {{{@in=@multicast1, @in6=@local}}}, [@policy_type={0xa, 0x10, {0x1}}]}, 0xcc}}, 0x0) 11:48:38 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=@polexpire={0xcc, 0x1b, 0x1, 0x0, 0x0, {{{@in=@multicast1, @in6=@local}}}, [@policy_type={0xa, 0x10, {0x1}}]}, 0xcc}}, 0x0) 11:48:38 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) accept4(r0, 0x0, 0x0, 0x0) [ 106.601325] audit: type=1400 audit(1663933718.636:7): avc: denied { open } for pid=3787 comm="syz-executor.3" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 106.604140] audit: type=1400 audit(1663933718.636:8): avc: denied { kernel } for pid=3787 comm="syz-executor.3" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 106.622667] ------------[ cut here ]------------ [ 106.622702] [ 106.622706] ====================================================== [ 106.622713] WARNING: possible circular locking dependency detected [ 106.622719] 6.0.0-rc6-next-20220923 #1 Not tainted [ 106.622731] ------------------------------------------------------ [ 106.622736] syz-executor.3/3789 is trying to acquire lock: [ 106.622748] ffffffff853faaf8 ((console_sem).lock){....}-{2:2}, at: down_trylock+0xe/0x70 [ 106.622814] [ 106.622814] but task is already holding lock: [ 106.622819] ffff88800fcf5c20 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 106.622882] [ 106.622882] which lock already depends on the new lock. [ 106.622882] [ 106.622888] [ 106.622888] the existing dependency chain (in reverse order) is: [ 106.622894] [ 106.622894] -> #3 (&ctx->lock){....}-{2:2}: [ 106.622922] _raw_spin_lock+0x2a/0x40 [ 106.622957] __perf_event_task_sched_out+0x53b/0x18d0 [ 106.622980] __schedule+0xedd/0x2470 [ 106.623005] preempt_schedule_common+0x45/0xc0 [ 106.623031] __cond_resched+0x17/0x30 [ 106.623056] __mutex_lock+0xa3/0x14d0 [ 106.623082] __do_sys_perf_event_open+0x1eec/0x32c0 [ 106.623106] do_syscall_64+0x3b/0x90 [ 106.623136] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 106.623158] [ 106.623158] -> #2 (&rq->__lock){-.-.}-{2:2}: [ 106.623183] _raw_spin_lock_nested+0x30/0x40 [ 106.623216] raw_spin_rq_lock_nested+0x1e/0x30 [ 106.623239] task_fork_fair+0x63/0x4d0 [ 106.623269] sched_cgroup_fork+0x3d0/0x540 [ 106.623295] copy_process+0x4183/0x6e20 [ 106.623314] kernel_clone+0xe7/0x890 [ 106.623331] user_mode_thread+0xad/0xf0 [ 106.623350] rest_init+0x24/0x250 [ 106.623370] arch_call_rest_init+0xf/0x14 [ 106.623401] start_kernel+0x4c1/0x4e6 [ 106.623429] secondary_startup_64_no_verify+0xe0/0xeb [ 106.623454] [ 106.623454] -> #1 (&p->pi_lock){-.-.}-{2:2}: [ 106.623478] _raw_spin_lock_irqsave+0x39/0x60 [ 106.623512] try_to_wake_up+0xab/0x1930 [ 106.623536] up+0x75/0xb0 [ 106.623561] __up_console_sem+0x6e/0x80 [ 106.623590] console_unlock+0x46a/0x590 [ 106.623618] vprintk_emit+0x1bd/0x560 [ 106.623647] vprintk+0x84/0xa0 [ 106.623676] _printk+0xba/0xf1 [ 106.623696] kauditd_hold_skb.cold+0x3f/0x4e [ 106.623726] kauditd_send_queue+0x233/0x290 [ 106.623753] kauditd_thread+0x5da/0x9a0 [ 106.623778] kthread+0x2ed/0x3a0 [ 106.623804] ret_from_fork+0x22/0x30 [ 106.623827] [ 106.623827] -> #0 ((console_sem).lock){....}-{2:2}: [ 106.623852] __lock_acquire+0x2a02/0x5e70 [ 106.623882] lock_acquire+0x1a2/0x530 [ 106.623910] _raw_spin_lock_irqsave+0x39/0x60 [ 106.623944] down_trylock+0xe/0x70 [ 106.623970] __down_trylock_console_sem+0x3b/0xd0 [ 106.623999] vprintk_emit+0x16b/0x560 [ 106.624028] vprintk+0x84/0xa0 [ 106.624057] _printk+0xba/0xf1 [ 106.624075] report_bug.cold+0x72/0xab [ 106.624104] handle_bug+0x3c/0x70 [ 106.624133] exc_invalid_op+0x14/0x50 [ 106.624163] asm_exc_invalid_op+0x16/0x20 [ 106.624184] group_sched_out.part.0+0x2c7/0x460 [ 106.624204] ctx_sched_out+0x8f1/0xc10 [ 106.624223] __perf_event_task_sched_out+0x6d0/0x18d0 [ 106.624245] __schedule+0xedd/0x2470 [ 106.624269] preempt_schedule_common+0x45/0xc0 [ 106.624296] __cond_resched+0x17/0x30 [ 106.624320] __mutex_lock+0xa3/0x14d0 [ 106.624346] __do_sys_perf_event_open+0x1eec/0x32c0 [ 106.624370] do_syscall_64+0x3b/0x90 [ 106.624399] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 106.624422] [ 106.624422] other info that might help us debug this: [ 106.624422] [ 106.624427] Chain exists of: [ 106.624427] (console_sem).lock --> &rq->__lock --> &ctx->lock [ 106.624427] [ 106.624454] Possible unsafe locking scenario: [ 106.624454] [ 106.624458] CPU0 CPU1 [ 106.624462] ---- ---- [ 106.624466] lock(&ctx->lock); [ 106.624477] lock(&rq->__lock); [ 106.624488] lock(&ctx->lock); [ 106.624500] lock((console_sem).lock); [ 106.624510] [ 106.624510] *** DEADLOCK *** [ 106.624510] [ 106.624514] 2 locks held by syz-executor.3/3789: [ 106.624526] #0: ffff88806ce37d18 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x1cf/0x2470 [ 106.624579] #1: ffff88800fcf5c20 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 106.624629] [ 106.624629] stack backtrace: [ 106.624634] CPU: 0 PID: 3789 Comm: syz-executor.3 Not tainted 6.0.0-rc6-next-20220923 #1 [ 106.624656] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 106.624671] Call Trace: [ 106.624677] [ 106.624684] dump_stack_lvl+0x8b/0xb3 [ 106.624717] check_noncircular+0x263/0x2e0 [ 106.624747] ? format_decode+0x26c/0xb50 [ 106.624776] ? print_circular_bug+0x450/0x450 [ 106.624808] ? enable_ptr_key_workfn+0x20/0x20 [ 106.624838] ? format_decode+0x26c/0xb50 [ 106.624871] ? alloc_chain_hlocks+0x1ec/0x5a0 [ 106.624905] __lock_acquire+0x2a02/0x5e70 [ 106.624947] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 106.624980] ? __mutex_add_waiter+0x120/0x120 [ 106.625015] lock_acquire+0x1a2/0x530 [ 106.625046] ? down_trylock+0xe/0x70 [ 106.625077] ? lock_release+0x750/0x750 [ 106.625117] ? vprintk+0x84/0xa0 [ 106.625150] _raw_spin_lock_irqsave+0x39/0x60 [ 106.625185] ? down_trylock+0xe/0x70 [ 106.625214] down_trylock+0xe/0x70 [ 106.625243] ? vprintk+0x84/0xa0 [ 106.625273] __down_trylock_console_sem+0x3b/0xd0 [ 106.625305] vprintk_emit+0x16b/0x560 [ 106.625340] vprintk+0x84/0xa0 [ 106.625372] _printk+0xba/0xf1 [ 106.625393] ? record_print_text.cold+0x16/0x16 [ 106.625424] ? report_bug.cold+0x66/0xab [ 106.625457] ? group_sched_out.part.0+0x2c7/0x460 [ 106.625479] report_bug.cold+0x72/0xab [ 106.625513] handle_bug+0x3c/0x70 [ 106.625545] exc_invalid_op+0x14/0x50 [ 106.625578] asm_exc_invalid_op+0x16/0x20 [ 106.625600] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 106.625625] Code: 5e 41 5f e9 5b bb ef ff e8 56 bb ef ff 65 8b 1d 1b 26 ac 7e 31 ff 89 de e8 f6 b7 ef ff 85 db 0f 84 8a 00 00 00 e8 39 bb ef ff <0f> 0b e9 a5 fe ff ff e8 2d bb ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 106.625646] RSP: 0018:ffff88800ec17978 EFLAGS: 00010006 [ 106.625662] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 106.625676] RDX: ffff888015f7b580 RSI: ffffffff81564fb7 RDI: 0000000000000005 [ 106.625690] RBP: ffff888008668000 R08: 0000000000000005 R09: 0000000000000001 [ 106.625704] R10: 0000000000000000 R11: ffffffff865b001b R12: ffff88800fcf5c00 [ 106.625718] R13: ffff88806ce3d140 R14: ffffffff8547d040 R15: 0000000000000002 [ 106.625740] ? group_sched_out.part.0+0x2c7/0x460 [ 106.625766] ? group_sched_out.part.0+0x2c7/0x460 [ 106.625792] ctx_sched_out+0x8f1/0xc10 [ 106.625817] __perf_event_task_sched_out+0x6d0/0x18d0 [ 106.625847] ? lock_is_held_type+0xd7/0x130 [ 106.625873] ? __perf_cgroup_move+0x160/0x160 [ 106.625895] ? set_next_entity+0x304/0x550 [ 106.625927] ? update_curr+0x267/0x740 [ 106.625962] ? lock_is_held_type+0xd7/0x130 [ 106.625988] __schedule+0xedd/0x2470 [ 106.626020] ? io_schedule_timeout+0x150/0x150 [ 106.626046] ? find_held_lock+0x2c/0x110 [ 106.626077] ? lock_is_held_type+0xd7/0x130 [ 106.626101] ? __cond_resched+0x17/0x30 [ 106.626129] preempt_schedule_common+0x45/0xc0 [ 106.626159] __cond_resched+0x17/0x30 [ 106.626184] __mutex_lock+0xa3/0x14d0 [ 106.626215] ? lock_is_held_type+0xd7/0x130 [ 106.626238] ? __do_sys_perf_event_open+0x1eec/0x32c0 [ 106.626266] ? mutex_lock_io_nested+0x1310/0x1310 [ 106.626296] ? lock_release+0x3b2/0x750 [ 106.626328] ? __up_read+0x192/0x730 [ 106.626355] ? up_write+0x520/0x520 [ 106.626382] ? _raw_spin_unlock_irqrestore+0x28/0x60 [ 106.626409] __do_sys_perf_event_open+0x1eec/0x32c0 [ 106.626441] ? __up_read+0x192/0x730 [ 106.626467] ? perf_compat_ioctl+0x130/0x130 [ 106.626491] ? up_write+0x520/0x520 [ 106.626527] ? syscall_enter_from_user_mode+0x1d/0x50 [ 106.626552] ? syscall_enter_from_user_mode+0x1d/0x50 [ 106.626581] do_syscall_64+0x3b/0x90 [ 106.626613] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 106.626636] RIP: 0033:0x7ff8181bcb19 [ 106.626651] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 106.626672] RSP: 002b:00007ff815732188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 106.626691] RAX: ffffffffffffffda RBX: 00007ff8182cff60 RCX: 00007ff8181bcb19 [ 106.626706] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 0000000020000080 [ 106.626719] RBP: 00007ff818216f6d R08: 0000000000000000 R09: 0000000000000000 [ 106.626732] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000000 [ 106.626746] R13: 00007ffca743904f R14: 00007ff815732300 R15: 0000000000022000 [ 106.626773] [ 106.740582] WARNING: CPU: 0 PID: 3789 at kernel/events/core.c:2309 group_sched_out.part.0+0x2c7/0x460 [ 106.741827] Modules linked in: [ 106.742268] CPU: 0 PID: 3789 Comm: syz-executor.3 Not tainted 6.0.0-rc6-next-20220923 #1 [ 106.743368] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 106.744869] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 106.745603] Code: 5e 41 5f e9 5b bb ef ff e8 56 bb ef ff 65 8b 1d 1b 26 ac 7e 31 ff 89 de e8 f6 b7 ef ff 85 db 0f 84 8a 00 00 00 e8 39 bb ef ff <0f> 0b e9 a5 fe ff ff e8 2d bb ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 106.748021] RSP: 0018:ffff88800ec17978 EFLAGS: 00010006 [ 106.748745] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 106.749694] RDX: ffff888015f7b580 RSI: ffffffff81564fb7 RDI: 0000000000000005 [ 106.750642] RBP: ffff888008668000 R08: 0000000000000005 R09: 0000000000000001 [ 106.751612] R10: 0000000000000000 R11: ffffffff865b001b R12: ffff88800fcf5c00 [ 106.752561] R13: ffff88806ce3d140 R14: ffffffff8547d040 R15: 0000000000000002 [ 106.753519] FS: 00007ff815732700(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 106.754592] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 106.755384] CR2: 00007f54d40d7820 CR3: 000000001832e000 CR4: 0000000000350ef0 [ 106.756343] Call Trace: [ 106.756696] [ 106.757014] ctx_sched_out+0x8f1/0xc10 [ 106.757554] __perf_event_task_sched_out+0x6d0/0x18d0 [ 106.758264] ? lock_is_held_type+0xd7/0x130 [ 106.758863] ? __perf_cgroup_move+0x160/0x160 [ 106.759484] ? set_next_entity+0x304/0x550 [ 106.760073] ? update_curr+0x267/0x740 [ 106.760625] ? lock_is_held_type+0xd7/0x130 [ 106.761222] __schedule+0xedd/0x2470 [ 106.761746] ? io_schedule_timeout+0x150/0x150 [ 106.762377] ? find_held_lock+0x2c/0x110 [ 106.762967] ? lock_is_held_type+0xd7/0x130 [ 106.763556] ? __cond_resched+0x17/0x30 [ 106.764110] preempt_schedule_common+0x45/0xc0 [ 106.764747] __cond_resched+0x17/0x30 [ 106.765275] __mutex_lock+0xa3/0x14d0 [ 106.765802] ? lock_is_held_type+0xd7/0x130 [ 106.766367] ? __do_sys_perf_event_open+0x1eec/0x32c0 [ 106.767064] ? mutex_lock_io_nested+0x1310/0x1310 [ 106.767703] ? lock_release+0x3b2/0x750 [ 106.768235] ? __up_read+0x192/0x730 [ 106.768731] ? up_write+0x520/0x520 [ 106.769226] ? _raw_spin_unlock_irqrestore+0x28/0x60 [ 106.769887] __do_sys_perf_event_open+0x1eec/0x32c0 [ 106.770551] ? __up_read+0x192/0x730 [ 106.771065] ? perf_compat_ioctl+0x130/0x130 [ 106.771650] ? up_write+0x520/0x520 [ 106.772147] ? syscall_enter_from_user_mode+0x1d/0x50 [ 106.772820] ? syscall_enter_from_user_mode+0x1d/0x50 [ 106.773503] do_syscall_64+0x3b/0x90 [ 106.774004] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 106.774680] RIP: 0033:0x7ff8181bcb19 [ 106.775194] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 106.777600] RSP: 002b:00007ff815732188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 106.778611] RAX: ffffffffffffffda RBX: 00007ff8182cff60 RCX: 00007ff8181bcb19 [ 106.779573] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 0000000020000080 [ 106.780526] RBP: 00007ff818216f6d R08: 0000000000000000 R09: 0000000000000000 [ 106.781489] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000000 [ 106.782443] R13: 00007ffca743904f R14: 00007ff815732300 R15: 0000000000022000 [ 106.783423] [ 106.783742] irq event stamp: 678 [ 106.784195] hardirqs last enabled at (677): [] _raw_spin_unlock_irqrestore+0x28/0x60 [ 106.785416] hardirqs last disabled at (678): [] __schedule+0x1225/0x2470 [ 106.786490] softirqs last enabled at (674): [] __irq_exit_rcu+0x11b/0x180 [ 106.787615] softirqs last disabled at (669): [] __irq_exit_rcu+0x11b/0x180 [ 106.788736] ---[ end trace 0000000000000000 ]--- 11:48:38 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x40b01, 0x0) ioctl$CDROMREADMODE1(r0, 0x40081271, &(0x7f0000000080)={0x0, 0x4}) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 11:48:42 executing program 0: unshare(0x20020400) unshare(0x8000000) unshare(0x4050400) unshare(0x4010280) unshare(0xa040000) unshare(0x60000000) unshare(0x40000) semget$private(0x0, 0x3, 0x141) unshare(0x10000200) unshare(0x2010000) unshare(0x2000000) 11:48:42 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x6) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)={0xc0, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x10, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}]}]}, @ETHTOOL_A_STRSET_HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_STRSET_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_STRSET_STRINGSETS={0x50, 0x2, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}]}]}]}, 0xc0}}, 0x0) 11:48:42 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000000080)=[{{&(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000001640)=[{&(0x7f0000000100)='x', 0x1}], 0x1, &(0x7f00000016c0)=[@ip_tos_int={{0x14}}], 0x18}}], 0x1, 0x0) 11:48:42 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000300), r0) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000980)={&(0x7f0000000880), 0xc, &(0x7f0000000940)={&(0x7f00000008c0)={0x24, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_PAGE={0x5}]}, 0x24}}, 0x0) 11:48:42 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) connect$inet6(r1, &(0x7f00000003c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xff}}}, 0x1c) 11:48:42 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) accept4(r0, 0x0, 0x0, 0x0) 11:48:42 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x40b01, 0x0) ioctl$CDROMREADMODE1(r0, 0x40081271, &(0x7f0000000080)={0x0, 0x4}) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 11:48:42 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x40b01, 0x0) ioctl$CDROMREADMODE1(r0, 0x40081271, &(0x7f0000000080)={0x0, 0x4}) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 11:48:42 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) connect$inet6(r1, &(0x7f00000003c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xff}}}, 0x1c) 11:48:42 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000000080)=[{{&(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000001640)=[{&(0x7f0000000100)='x', 0x1}], 0x1, &(0x7f00000016c0)=[@ip_tos_int={{0x14}}], 0x18}}], 0x1, 0x0) 11:48:42 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) accept4(r0, 0x0, 0x0, 0x0) 11:48:42 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000300), r0) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000980)={&(0x7f0000000880), 0xc, &(0x7f0000000940)={&(0x7f00000008c0)={0x24, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_PAGE={0x5}]}, 0x24}}, 0x0) 11:48:42 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000000080)=[{{&(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000001640)=[{&(0x7f0000000100)='x', 0x1}], 0x1, &(0x7f00000016c0)=[@ip_tos_int={{0x14}}], 0x18}}], 0x1, 0x0) 11:48:42 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x6) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)={0xc0, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x10, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}]}]}, @ETHTOOL_A_STRSET_HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_STRSET_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_STRSET_STRINGSETS={0x50, 0x2, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}]}]}]}, 0xc0}}, 0x0) 11:48:42 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) accept4(r0, 0x0, 0x0, 0x0) 11:48:42 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x40b01, 0x0) ioctl$CDROMREADMODE1(r0, 0x40081271, &(0x7f0000000080)={0x0, 0x4}) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 11:48:42 executing program 0: unshare(0x20020400) unshare(0x8000000) unshare(0x4050400) unshare(0x4010280) unshare(0xa040000) unshare(0x60000000) unshare(0x40000) semget$private(0x0, 0x3, 0x141) unshare(0x10000200) unshare(0x2010000) unshare(0x2000000) 11:48:42 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) connect$inet6(r1, &(0x7f00000003c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xff}}}, 0x1c) 11:48:42 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000300), r0) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000980)={&(0x7f0000000880), 0xc, &(0x7f0000000940)={&(0x7f00000008c0)={0x24, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_PAGE={0x5}]}, 0x24}}, 0x0) 11:48:42 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x6) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)={0xc0, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x10, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}]}]}, @ETHTOOL_A_STRSET_HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_STRSET_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_STRSET_STRINGSETS={0x50, 0x2, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}]}]}]}, 0xc0}}, 0x0) 11:48:42 executing program 4: unshare(0x20020400) unshare(0x8000000) unshare(0x4050400) unshare(0x4010280) unshare(0xa040000) unshare(0x60000000) unshare(0x40000) semget$private(0x0, 0x3, 0x141) unshare(0x10000200) unshare(0x2010000) unshare(0x2000000) 11:48:42 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x40b01, 0x0) ioctl$CDROMREADMODE1(r0, 0x40081271, &(0x7f0000000080)={0x0, 0x4}) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 11:48:42 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x40b01, 0x0) ioctl$CDROMREADMODE1(r0, 0x40081271, &(0x7f0000000080)={0x0, 0x4}) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 11:48:42 executing program 2: unshare(0x20020400) unshare(0x8000000) unshare(0x4050400) unshare(0x4010280) unshare(0xa040000) unshare(0x60000000) unshare(0x40000) semget$private(0x0, 0x3, 0x141) unshare(0x10000200) unshare(0x2010000) unshare(0x2000000) 11:48:42 executing program 2: unshare(0x20020400) unshare(0x8000000) unshare(0x4050400) unshare(0x4010280) unshare(0xa040000) unshare(0x60000000) unshare(0x40000) semget$private(0x0, 0x3, 0x141) unshare(0x10000200) unshare(0x2010000) unshare(0x2000000) 11:48:42 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x40b01, 0x0) ioctl$CDROMREADMODE1(r0, 0x40081271, &(0x7f0000000080)={0x0, 0x4}) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 11:48:42 executing program 4: unshare(0x20020400) unshare(0x8000000) unshare(0x4050400) unshare(0x4010280) unshare(0xa040000) unshare(0x60000000) unshare(0x40000) semget$private(0x0, 0x3, 0x141) unshare(0x10000200) unshare(0x2010000) unshare(0x2000000) 11:48:43 executing program 0: unshare(0x20020400) unshare(0x8000000) unshare(0x4050400) unshare(0x4010280) unshare(0xa040000) unshare(0x60000000) unshare(0x40000) semget$private(0x0, 0x3, 0x141) unshare(0x10000200) unshare(0x2010000) unshare(0x2000000) 11:48:43 executing program 7: unshare(0x20020400) unshare(0x8000000) unshare(0x4050400) unshare(0x4010280) unshare(0xa040000) unshare(0x60000000) unshare(0x40000) semget$private(0x0, 0x3, 0x141) unshare(0x10000200) unshare(0x2010000) unshare(0x2000000) 11:48:43 executing program 5: unshare(0x20020400) unshare(0x8000000) unshare(0x4050400) unshare(0x4010280) unshare(0xa040000) unshare(0x60000000) unshare(0x40000) semget$private(0x0, 0x3, 0x141) unshare(0x10000200) unshare(0x2010000) unshare(0x2000000) 11:48:43 executing program 1: unshare(0x20020400) unshare(0x8000000) unshare(0x4050400) unshare(0x4010280) unshare(0xa040000) unshare(0x60000000) unshare(0x40000) semget$private(0x0, 0x3, 0x141) unshare(0x10000200) unshare(0x2010000) unshare(0x2000000) 11:48:43 executing program 2: unshare(0x20020400) unshare(0x8000000) unshare(0x4050400) unshare(0x4010280) unshare(0xa040000) unshare(0x60000000) unshare(0x40000) semget$private(0x0, 0x3, 0x141) unshare(0x10000200) unshare(0x2010000) unshare(0x2000000) 11:48:43 executing program 4: unshare(0x20020400) unshare(0x8000000) unshare(0x4050400) unshare(0x4010280) unshare(0xa040000) unshare(0x60000000) unshare(0x40000) semget$private(0x0, 0x3, 0x141) unshare(0x10000200) unshare(0x2010000) unshare(0x2000000) 11:48:43 executing program 3: unshare(0x20020400) unshare(0x8000000) unshare(0x4050400) unshare(0x4010280) unshare(0xa040000) unshare(0x60000000) unshare(0x40000) semget$private(0x0, 0x3, 0x141) unshare(0x10000200) unshare(0x2010000) unshare(0x2000000) 11:48:43 executing program 5: unshare(0x20020400) unshare(0x8000000) unshare(0x4050400) unshare(0x4010280) unshare(0xa040000) unshare(0x60000000) unshare(0x40000) semget$private(0x0, 0x3, 0x141) unshare(0x10000200) unshare(0x2010000) unshare(0x2000000) 11:48:43 executing program 7: unshare(0x20020400) unshare(0x8000000) unshare(0x4050400) unshare(0x4010280) unshare(0xa040000) unshare(0x60000000) unshare(0x40000) semget$private(0x0, 0x3, 0x141) unshare(0x10000200) unshare(0x2010000) unshare(0x2000000) 11:48:43 executing program 5: unshare(0x20020400) unshare(0x8000000) unshare(0x4050400) unshare(0x4010280) unshare(0xa040000) unshare(0x60000000) unshare(0x40000) semget$private(0x0, 0x3, 0x141) unshare(0x10000200) unshare(0x2010000) unshare(0x2000000) 11:48:43 executing program 3: unshare(0x20020400) unshare(0x8000000) unshare(0x4050400) unshare(0x4010280) unshare(0xa040000) unshare(0x60000000) unshare(0x40000) semget$private(0x0, 0x3, 0x141) unshare(0x10000200) unshare(0x2010000) unshare(0x2000000) 11:48:43 executing program 1: unshare(0x20020400) unshare(0x8000000) unshare(0x4050400) unshare(0x4010280) unshare(0xa040000) unshare(0x60000000) unshare(0x40000) semget$private(0x0, 0x3, 0x141) unshare(0x10000200) unshare(0x2010000) unshare(0x2000000) 11:48:43 executing program 6: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000300), r0) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000980)={&(0x7f0000000880), 0xc, &(0x7f0000000940)={&(0x7f00000008c0)={0x24, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_PAGE={0x5}]}, 0x24}}, 0x0) 11:48:43 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x40b01, 0x0) ioctl$CDROMREADMODE1(r0, 0x40081271, &(0x7f0000000080)={0x0, 0x4}) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 11:48:43 executing program 2: socketpair(0x0, 0x0, 0x0, &(0x7f0000000440)) 11:48:43 executing program 7: unshare(0x20020400) unshare(0x8000000) unshare(0x4050400) unshare(0x4010280) unshare(0xa040000) unshare(0x60000000) unshare(0x40000) semget$private(0x0, 0x3, 0x141) unshare(0x10000200) unshare(0x2010000) unshare(0x2000000) 11:48:43 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/slabinfo\x00', 0x0, 0x0) readv(r0, &(0x7f0000001600)=[{&(0x7f0000000600)=""/4096, 0x1000}], 0x1) 11:48:43 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x40b01, 0x0) ioctl$CDROMREADMODE1(r0, 0x40081271, &(0x7f0000000080)={0x0, 0x4}) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 11:48:43 executing program 5: syz_mount_image$vfat(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_rdma(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="7472616e733d72f5eeb6a088740740c2c066fd0ebaab3ea8a9756759834f09d6cea49a3ea6808f64e52ef148f7860777597486b340af70f6982a60"]) 11:48:43 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/slabinfo\x00', 0x0, 0x0) readv(r0, &(0x7f0000001600)=[{&(0x7f0000000600)=""/4096, 0x1000}], 0x1) [ 111.276116] 9pnet: Could not find request transport: rt@f>ugYO Τ>d.HwYt@p*` 11:48:43 executing program 5: syz_mount_image$vfat(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_rdma(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="7472616e733d72f5eeb6a088740740c2c066fd0ebaab3ea8a9756759834f09d6cea49a3ea6808f64e52ef148f7860777597486b340af70f6982a60"]) 11:48:43 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x40b01, 0x0) ioctl$CDROMREADMODE1(r0, 0x40081271, &(0x7f0000000080)={0x0, 0x4}) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 11:48:43 executing program 1: unshare(0x20020400) unshare(0x8000000) unshare(0x4050400) unshare(0x4010280) unshare(0xa040000) unshare(0x60000000) unshare(0x40000) semget$private(0x0, 0x3, 0x141) unshare(0x10000200) unshare(0x2010000) unshare(0x2000000) 11:48:43 executing program 6: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000300), r0) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000980)={&(0x7f0000000880), 0xc, &(0x7f0000000940)={&(0x7f00000008c0)={0x24, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_PAGE={0x5}]}, 0x24}}, 0x0) 11:48:43 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/slabinfo\x00', 0x0, 0x0) readv(r0, &(0x7f0000001600)=[{&(0x7f0000000600)=""/4096, 0x1000}], 0x1) 11:48:43 executing program 3: unshare(0x20020400) unshare(0x8000000) unshare(0x4050400) unshare(0x4010280) unshare(0xa040000) unshare(0x60000000) unshare(0x40000) semget$private(0x0, 0x3, 0x141) unshare(0x10000200) unshare(0x2010000) unshare(0x2000000) [ 111.388638] 9pnet: Could not find request transport: rt@f>ugYO Τ>d.HwYt@p*` 11:48:43 executing program 7: syz_mount_image$vfat(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_rdma(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="7472616e733d72f5eeb6a088740740c2c066fd0ebaab3ea8a9756759834f09d6cea49a3ea6808f64e52ef148f7860777597486b340af70f6982a60"]) 11:48:43 executing program 5: syz_mount_image$vfat(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_rdma(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="7472616e733d72f5eeb6a088740740c2c066fd0ebaab3ea8a9756759834f09d6cea49a3ea6808f64e52ef148f7860777597486b340af70f6982a60"]) [ 111.491335] 9pnet: Could not find request transport: rt@f>ugYO Τ>d.HwYt@p*` [ 111.518523] 9pnet: Could not find request transport: rt@f>ugYO Τ>d.HwYt@p*` 11:48:43 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/slabinfo\x00', 0x0, 0x0) readv(r0, &(0x7f0000001600)=[{&(0x7f0000000600)=""/4096, 0x1000}], 0x1) 11:48:43 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/slabinfo\x00', 0x0, 0x0) readv(r0, &(0x7f0000001600)=[{&(0x7f0000000600)=""/4096, 0x1000}], 0x1) 11:48:43 executing program 2: socketpair(0x0, 0x0, 0x0, &(0x7f0000000440)) 11:48:43 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000009c0)={&(0x7f0000000780)={0x14}, 0x14}}, 0x0) 11:48:43 executing program 5: syz_mount_image$vfat(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_rdma(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="7472616e733d72f5eeb6a088740740c2c066fd0ebaab3ea8a9756759834f09d6cea49a3ea6808f64e52ef148f7860777597486b340af70f6982a60"]) 11:48:43 executing program 6: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000300), r0) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000980)={&(0x7f0000000880), 0xc, &(0x7f0000000940)={&(0x7f00000008c0)={0x24, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_PAGE={0x5}]}, 0x24}}, 0x0) 11:48:43 executing program 7: syz_mount_image$vfat(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_rdma(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="7472616e733d72f5eeb6a088740740c2c066fd0ebaab3ea8a9756759834f09d6cea49a3ea6808f64e52ef148f7860777597486b340af70f6982a60"]) [ 111.571586] 9pnet: Could not find request transport: rt@f>ugYO Τ>d.HwYt@p*` [ 111.639459] 9pnet: Could not find request transport: rt@f>ugYO Τ>d.HwYt@p*` 11:48:43 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={&(0x7f0000000040)={0x2, 0x0, @local}, 0x10, 0x0}, 0x2000c040) listen(r0, 0x0) 11:48:43 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000009c0)={&(0x7f0000000780)={0x14}, 0x14}}, 0x0) 11:48:43 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/slabinfo\x00', 0x0, 0x0) readv(r0, &(0x7f0000001600)=[{&(0x7f0000000600)=""/4096, 0x1000}], 0x1) 11:48:43 executing program 7: syz_mount_image$vfat(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_rdma(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="7472616e733d72f5eeb6a088740740c2c066fd0ebaab3ea8a9756759834f09d6cea49a3ea6808f64e52ef148f7860777597486b340af70f6982a60"]) [ 111.735412] 9pnet: Could not find request transport: rt@f>ugYO Τ>d.HwYt@p*` 11:48:43 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/slabinfo\x00', 0x0, 0x0) readv(r0, &(0x7f0000001600)=[{&(0x7f0000000600)=""/4096, 0x1000}], 0x1) 11:48:43 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={&(0x7f0000000040)={0x2, 0x0, @local}, 0x10, 0x0}, 0x2000c040) listen(r0, 0x0) 11:48:43 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000009c0)={&(0x7f0000000780)={0x14}, 0x14}}, 0x0) 11:48:43 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={&(0x7f0000000040)={0x2, 0x0, @local}, 0x10, 0x0}, 0x2000c040) listen(r0, 0x0) 11:48:43 executing program 2: socketpair(0x0, 0x0, 0x0, &(0x7f0000000440)) 11:48:43 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) recvmmsg(r0, 0x0, 0x0, 0x2000, &(0x7f0000005a00)) 11:48:43 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) write$binfmt_elf32(r0, 0x0, 0x0) 11:48:43 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) write$binfmt_elf32(r0, 0x0, 0x0) 11:48:43 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000a00)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000009c0)={&(0x7f0000000780)={0x14}, 0x14}}, 0x0) 11:48:43 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={&(0x7f0000000040)={0x2, 0x0, @local}, 0x10, 0x0}, 0x2000c040) listen(r0, 0x0) 11:48:43 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) recvmmsg(r0, 0x0, 0x0, 0x2000, &(0x7f0000005a00)) 11:48:43 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={&(0x7f0000000040)={0x2, 0x0, @local}, 0x10, 0x0}, 0x2000c040) listen(r0, 0x0) 11:48:43 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={&(0x7f0000000040)={0x2, 0x0, @local}, 0x10, 0x0}, 0x2000c040) listen(r0, 0x0) 11:48:43 executing program 2: socketpair(0x0, 0x0, 0x0, &(0x7f0000000440)) 11:48:43 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) write$binfmt_elf32(r0, 0x0, 0x0) 11:48:43 executing program 7: init_module(0x0, 0x0, 0x0) 11:48:43 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) recvmmsg(r0, 0x0, 0x0, 0x2000, &(0x7f0000005a00)) 11:48:44 executing program 7: init_module(0x0, 0x0, 0x0) 11:48:44 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={&(0x7f0000000040)={0x2, 0x0, @local}, 0x10, 0x0}, 0x2000c040) listen(r0, 0x0) 11:48:44 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) write$binfmt_elf32(r0, 0x0, 0x0) 11:48:44 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) pwritev(r1, &(0x7f0000000240)=[{&(0x7f0000000200)="e6", 0x1}], 0x1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000080)=0x7) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x80000001) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20, 0x8000, @ipv4={'\x00', '\xff\xff', @empty}, 0x8}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0)=0x1, 0x4) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x2811, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x28e4, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) 11:48:44 executing program 1: fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x131001, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB="2c00000001060109000000000000000000000001050001000700000005000100070000000500010007000000650e0cbb05c9cb60abebf829f34bd2bd1ffe12f9ed2b9d613201c3b2e006ae141937343a9e5dc01c4afab8f764d2a8e80c952de73753b2ee24326a49dbec080bd945a8c4c1ba18b40baa4b7bf5a21b0551738577877a5b0a9367c82bcac5967cae2609441fca870aba7f774d8bd407fca11ff22fd6f6160167254df7886d035bed589f904b4a1f0746cafa15447a9d1cf66b51a7a5f87afb2e94f9f9f0c6d67ccd3b53c2889e210df7c992fddae6a1a95e6daae6ac07afca9199401fa3c04ca1dd524b1d66cd3efa351ab2ebb23867fd9535d280f01b6d9ad239299853339a82cfef"], 0x2c}, 0x1, 0x0, 0x0, 0x20010800}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x2000, 0x0) getdents64(r3, 0x0, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x20008088}, 0x8000) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000008, 0x10, 0xffffffffffffffff, 0x21976000) pivot_root(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00') sendfile(r0, r3, &(0x7f0000000080)=0x1000, 0x1f00) pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000) 11:48:44 executing program 7: init_module(0x0, 0x0, 0x0) 11:48:44 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f00000001c0), &(0x7f0000000200)=0x8) 11:48:44 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x9) 11:48:44 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) recvmmsg(r0, 0x0, 0x0, 0x2000, &(0x7f0000005a00)) [ 112.152229] hrtimer: interrupt took 15759 ns 11:48:44 executing program 2: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000440)='./file0\x00', 0x0, &(0x7f00000004c0)='./file0\x00', 0x8, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000600), 0x40000, &(0x7f0000000640)={[{@huge_always}, {@mode}], [{@appraise}]}) fchownat(r0, &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x1000) setxattr$security_selinux(&(0x7f0000000bc0)='./file0/file0\x00', &(0x7f0000000c00), &(0x7f0000000c40)='system_u:object_r:dpkg_exec_t:s0\x00', 0x21, 0x3) syz_mount_image$tmpfs(&(0x7f0000000c80), 0x0, 0x4, 0x0, &(0x7f0000000d40), 0x0, &(0x7f0000000d80)={[{@nr_inodes}], [{@subj_user={'subj_user', 0x3d, 'trusted.overlay.origin\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) setxattr$security_capability(&(0x7f0000001140)='./file0\x00', &(0x7f0000001180), &(0x7f0000001280)=@v3={0x3000000, [{}, {0x1, 0x10001}]}, 0x18, 0x0) 11:48:44 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f00000001c0), &(0x7f0000000200)=0x8) 11:48:44 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_CLR_FD(r0, 0x401870c8) 11:48:44 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f00000001c0), &(0x7f0000000200)=0x8) 11:48:44 executing program 6: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) 11:48:44 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x9) 11:48:44 executing program 1: fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x131001, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x2c}, 0x1, 0x0, 0x0, 0x20010800}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x2000, 0x0) getdents64(r3, 0x0, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x20008088}, 0x8000) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000008, 0x10, 0xffffffffffffffff, 0x21976000) pivot_root(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00') sendfile(r0, r3, &(0x7f0000000080)=0x1000, 0x1f00) pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000) 11:48:44 executing program 7: init_module(0x0, 0x0, 0x0) 11:48:44 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_CLR_FD(r0, 0x401870c8) 11:48:44 executing program 2: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000440)='./file0\x00', 0x0, &(0x7f00000004c0)='./file0\x00', 0x8, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000600), 0x40000, &(0x7f0000000640)={[{@huge_always}, {@mode}], [{@appraise}]}) fchownat(r0, &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x1000) setxattr$security_selinux(&(0x7f0000000bc0)='./file0/file0\x00', &(0x7f0000000c00), &(0x7f0000000c40)='system_u:object_r:dpkg_exec_t:s0\x00', 0x21, 0x3) syz_mount_image$tmpfs(&(0x7f0000000c80), 0x0, 0x4, 0x0, &(0x7f0000000d40), 0x0, &(0x7f0000000d80)={[{@nr_inodes}], [{@subj_user={'subj_user', 0x3d, 'trusted.overlay.origin\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) setxattr$security_capability(&(0x7f0000001140)='./file0\x00', &(0x7f0000001180), &(0x7f0000001280)=@v3={0x3000000, [{}, {0x1, 0x10001}]}, 0x18, 0x0) 11:48:44 executing program 6: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) 11:48:44 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_CLR_FD(r0, 0x401870c8) 11:48:44 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x9) 11:48:44 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f00000001c0), &(0x7f0000000200)=0x8) 11:48:44 executing program 7: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000440)='./file0\x00', 0x0, &(0x7f00000004c0)='./file0\x00', 0x8, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000600), 0x40000, &(0x7f0000000640)={[{@huge_always}, {@mode}], [{@appraise}]}) fchownat(r0, &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x1000) setxattr$security_selinux(&(0x7f0000000bc0)='./file0/file0\x00', &(0x7f0000000c00), &(0x7f0000000c40)='system_u:object_r:dpkg_exec_t:s0\x00', 0x21, 0x3) syz_mount_image$tmpfs(&(0x7f0000000c80), 0x0, 0x4, 0x0, &(0x7f0000000d40), 0x0, &(0x7f0000000d80)={[{@nr_inodes}], [{@subj_user={'subj_user', 0x3d, 'trusted.overlay.origin\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) setxattr$security_capability(&(0x7f0000001140)='./file0\x00', &(0x7f0000001180), &(0x7f0000001280)=@v3={0x3000000, [{}, {0x1, 0x10001}]}, 0x18, 0x0) 11:48:44 executing program 1: fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x131001, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB="2c00000001060109000000000000000000000001050001000700000005000100070000000500010007000000650e0cbb05c9cb60abebf829f34bd2bd1ffe12f9ed2b9d613201c3b2e006ae141937343a9e5dc01c4afab8f764d2a8e80c952de73753b2ee24326a49dbec080bd945a8c4c1ba18b40baa4b7bf5a21b0551738577877a5b0a9367c82bcac5967cae2609441fca870aba7f774d8bd407fca11ff22fd6f6160167254df7886d035bed589f904b4a1f0746cafa15447a9d1cf66b51a7a5f87afb2e94f9f9f0c6d67ccd3b53c2889e210df7c992fddae6a1a95e6daae6ac07afca9199401fa3c04ca1dd524b1d66cd3efa351ab2ebb23867fd9535d280f01b6d9ad239299853339a82cfef"], 0x2c}, 0x1, 0x0, 0x0, 0x20010800}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x2000, 0x0) getdents64(r3, 0x0, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x20008088}, 0x8000) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000008, 0x10, 0xffffffffffffffff, 0x21976000) pivot_root(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00') sendfile(r0, r3, &(0x7f0000000080)=0x1000, 0x1f00) pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000) 11:48:44 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) pwritev(r1, &(0x7f0000000240)=[{&(0x7f0000000200)="e6", 0x1}], 0x1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000080)=0x7) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x80000001) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20, 0x8000, @ipv4={'\x00', '\xff\xff', @empty}, 0x8}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0)=0x1, 0x4) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x2811, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x28e4, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) 11:48:44 executing program 2: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000440)='./file0\x00', 0x0, &(0x7f00000004c0)='./file0\x00', 0x8, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000600), 0x40000, &(0x7f0000000640)={[{@huge_always}, {@mode}], [{@appraise}]}) fchownat(r0, &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x1000) setxattr$security_selinux(&(0x7f0000000bc0)='./file0/file0\x00', &(0x7f0000000c00), &(0x7f0000000c40)='system_u:object_r:dpkg_exec_t:s0\x00', 0x21, 0x3) syz_mount_image$tmpfs(&(0x7f0000000c80), 0x0, 0x4, 0x0, &(0x7f0000000d40), 0x0, &(0x7f0000000d80)={[{@nr_inodes}], [{@subj_user={'subj_user', 0x3d, 'trusted.overlay.origin\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) setxattr$security_capability(&(0x7f0000001140)='./file0\x00', &(0x7f0000001180), &(0x7f0000001280)=@v3={0x3000000, [{}, {0x1, 0x10001}]}, 0x18, 0x0) 11:48:44 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_CLR_FD(r0, 0x401870c8) 11:48:45 executing program 6: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) 11:48:45 executing program 2: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000440)='./file0\x00', 0x0, &(0x7f00000004c0)='./file0\x00', 0x8, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000600), 0x40000, &(0x7f0000000640)={[{@huge_always}, {@mode}], [{@appraise}]}) fchownat(r0, &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x1000) setxattr$security_selinux(&(0x7f0000000bc0)='./file0/file0\x00', &(0x7f0000000c00), &(0x7f0000000c40)='system_u:object_r:dpkg_exec_t:s0\x00', 0x21, 0x3) syz_mount_image$tmpfs(&(0x7f0000000c80), 0x0, 0x4, 0x0, &(0x7f0000000d40), 0x0, &(0x7f0000000d80)={[{@nr_inodes}], [{@subj_user={'subj_user', 0x3d, 'trusted.overlay.origin\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) setxattr$security_capability(&(0x7f0000001140)='./file0\x00', &(0x7f0000001180), &(0x7f0000001280)=@v3={0x3000000, [{}, {0x1, 0x10001}]}, 0x18, 0x0) 11:48:45 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x9) 11:48:45 executing program 7: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000440)='./file0\x00', 0x0, &(0x7f00000004c0)='./file0\x00', 0x8, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000600), 0x40000, &(0x7f0000000640)={[{@huge_always}, {@mode}], [{@appraise}]}) fchownat(r0, &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x1000) setxattr$security_selinux(&(0x7f0000000bc0)='./file0/file0\x00', &(0x7f0000000c00), &(0x7f0000000c40)='system_u:object_r:dpkg_exec_t:s0\x00', 0x21, 0x3) syz_mount_image$tmpfs(&(0x7f0000000c80), 0x0, 0x4, 0x0, &(0x7f0000000d40), 0x0, &(0x7f0000000d80)={[{@nr_inodes}], [{@subj_user={'subj_user', 0x3d, 'trusted.overlay.origin\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) setxattr$security_capability(&(0x7f0000001140)='./file0\x00', &(0x7f0000001180), &(0x7f0000001280)=@v3={0x3000000, [{}, {0x1, 0x10001}]}, 0x18, 0x0) 11:48:45 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) pwritev(r1, &(0x7f0000000240)=[{&(0x7f0000000200)="e6", 0x1}], 0x1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000080)=0x7) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x80000001) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20, 0x8000, @ipv4={'\x00', '\xff\xff', @empty}, 0x8}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0)=0x1, 0x4) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x2811, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x28e4, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) 11:48:45 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) pwritev(r1, &(0x7f0000000240)=[{&(0x7f0000000200)="e6", 0x1}], 0x1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000080)=0x7) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x80000001) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20, 0x8000, @ipv4={'\x00', '\xff\xff', @empty}, 0x8}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0)=0x1, 0x4) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x2811, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x28e4, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) 11:48:45 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) pwritev(r1, &(0x7f0000000240)=[{&(0x7f0000000200)="e6", 0x1}], 0x1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000080)=0x7) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x80000001) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20, 0x8000, @ipv4={'\x00', '\xff\xff', @empty}, 0x8}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0)=0x1, 0x4) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x2811, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x28e4, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) 11:48:45 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) pwritev(r1, &(0x7f0000000240)=[{&(0x7f0000000200)="e6", 0x1}], 0x1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000080)=0x7) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x80000001) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20, 0x8000, @ipv4={'\x00', '\xff\xff', @empty}, 0x8}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0)=0x1, 0x4) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x2811, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x28e4, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) 11:48:45 executing program 6: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) 11:48:45 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) pwritev(r1, &(0x7f0000000240)=[{&(0x7f0000000200)="e6", 0x1}], 0x1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000080)=0x7) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x80000001) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20, 0x8000, @ipv4={'\x00', '\xff\xff', @empty}, 0x8}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0)=0x1, 0x4) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x2811, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x28e4, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) 11:48:45 executing program 7: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000440)='./file0\x00', 0x0, &(0x7f00000004c0)='./file0\x00', 0x8, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000600), 0x40000, &(0x7f0000000640)={[{@huge_always}, {@mode}], [{@appraise}]}) fchownat(r0, &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x1000) setxattr$security_selinux(&(0x7f0000000bc0)='./file0/file0\x00', &(0x7f0000000c00), &(0x7f0000000c40)='system_u:object_r:dpkg_exec_t:s0\x00', 0x21, 0x3) syz_mount_image$tmpfs(&(0x7f0000000c80), 0x0, 0x4, 0x0, &(0x7f0000000d40), 0x0, &(0x7f0000000d80)={[{@nr_inodes}], [{@subj_user={'subj_user', 0x3d, 'trusted.overlay.origin\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) setxattr$security_capability(&(0x7f0000001140)='./file0\x00', &(0x7f0000001180), &(0x7f0000001280)=@v3={0x3000000, [{}, {0x1, 0x10001}]}, 0x18, 0x0) 11:48:45 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) pwritev(r1, &(0x7f0000000240)=[{&(0x7f0000000200)="e6", 0x1}], 0x1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000080)=0x7) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x80000001) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20, 0x8000, @ipv4={'\x00', '\xff\xff', @empty}, 0x8}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0)=0x1, 0x4) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x2811, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x28e4, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) 11:48:45 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) pwritev(r1, &(0x7f0000000240)=[{&(0x7f0000000200)="e6", 0x1}], 0x1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000080)=0x7) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x80000001) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20, 0x8000, @ipv4={'\x00', '\xff\xff', @empty}, 0x8}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0)=0x1, 0x4) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x2811, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x28e4, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) 11:48:45 executing program 1: fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x131001, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x2c}, 0x1, 0x0, 0x0, 0x20010800}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x2000, 0x0) getdents64(r3, 0x0, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x20008088}, 0x8000) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000008, 0x10, 0xffffffffffffffff, 0x21976000) pivot_root(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00') sendfile(r0, r3, &(0x7f0000000080)=0x1000, 0x1f00) pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000) 11:48:45 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) pwritev(r1, &(0x7f0000000240)=[{&(0x7f0000000200)="e6", 0x1}], 0x1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000080)=0x7) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x80000001) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20, 0x8000, @ipv4={'\x00', '\xff\xff', @empty}, 0x8}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0)=0x1, 0x4) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x2811, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x28e4, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) 11:48:45 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) pwritev(r1, &(0x7f0000000240)=[{&(0x7f0000000200)="e6", 0x1}], 0x1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000080)=0x7) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x80000001) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20, 0x8000, @ipv4={'\x00', '\xff\xff', @empty}, 0x8}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0)=0x1, 0x4) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x2811, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x28e4, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) 11:48:45 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) pwritev(r1, &(0x7f0000000240)=[{&(0x7f0000000200)="e6", 0x1}], 0x1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000080)=0x7) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x80000001) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20, 0x8000, @ipv4={'\x00', '\xff\xff', @empty}, 0x8}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0)=0x1, 0x4) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x2811, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x28e4, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) 11:48:45 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) pwritev(r1, &(0x7f0000000240)=[{&(0x7f0000000200)="e6", 0x1}], 0x1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000080)=0x7) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x80000001) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20, 0x8000, @ipv4={'\x00', '\xff\xff', @empty}, 0x8}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0)=0x1, 0x4) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x2811, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x28e4, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) 11:48:45 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) pwritev(r1, &(0x7f0000000240)=[{&(0x7f0000000200)="e6", 0x1}], 0x1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000080)=0x7) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x80000001) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20, 0x8000, @ipv4={'\x00', '\xff\xff', @empty}, 0x8}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0)=0x1, 0x4) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x2811, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x28e4, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) 11:48:45 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) pwritev(r1, &(0x7f0000000240)=[{&(0x7f0000000200)="e6", 0x1}], 0x1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000080)=0x7) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x80000001) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20, 0x8000, @ipv4={'\x00', '\xff\xff', @empty}, 0x8}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0)=0x1, 0x4) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x2811, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x28e4, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) 11:48:45 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) pwritev(r1, &(0x7f0000000240)=[{&(0x7f0000000200)="e6", 0x1}], 0x1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000080)=0x7) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x80000001) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20, 0x8000, @ipv4={'\x00', '\xff\xff', @empty}, 0x8}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0)=0x1, 0x4) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x2811, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x28e4, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) 11:48:45 executing program 7: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000440)='./file0\x00', 0x0, &(0x7f00000004c0)='./file0\x00', 0x8, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000600), 0x40000, &(0x7f0000000640)={[{@huge_always}, {@mode}], [{@appraise}]}) fchownat(r0, &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x1000) setxattr$security_selinux(&(0x7f0000000bc0)='./file0/file0\x00', &(0x7f0000000c00), &(0x7f0000000c40)='system_u:object_r:dpkg_exec_t:s0\x00', 0x21, 0x3) syz_mount_image$tmpfs(&(0x7f0000000c80), 0x0, 0x4, 0x0, &(0x7f0000000d40), 0x0, &(0x7f0000000d80)={[{@nr_inodes}], [{@subj_user={'subj_user', 0x3d, 'trusted.overlay.origin\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) setxattr$security_capability(&(0x7f0000001140)='./file0\x00', &(0x7f0000001180), &(0x7f0000001280)=@v3={0x3000000, [{}, {0x1, 0x10001}]}, 0x18, 0x0) 11:48:45 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) pwritev(r1, &(0x7f0000000240)=[{&(0x7f0000000200)="e6", 0x1}], 0x1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000080)=0x7) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x80000001) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20, 0x8000, @ipv4={'\x00', '\xff\xff', @empty}, 0x8}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0)=0x1, 0x4) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x2811, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x28e4, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) 11:48:45 executing program 5: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000440)='./file0\x00', 0x0, &(0x7f00000004c0)='./file0\x00', 0x8, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000600), 0x40000, &(0x7f0000000640)={[{@huge_always}, {@mode}], [{@appraise}]}) fchownat(r0, &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x1000) setxattr$security_selinux(&(0x7f0000000bc0)='./file0/file0\x00', &(0x7f0000000c00), &(0x7f0000000c40)='system_u:object_r:dpkg_exec_t:s0\x00', 0x21, 0x3) syz_mount_image$tmpfs(&(0x7f0000000c80), 0x0, 0x4, 0x0, &(0x7f0000000d40), 0x0, &(0x7f0000000d80)={[{@nr_inodes}], [{@subj_user={'subj_user', 0x3d, 'trusted.overlay.origin\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) setxattr$security_capability(&(0x7f0000001140)='./file0\x00', &(0x7f0000001180), &(0x7f0000001280)=@v3={0x3000000, [{}, {0x1, 0x10001}]}, 0x18, 0x0) 11:48:45 executing program 4: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000440)='./file0\x00', 0x0, &(0x7f00000004c0)='./file0\x00', 0x8, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000600), 0x40000, &(0x7f0000000640)={[{@huge_always}, {@mode}], [{@appraise}]}) fchownat(r0, &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x1000) setxattr$security_selinux(&(0x7f0000000bc0)='./file0/file0\x00', &(0x7f0000000c00), &(0x7f0000000c40)='system_u:object_r:dpkg_exec_t:s0\x00', 0x21, 0x3) syz_mount_image$tmpfs(&(0x7f0000000c80), 0x0, 0x4, 0x0, &(0x7f0000000d40), 0x0, &(0x7f0000000d80)={[{@nr_inodes}], [{@subj_user={'subj_user', 0x3d, 'trusted.overlay.origin\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) setxattr$security_capability(&(0x7f0000001140)='./file0\x00', &(0x7f0000001180), &(0x7f0000001280)=@v3={0x3000000, [{}, {0x1, 0x10001}]}, 0x18, 0x0) 11:48:45 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) pwritev(r1, &(0x7f0000000240)=[{&(0x7f0000000200)="e6", 0x1}], 0x1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000080)=0x7) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x80000001) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20, 0x8000, @ipv4={'\x00', '\xff\xff', @empty}, 0x8}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0)=0x1, 0x4) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x2811, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x28e4, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) 11:48:45 executing program 7: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000440)='./file0\x00', 0x0, &(0x7f00000004c0)='./file0\x00', 0x8, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000600), 0x40000, &(0x7f0000000640)={[{@huge_always}, {@mode}], [{@appraise}]}) fchownat(r0, &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x1000) setxattr$security_selinux(&(0x7f0000000bc0)='./file0/file0\x00', &(0x7f0000000c00), &(0x7f0000000c40)='system_u:object_r:dpkg_exec_t:s0\x00', 0x21, 0x3) syz_mount_image$tmpfs(&(0x7f0000000c80), 0x0, 0x4, 0x0, &(0x7f0000000d40), 0x0, &(0x7f0000000d80)={[{@nr_inodes}], [{@subj_user={'subj_user', 0x3d, 'trusted.overlay.origin\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) setxattr$security_capability(&(0x7f0000001140)='./file0\x00', &(0x7f0000001180), &(0x7f0000001280)=@v3={0x3000000, [{}, {0x1, 0x10001}]}, 0x18, 0x0) 11:48:45 executing program 5: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000440)='./file0\x00', 0x0, &(0x7f00000004c0)='./file0\x00', 0x8, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000600), 0x40000, &(0x7f0000000640)={[{@huge_always}, {@mode}], [{@appraise}]}) fchownat(r0, &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x1000) setxattr$security_selinux(&(0x7f0000000bc0)='./file0/file0\x00', &(0x7f0000000c00), &(0x7f0000000c40)='system_u:object_r:dpkg_exec_t:s0\x00', 0x21, 0x3) syz_mount_image$tmpfs(&(0x7f0000000c80), 0x0, 0x4, 0x0, &(0x7f0000000d40), 0x0, &(0x7f0000000d80)={[{@nr_inodes}], [{@subj_user={'subj_user', 0x3d, 'trusted.overlay.origin\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) setxattr$security_capability(&(0x7f0000001140)='./file0\x00', &(0x7f0000001180), &(0x7f0000001280)=@v3={0x3000000, [{}, {0x1, 0x10001}]}, 0x18, 0x0) 11:48:45 executing program 4: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000440)='./file0\x00', 0x0, &(0x7f00000004c0)='./file0\x00', 0x8, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000600), 0x40000, &(0x7f0000000640)={[{@huge_always}, {@mode}], [{@appraise}]}) fchownat(r0, &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x1000) setxattr$security_selinux(&(0x7f0000000bc0)='./file0/file0\x00', &(0x7f0000000c00), &(0x7f0000000c40)='system_u:object_r:dpkg_exec_t:s0\x00', 0x21, 0x3) syz_mount_image$tmpfs(&(0x7f0000000c80), 0x0, 0x4, 0x0, &(0x7f0000000d40), 0x0, &(0x7f0000000d80)={[{@nr_inodes}], [{@subj_user={'subj_user', 0x3d, 'trusted.overlay.origin\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) setxattr$security_capability(&(0x7f0000001140)='./file0\x00', &(0x7f0000001180), &(0x7f0000001280)=@v3={0x3000000, [{}, {0x1, 0x10001}]}, 0x18, 0x0) 11:48:45 executing program 4: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000440)='./file0\x00', 0x0, &(0x7f00000004c0)='./file0\x00', 0x8, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000600), 0x40000, &(0x7f0000000640)={[{@huge_always}, {@mode}], [{@appraise}]}) fchownat(r0, &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x1000) setxattr$security_selinux(&(0x7f0000000bc0)='./file0/file0\x00', &(0x7f0000000c00), &(0x7f0000000c40)='system_u:object_r:dpkg_exec_t:s0\x00', 0x21, 0x3) syz_mount_image$tmpfs(&(0x7f0000000c80), 0x0, 0x4, 0x0, &(0x7f0000000d40), 0x0, &(0x7f0000000d80)={[{@nr_inodes}], [{@subj_user={'subj_user', 0x3d, 'trusted.overlay.origin\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) setxattr$security_capability(&(0x7f0000001140)='./file0\x00', &(0x7f0000001180), &(0x7f0000001280)=@v3={0x3000000, [{}, {0x1, 0x10001}]}, 0x18, 0x0) 11:48:45 executing program 2: fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x131001, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x2c}, 0x1, 0x0, 0x0, 0x20010800}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x2000, 0x0) getdents64(r3, 0x0, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x20008088}, 0x8000) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000008, 0x10, 0xffffffffffffffff, 0x21976000) pivot_root(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00') sendfile(r0, r3, &(0x7f0000000080)=0x1000, 0x1f00) pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000) 11:48:45 executing program 7: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000440)='./file0\x00', 0x0, &(0x7f00000004c0)='./file0\x00', 0x8, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000600), 0x40000, &(0x7f0000000640)={[{@huge_always}, {@mode}], [{@appraise}]}) fchownat(r0, &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x1000) setxattr$security_selinux(&(0x7f0000000bc0)='./file0/file0\x00', &(0x7f0000000c00), &(0x7f0000000c40)='system_u:object_r:dpkg_exec_t:s0\x00', 0x21, 0x3) syz_mount_image$tmpfs(&(0x7f0000000c80), 0x0, 0x4, 0x0, &(0x7f0000000d40), 0x0, &(0x7f0000000d80)={[{@nr_inodes}], [{@subj_user={'subj_user', 0x3d, 'trusted.overlay.origin\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) setxattr$security_capability(&(0x7f0000001140)='./file0\x00', &(0x7f0000001180), &(0x7f0000001280)=@v3={0x3000000, [{}, {0x1, 0x10001}]}, 0x18, 0x0) 11:48:45 executing program 1: fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x131001, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x2c}, 0x1, 0x0, 0x0, 0x20010800}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x2000, 0x0) getdents64(r3, 0x0, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x20008088}, 0x8000) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000008, 0x10, 0xffffffffffffffff, 0x21976000) pivot_root(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00') sendfile(r0, r3, &(0x7f0000000080)=0x1000, 0x1f00) pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000) 11:48:46 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) pwritev(r1, &(0x7f0000000240)=[{&(0x7f0000000200)="e6", 0x1}], 0x1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000080)=0x7) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x80000001) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20, 0x8000, @ipv4={'\x00', '\xff\xff', @empty}, 0x8}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0)=0x1, 0x4) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x2811, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x28e4, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) 11:48:46 executing program 7: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x9) 11:48:46 executing program 1: fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x131001, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x2c}, 0x1, 0x0, 0x0, 0x20010800}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x2000, 0x0) getdents64(r3, 0x0, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x20008088}, 0x8000) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000008, 0x10, 0xffffffffffffffff, 0x21976000) pivot_root(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00') sendfile(r0, r3, &(0x7f0000000080)=0x1000, 0x1f00) pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000) 11:48:46 executing program 2: fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x131001, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x2c}, 0x1, 0x0, 0x0, 0x20010800}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x2000, 0x0) getdents64(r3, 0x0, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x20008088}, 0x8000) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000008, 0x10, 0xffffffffffffffff, 0x21976000) pivot_root(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00') sendfile(r0, r3, &(0x7f0000000080)=0x1000, 0x1f00) pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000) 11:48:46 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) pwritev(r1, &(0x7f0000000240)=[{&(0x7f0000000200)="e6", 0x1}], 0x1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000080)=0x7) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x80000001) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20, 0x8000, @ipv4={'\x00', '\xff\xff', @empty}, 0x8}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0)=0x1, 0x4) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x2811, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x28e4, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) 11:48:46 executing program 5: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000440)='./file0\x00', 0x0, &(0x7f00000004c0)='./file0\x00', 0x8, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_mount_image$tmpfs(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000600), 0x40000, &(0x7f0000000640)={[{@huge_always}, {@mode}], [{@appraise}]}) fchownat(r0, &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x1000) setxattr$security_selinux(&(0x7f0000000bc0)='./file0/file0\x00', &(0x7f0000000c00), &(0x7f0000000c40)='system_u:object_r:dpkg_exec_t:s0\x00', 0x21, 0x3) syz_mount_image$tmpfs(&(0x7f0000000c80), 0x0, 0x4, 0x0, &(0x7f0000000d40), 0x0, &(0x7f0000000d80)={[{@nr_inodes}], [{@subj_user={'subj_user', 0x3d, 'trusted.overlay.origin\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) setxattr$security_capability(&(0x7f0000001140)='./file0\x00', &(0x7f0000001180), &(0x7f0000001280)=@v3={0x3000000, [{}, {0x1, 0x10001}]}, 0x18, 0x0) 11:48:46 executing program 0: fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x131001, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x2c}, 0x1, 0x0, 0x0, 0x20010800}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x2000, 0x0) getdents64(r3, 0x0, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x20008088}, 0x8000) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000008, 0x10, 0xffffffffffffffff, 0x21976000) pivot_root(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00') sendfile(r0, r3, &(0x7f0000000080)=0x1000, 0x1f00) pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000) 11:48:46 executing program 4: fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x131001, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x2c}, 0x1, 0x0, 0x0, 0x20010800}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x2000, 0x0) getdents64(r3, 0x0, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x20008088}, 0x8000) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000008, 0x10, 0xffffffffffffffff, 0x21976000) pivot_root(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00') sendfile(r0, r3, &(0x7f0000000080)=0x1000, 0x1f00) pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000) 11:48:46 executing program 7: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x9) 11:48:46 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) pwritev(r1, &(0x7f0000000240)=[{&(0x7f0000000200)="e6", 0x1}], 0x1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000080)=0x7) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x80000001) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20, 0x8000, @ipv4={'\x00', '\xff\xff', @empty}, 0x8}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0)=0x1, 0x4) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x2811, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x28e4, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) 11:48:46 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) pwritev(r1, &(0x7f0000000240)=[{&(0x7f0000000200)="e6", 0x1}], 0x1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000080)=0x7) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x80000001) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20, 0x8000, @ipv4={'\x00', '\xff\xff', @empty}, 0x8}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0)=0x1, 0x4) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x2811, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x28e4, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) 11:48:46 executing program 7: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x9) 11:48:46 executing program 5: r0 = getpid() perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x12a600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, @perf_bp={0x0, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, r0, 0x1, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open$cgroup(&(0x7f00000000c0)={0x2, 0x80, 0x9c, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f00000000c0)={0x2, 0x80, 0x9c, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close_range(r1, r2, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_io_uring_setup(0x0, 0xfffffffffffffffe, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_io_uring_setup(0x227d, &(0x7f0000000140)={0x0, 0x1240, 0x8, 0x2, 0xc1}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000340), &(0x7f0000000200)) mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000000, 0x10010, r3, 0x10000000) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x43, &(0x7f0000000140)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{}, 0x0, @in6=@mcast2}}, 0xe8) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) 11:48:46 executing program 0: fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x131001, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x2c}, 0x1, 0x0, 0x0, 0x20010800}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x2000, 0x0) getdents64(r3, 0x0, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x20008088}, 0x8000) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000008, 0x10, 0xffffffffffffffff, 0x21976000) pivot_root(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00') sendfile(r0, r3, &(0x7f0000000080)=0x1000, 0x1f00) pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000) 11:48:46 executing program 1: fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x131001, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB="2c00000001060109000000000000000000000001050001000700000005000100070000000500010007000000650e0cbb05c9cb60abebf829f34bd2bd1ffe12f9ed2b9d613201c3b2e006ae141937343a9e5dc01c4afab8f764d2a8e80c952de73753b2ee24326a49dbec080bd945a8c4c1ba18b40baa4b7bf5a21b0551738577877a5b0a9367c82bcac5967cae2609441fca870aba7f774d8bd407fca11ff22fd6f6160167254df7886d035bed589f904b4a1f0746cafa15447a9d1cf66b51a7a5f87afb2e94f9f9f0c6d67ccd3b53c2889e210df7c992fddae6a1a95e6daae6ac07afca9199401fa3c04ca1dd524b1d66cd3efa351ab2ebb23867fd9535d280f01b6d9ad239299853339a82cfef"], 0x2c}, 0x1, 0x0, 0x0, 0x20010800}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x2000, 0x0) getdents64(r3, 0x0, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x20008088}, 0x8000) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000008, 0x10, 0xffffffffffffffff, 0x21976000) pivot_root(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00') sendfile(r0, r3, &(0x7f0000000080)=0x1000, 0x1f00) pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000) 11:48:46 executing program 4: fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x131001, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x2c}, 0x1, 0x0, 0x0, 0x20010800}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x2000, 0x0) getdents64(r3, 0x0, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x20008088}, 0x8000) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000008, 0x10, 0xffffffffffffffff, 0x21976000) pivot_root(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00') sendfile(r0, r3, &(0x7f0000000080)=0x1000, 0x1f00) pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000) 11:48:46 executing program 2: fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x131001, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x2c}, 0x1, 0x0, 0x0, 0x20010800}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x2000, 0x0) getdents64(r3, 0x0, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x20008088}, 0x8000) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000008, 0x10, 0xffffffffffffffff, 0x21976000) pivot_root(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00') sendfile(r0, r3, &(0x7f0000000080)=0x1000, 0x1f00) pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000) 11:48:46 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x200) [ 114.645258] audit: type=1400 audit(1663933726.680:9): avc: denied { tracepoint } for pid=4313 comm="syz-executor.5" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 11:48:46 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x200) 11:48:46 executing program 7: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'syz_tun\x00'}) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000040)=0xa) 11:48:46 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) truncate(&(0x7f0000000280)='./file1\x00', 0x5) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x4f) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0x0, r1, 0x0, 0x0, 0x8000000000000}) 11:48:46 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x200) 11:48:46 executing program 4: fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x131001, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x2c}, 0x1, 0x0, 0x0, 0x20010800}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x2000, 0x0) getdents64(r3, 0x0, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x20008088}, 0x8000) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000008, 0x10, 0xffffffffffffffff, 0x21976000) pivot_root(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00') sendfile(r0, r3, &(0x7f0000000080)=0x1000, 0x1f00) pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000) 11:48:46 executing program 5: r0 = getpid() perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x12a600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, @perf_bp={0x0, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, r0, 0x1, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open$cgroup(&(0x7f00000000c0)={0x2, 0x80, 0x9c, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f00000000c0)={0x2, 0x80, 0x9c, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close_range(r1, r2, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_io_uring_setup(0x0, 0xfffffffffffffffe, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_io_uring_setup(0x227d, &(0x7f0000000140)={0x0, 0x1240, 0x8, 0x2, 0xc1}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000340), &(0x7f0000000200)) mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000000, 0x10010, r3, 0x10000000) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x43, &(0x7f0000000140)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{}, 0x0, @in6=@mcast2}}, 0xe8) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) 11:48:46 executing program 7: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'syz_tun\x00'}) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000040)=0xa) 11:48:47 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) truncate(&(0x7f0000000280)='./file1\x00', 0x5) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x4f) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0x0, r1, 0x0, 0x0, 0x8000000000000}) 11:48:47 executing program 0: fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x131001, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB="2c00000001060109000000000000000000000001050001000700000005000100070000000500010007000000650e0cbb05c9cb60abebf829f34bd2bd1ffe12f9ed2b9d613201c3b2e006ae141937343a9e5dc01c4afab8f764d2a8e80c952de73753b2ee24326a49dbec080bd945a8c4c1ba18b40baa4b7bf5a21b0551738577877a5b0a9367c82bcac5967cae2609441fca870aba7f774d8bd407fca11ff22fd6f6160167254df7886d035bed589f904b4a1f074 VM DIAGNOSIS: 11:48:38 Registers: info registers vcpu 0 RAX=0000000000000031 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff822b17e1 RDI=ffffffff87645be0 RBP=ffffffff87645ba0 RSP=ffff88800ec173c8 R8 =0000000000000001 R9 =000000000000000a R10=0000000000000031 R11=0000000000000001 R12=0000000000000031 R13=ffffffff87645ba0 R14=0000000000000010 R15=ffffffff822b17d0 RIP=ffffffff822b1839 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007ff815732700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f54d40d7820 CR3=000000001832e000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 ffffffffffffffff ffffffffffffffff YMM02=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM03=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM04=0000000000000000 0000000000000000 0000000000000000 00000000000000ff YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=ffffffff86244c44 RBX=0000000000000001 RCX=ffffffff8440009a RDX=0000000000000000 RSI=ffffffff86244c3e RDI=ffffffff85dff32c RBP=ffff8880185a7898 RSP=ffff8880185a77c0 R8 =ffffffff86244c3e R9 =ffffffff862400ee R10=ffffed10030b4f15 R11=000000000003603d R12=ffff8880185a7881 R13=ffff8880185a78a0 R14=ffff8880185a7840 R15=ffffffff8440009a RIP=ffffffff8111a4f4 RFL=00000286 [--S--P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f4e1c7d9540 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f4e1c9c4620 CR3=000000000de08000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 ff00ffffffffffff 0000000000000000 YMM01=0000000000000000 0000000000000000 0100010001000000 ffffffffffffffff YMM02=0000000000000000 0000000000000000 0500050005000000 455441564952505f YMM03=0000000000000000 0000000000000000 0000000000000000 000000564952505f YMM04=0000000000000000 0000000000000000 0003000500050005 0005000000455441 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000