Warning: Permanently added '[localhost]:38093' (ECDSA) to the list of known hosts. 2022/10/31 12:22:29 fuzzer started 2022/10/31 12:22:29 dialing manager at localhost:40945 syzkaller login: [ 35.360025] cgroup: Unknown subsys name 'net' [ 35.426110] cgroup: Unknown subsys name 'rlimit' 2022/10/31 12:22:43 syscalls: 2217 2022/10/31 12:22:43 code coverage: enabled 2022/10/31 12:22:43 comparison tracing: enabled 2022/10/31 12:22:43 extra coverage: enabled 2022/10/31 12:22:43 setuid sandbox: enabled 2022/10/31 12:22:43 namespace sandbox: enabled 2022/10/31 12:22:43 Android sandbox: enabled 2022/10/31 12:22:43 fault injection: enabled 2022/10/31 12:22:43 leak checking: enabled 2022/10/31 12:22:43 net packet injection: enabled 2022/10/31 12:22:43 net device setup: enabled 2022/10/31 12:22:43 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/10/31 12:22:43 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/10/31 12:22:43 USB emulation: enabled 2022/10/31 12:22:43 hci packet injection: enabled 2022/10/31 12:22:43 wifi device emulation: enabled 2022/10/31 12:22:43 802.15.4 emulation: enabled 2022/10/31 12:22:43 fetching corpus: 0, signal 0/2000 (executing program) 2022/10/31 12:22:43 fetching corpus: 50, signal 25062/28687 (executing program) 2022/10/31 12:22:43 fetching corpus: 100, signal 39003/44123 (executing program) 2022/10/31 12:22:44 fetching corpus: 150, signal 49527/55997 (executing program) 2022/10/31 12:22:44 fetching corpus: 200, signal 55093/62987 (executing program) 2022/10/31 12:22:44 fetching corpus: 250, signal 62279/71428 (executing program) 2022/10/31 12:22:44 fetching corpus: 300, signal 67149/77614 (executing program) 2022/10/31 12:22:44 fetching corpus: 350, signal 75425/86890 (executing program) 2022/10/31 12:22:44 fetching corpus: 400, signal 79456/92077 (executing program) 2022/10/31 12:22:44 fetching corpus: 450, signal 84842/98446 (executing program) 2022/10/31 12:22:44 fetching corpus: 500, signal 89029/103650 (executing program) 2022/10/31 12:22:45 fetching corpus: 550, signal 92445/108087 (executing program) 2022/10/31 12:22:45 fetching corpus: 600, signal 98526/114896 (executing program) 2022/10/31 12:22:45 fetching corpus: 650, signal 101480/118736 (executing program) 2022/10/31 12:22:45 fetching corpus: 700, signal 105054/123184 (executing program) 2022/10/31 12:22:45 fetching corpus: 750, signal 110125/128837 (executing program) 2022/10/31 12:22:45 fetching corpus: 800, signal 112319/131840 (executing program) 2022/10/31 12:22:45 fetching corpus: 850, signal 116134/136337 (executing program) 2022/10/31 12:22:45 fetching corpus: 900, signal 119664/140538 (executing program) 2022/10/31 12:22:46 fetching corpus: 950, signal 122343/143956 (executing program) 2022/10/31 12:22:46 fetching corpus: 1000, signal 124416/146808 (executing program) 2022/10/31 12:22:46 fetching corpus: 1050, signal 126390/149536 (executing program) 2022/10/31 12:22:46 fetching corpus: 1100, signal 127707/151705 (executing program) 2022/10/31 12:22:46 fetching corpus: 1150, signal 129831/154492 (executing program) 2022/10/31 12:22:46 fetching corpus: 1200, signal 131898/157150 (executing program) 2022/10/31 12:22:46 fetching corpus: 1250, signal 134036/159902 (executing program) 2022/10/31 12:22:46 fetching corpus: 1300, signal 135633/162195 (executing program) 2022/10/31 12:22:47 fetching corpus: 1350, signal 137707/164837 (executing program) 2022/10/31 12:22:47 fetching corpus: 1400, signal 139615/167243 (executing program) 2022/10/31 12:22:47 fetching corpus: 1450, signal 140862/169143 (executing program) 2022/10/31 12:22:47 fetching corpus: 1500, signal 142311/171192 (executing program) 2022/10/31 12:22:47 fetching corpus: 1550, signal 143392/172994 (executing program) 2022/10/31 12:22:47 fetching corpus: 1600, signal 145499/175497 (executing program) 2022/10/31 12:22:47 fetching corpus: 1650, signal 147301/177785 (executing program) 2022/10/31 12:22:47 fetching corpus: 1700, signal 149033/179986 (executing program) 2022/10/31 12:22:47 fetching corpus: 1750, signal 151753/182828 (executing program) 2022/10/31 12:22:48 fetching corpus: 1800, signal 153202/184707 (executing program) 2022/10/31 12:22:48 fetching corpus: 1850, signal 154615/186533 (executing program) 2022/10/31 12:22:48 fetching corpus: 1900, signal 155822/188228 (executing program) 2022/10/31 12:22:48 fetching corpus: 1950, signal 157257/190080 (executing program) 2022/10/31 12:22:48 fetching corpus: 2000, signal 158581/191849 (executing program) 2022/10/31 12:22:48 fetching corpus: 2050, signal 159978/193620 (executing program) 2022/10/31 12:22:48 fetching corpus: 2100, signal 161458/195418 (executing program) 2022/10/31 12:22:48 fetching corpus: 2150, signal 162678/197067 (executing program) 2022/10/31 12:22:48 fetching corpus: 2200, signal 164160/198803 (executing program) 2022/10/31 12:22:49 fetching corpus: 2250, signal 165788/200631 (executing program) 2022/10/31 12:22:49 fetching corpus: 2300, signal 166861/202067 (executing program) 2022/10/31 12:22:49 fetching corpus: 2350, signal 167968/203531 (executing program) 2022/10/31 12:22:49 fetching corpus: 2400, signal 168874/204860 (executing program) 2022/10/31 12:22:49 fetching corpus: 2450, signal 169925/206290 (executing program) 2022/10/31 12:22:49 fetching corpus: 2500, signal 171159/207783 (executing program) 2022/10/31 12:22:49 fetching corpus: 2550, signal 172136/209075 (executing program) 2022/10/31 12:22:49 fetching corpus: 2600, signal 173338/210514 (executing program) 2022/10/31 12:22:49 fetching corpus: 2650, signal 174080/211678 (executing program) 2022/10/31 12:22:50 fetching corpus: 2700, signal 175615/213317 (executing program) 2022/10/31 12:22:50 fetching corpus: 2750, signal 176576/214599 (executing program) 2022/10/31 12:22:50 fetching corpus: 2800, signal 177483/215766 (executing program) 2022/10/31 12:22:50 fetching corpus: 2850, signal 179543/217546 (executing program) 2022/10/31 12:22:50 fetching corpus: 2900, signal 181751/219450 (executing program) 2022/10/31 12:22:50 fetching corpus: 2950, signal 182888/220739 (executing program) 2022/10/31 12:22:50 fetching corpus: 3000, signal 183774/221880 (executing program) 2022/10/31 12:22:51 fetching corpus: 3050, signal 184513/222931 (executing program) 2022/10/31 12:22:51 fetching corpus: 3100, signal 185201/223919 (executing program) 2022/10/31 12:22:51 fetching corpus: 3150, signal 185959/224914 (executing program) 2022/10/31 12:22:51 fetching corpus: 3200, signal 187056/226123 (executing program) 2022/10/31 12:22:51 fetching corpus: 3250, signal 187994/227204 (executing program) 2022/10/31 12:22:51 fetching corpus: 3300, signal 189254/228407 (executing program) 2022/10/31 12:22:51 fetching corpus: 3350, signal 189949/229332 (executing program) 2022/10/31 12:22:51 fetching corpus: 3400, signal 190938/230390 (executing program) 2022/10/31 12:22:51 fetching corpus: 3450, signal 191826/231390 (executing program) 2022/10/31 12:22:52 fetching corpus: 3500, signal 192652/232340 (executing program) 2022/10/31 12:22:52 fetching corpus: 3550, signal 194032/233535 (executing program) 2022/10/31 12:22:52 fetching corpus: 3600, signal 195150/234598 (executing program) 2022/10/31 12:22:52 fetching corpus: 3650, signal 196307/235696 (executing program) 2022/10/31 12:22:52 fetching corpus: 3700, signal 197023/236555 (executing program) 2022/10/31 12:22:52 fetching corpus: 3750, signal 197611/237333 (executing program) 2022/10/31 12:22:52 fetching corpus: 3800, signal 198431/238193 (executing program) 2022/10/31 12:22:52 fetching corpus: 3850, signal 199205/239054 (executing program) 2022/10/31 12:22:53 fetching corpus: 3900, signal 199727/239767 (executing program) 2022/10/31 12:22:53 fetching corpus: 3950, signal 200317/240541 (executing program) 2022/10/31 12:22:53 fetching corpus: 4000, signal 201628/241585 (executing program) 2022/10/31 12:22:53 fetching corpus: 4050, signal 202670/242464 (executing program) 2022/10/31 12:22:53 fetching corpus: 4100, signal 203769/243371 (executing program) 2022/10/31 12:22:53 fetching corpus: 4150, signal 204563/244158 (executing program) 2022/10/31 12:22:53 fetching corpus: 4200, signal 205106/244778 (executing program) 2022/10/31 12:22:53 fetching corpus: 4250, signal 205760/245472 (executing program) 2022/10/31 12:22:54 fetching corpus: 4300, signal 206508/246193 (executing program) 2022/10/31 12:22:54 fetching corpus: 4350, signal 207282/246939 (executing program) 2022/10/31 12:22:54 fetching corpus: 4400, signal 208037/247631 (executing program) 2022/10/31 12:22:54 fetching corpus: 4450, signal 208773/248321 (executing program) 2022/10/31 12:22:54 fetching corpus: 4500, signal 209646/249007 (executing program) 2022/10/31 12:22:54 fetching corpus: 4550, signal 210014/249594 (executing program) 2022/10/31 12:22:54 fetching corpus: 4600, signal 210760/250261 (executing program) 2022/10/31 12:22:54 fetching corpus: 4650, signal 211334/250869 (executing program) 2022/10/31 12:22:54 fetching corpus: 4700, signal 211886/251463 (executing program) 2022/10/31 12:22:55 fetching corpus: 4750, signal 212457/252032 (executing program) 2022/10/31 12:22:55 fetching corpus: 4800, signal 213266/252681 (executing program) 2022/10/31 12:22:55 fetching corpus: 4850, signal 214132/253317 (executing program) 2022/10/31 12:22:55 fetching corpus: 4900, signal 214512/253838 (executing program) 2022/10/31 12:22:55 fetching corpus: 4950, signal 215210/254394 (executing program) 2022/10/31 12:22:55 fetching corpus: 5000, signal 215775/254949 (executing program) 2022/10/31 12:22:55 fetching corpus: 5050, signal 216396/255472 (executing program) 2022/10/31 12:22:56 fetching corpus: 5100, signal 217262/256206 (executing program) 2022/10/31 12:22:56 fetching corpus: 5150, signal 217931/256762 (executing program) 2022/10/31 12:22:56 fetching corpus: 5200, signal 218308/257249 (executing program) 2022/10/31 12:22:56 fetching corpus: 5250, signal 218780/257756 (executing program) 2022/10/31 12:22:56 fetching corpus: 5300, signal 219088/258170 (executing program) 2022/10/31 12:22:56 fetching corpus: 5350, signal 220021/258707 (executing program) 2022/10/31 12:22:56 fetching corpus: 5400, signal 220484/259133 (executing program) 2022/10/31 12:22:56 fetching corpus: 5450, signal 220757/259528 (executing program) 2022/10/31 12:22:56 fetching corpus: 5500, signal 221326/259977 (executing program) 2022/10/31 12:22:57 fetching corpus: 5550, signal 221604/260354 (executing program) 2022/10/31 12:22:57 fetching corpus: 5600, signal 222050/260761 (executing program) 2022/10/31 12:22:57 fetching corpus: 5650, signal 222507/261169 (executing program) 2022/10/31 12:22:57 fetching corpus: 5700, signal 222863/261565 (executing program) 2022/10/31 12:22:57 fetching corpus: 5750, signal 223211/261961 (executing program) 2022/10/31 12:22:57 fetching corpus: 5800, signal 223890/262400 (executing program) 2022/10/31 12:22:57 fetching corpus: 5850, signal 224421/262794 (executing program) 2022/10/31 12:22:57 fetching corpus: 5900, signal 225315/263219 (executing program) 2022/10/31 12:22:57 fetching corpus: 5950, signal 225922/263623 (executing program) 2022/10/31 12:22:57 fetching corpus: 6000, signal 226541/264004 (executing program) 2022/10/31 12:22:58 fetching corpus: 6050, signal 227035/264345 (executing program) 2022/10/31 12:22:58 fetching corpus: 6100, signal 227823/264733 (executing program) 2022/10/31 12:22:58 fetching corpus: 6150, signal 228475/265076 (executing program) 2022/10/31 12:22:58 fetching corpus: 6200, signal 229122/265462 (executing program) 2022/10/31 12:22:58 fetching corpus: 6250, signal 229829/265797 (executing program) 2022/10/31 12:22:58 fetching corpus: 6300, signal 230632/266107 (executing program) 2022/10/31 12:22:58 fetching corpus: 6350, signal 230919/266415 (executing program) 2022/10/31 12:22:59 fetching corpus: 6400, signal 231432/266687 (executing program) 2022/10/31 12:22:59 fetching corpus: 6450, signal 232139/266977 (executing program) 2022/10/31 12:22:59 fetching corpus: 6500, signal 232534/267245 (executing program) 2022/10/31 12:22:59 fetching corpus: 6550, signal 233047/267506 (executing program) 2022/10/31 12:22:59 fetching corpus: 6600, signal 233439/267762 (executing program) 2022/10/31 12:22:59 fetching corpus: 6650, signal 233941/267781 (executing program) 2022/10/31 12:22:59 fetching corpus: 6700, signal 234582/267781 (executing program) 2022/10/31 12:22:59 fetching corpus: 6750, signal 235015/267781 (executing program) 2022/10/31 12:23:00 fetching corpus: 6800, signal 235452/267781 (executing program) 2022/10/31 12:23:00 fetching corpus: 6850, signal 235850/267875 (executing program) 2022/10/31 12:23:00 fetching corpus: 6900, signal 236401/267946 (executing program) 2022/10/31 12:23:00 fetching corpus: 6950, signal 237183/267947 (executing program) 2022/10/31 12:23:00 fetching corpus: 7000, signal 237509/267949 (executing program) 2022/10/31 12:23:00 fetching corpus: 7050, signal 237979/267949 (executing program) 2022/10/31 12:23:00 fetching corpus: 7100, signal 238427/268052 (executing program) 2022/10/31 12:23:00 fetching corpus: 7150, signal 239532/268052 (executing program) 2022/10/31 12:23:01 fetching corpus: 7200, signal 239974/268052 (executing program) 2022/10/31 12:23:01 fetching corpus: 7250, signal 240430/268052 (executing program) 2022/10/31 12:23:01 fetching corpus: 7300, signal 240904/268052 (executing program) 2022/10/31 12:23:01 fetching corpus: 7350, signal 241219/268052 (executing program) 2022/10/31 12:23:01 fetching corpus: 7400, signal 241832/268053 (executing program) 2022/10/31 12:23:01 fetching corpus: 7450, signal 242235/268053 (executing program) 2022/10/31 12:23:01 fetching corpus: 7500, signal 242965/268053 (executing program) 2022/10/31 12:23:01 fetching corpus: 7550, signal 243419/268054 (executing program) 2022/10/31 12:23:01 fetching corpus: 7600, signal 243832/268054 (executing program) 2022/10/31 12:23:02 fetching corpus: 7650, signal 244317/268054 (executing program) 2022/10/31 12:23:02 fetching corpus: 7700, signal 244724/268065 (executing program) 2022/10/31 12:23:02 fetching corpus: 7750, signal 245213/268066 (executing program) 2022/10/31 12:23:02 fetching corpus: 7800, signal 245703/268066 (executing program) 2022/10/31 12:23:02 fetching corpus: 7849, signal 246100/268066 (executing program) 2022/10/31 12:23:02 fetching corpus: 7896, signal 246547/268072 (executing program) 2022/10/31 12:23:02 fetching corpus: 7946, signal 246790/268077 (executing program) 2022/10/31 12:23:02 fetching corpus: 7996, signal 247045/268077 (executing program) 2022/10/31 12:23:03 fetching corpus: 8046, signal 247466/268082 (executing program) 2022/10/31 12:23:03 fetching corpus: 8096, signal 248159/268082 (executing program) 2022/10/31 12:23:03 fetching corpus: 8144, signal 248394/268082 (executing program) 2022/10/31 12:23:03 fetching corpus: 8194, signal 248782/268082 (executing program) 2022/10/31 12:23:03 fetching corpus: 8244, signal 249478/268111 (executing program) 2022/10/31 12:23:03 fetching corpus: 8294, signal 249856/268114 (executing program) 2022/10/31 12:23:03 fetching corpus: 8343, signal 250141/268137 (executing program) 2022/10/31 12:23:03 fetching corpus: 8393, signal 250387/268137 (executing program) 2022/10/31 12:23:03 fetching corpus: 8443, signal 250723/268161 (executing program) 2022/10/31 12:23:04 fetching corpus: 8493, signal 251410/268163 (executing program) 2022/10/31 12:23:04 fetching corpus: 8543, signal 251788/268163 (executing program) 2022/10/31 12:23:04 fetching corpus: 8593, signal 252364/268163 (executing program) 2022/10/31 12:23:04 fetching corpus: 8643, signal 252759/268163 (executing program) 2022/10/31 12:23:04 fetching corpus: 8693, signal 253038/268163 (executing program) 2022/10/31 12:23:04 fetching corpus: 8742, signal 253402/268163 (executing program) 2022/10/31 12:23:04 fetching corpus: 8792, signal 254136/268171 (executing program) 2022/10/31 12:23:04 fetching corpus: 8842, signal 254364/268171 (executing program) 2022/10/31 12:23:04 fetching corpus: 8892, signal 254704/268171 (executing program) 2022/10/31 12:23:05 fetching corpus: 8942, signal 255062/268171 (executing program) 2022/10/31 12:23:05 fetching corpus: 8992, signal 255363/268171 (executing program) 2022/10/31 12:23:05 fetching corpus: 9041, signal 255654/268194 (executing program) 2022/10/31 12:23:05 fetching corpus: 9091, signal 256122/268194 (executing program) 2022/10/31 12:23:05 fetching corpus: 9141, signal 256729/268194 (executing program) 2022/10/31 12:23:05 fetching corpus: 9191, signal 257115/268194 (executing program) 2022/10/31 12:23:05 fetching corpus: 9241, signal 257362/268194 (executing program) 2022/10/31 12:23:05 fetching corpus: 9291, signal 257783/268194 (executing program) 2022/10/31 12:23:06 fetching corpus: 9339, signal 258151/268245 (executing program) 2022/10/31 12:23:06 fetching corpus: 9388, signal 258595/268260 (executing program) 2022/10/31 12:23:06 fetching corpus: 9437, signal 258998/268262 (executing program) 2022/10/31 12:23:06 fetching corpus: 9487, signal 259408/268271 (executing program) 2022/10/31 12:23:06 fetching corpus: 9537, signal 259817/268271 (executing program) 2022/10/31 12:23:06 fetching corpus: 9587, signal 260241/268273 (executing program) 2022/10/31 12:23:06 fetching corpus: 9635, signal 260593/268275 (executing program) 2022/10/31 12:23:06 fetching corpus: 9684, signal 260894/268283 (executing program) 2022/10/31 12:23:07 fetching corpus: 9734, signal 261238/268283 (executing program) 2022/10/31 12:23:07 fetching corpus: 9784, signal 261578/268283 (executing program) 2022/10/31 12:23:07 fetching corpus: 9834, signal 261901/268283 (executing program) 2022/10/31 12:23:07 fetching corpus: 9883, signal 262286/268304 (executing program) 2022/10/31 12:23:07 fetching corpus: 9933, signal 262583/268304 (executing program) 2022/10/31 12:23:07 fetching corpus: 9982, signal 262894/268305 (executing program) 2022/10/31 12:23:07 fetching corpus: 10032, signal 263218/268305 (executing program) 2022/10/31 12:23:07 fetching corpus: 10080, signal 263529/268420 (executing program) 2022/10/31 12:23:07 fetching corpus: 10087, signal 263649/268420 (executing program) 2022/10/31 12:23:07 fetching corpus: 10087, signal 263649/268420 (executing program) 2022/10/31 12:23:10 starting 8 fuzzer processes 12:23:10 executing program 0: ioctl$BTRFS_IOC_RM_DEV(0xffffffffffffffff, 0x5000940b, &(0x7f0000000040)={{}, "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"}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000180)=0x40) 12:23:11 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000000080)=0x7, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) 12:23:11 executing program 2: shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r0 = shmget(0x3, 0xa000, 0x20, &(0x7f0000ff6000/0xa000)=nil) shmget(0x0, 0x1000, 0x20, &(0x7f0000ffb000/0x1000)=nil) shmat(0x0, &(0x7f0000fe9000/0x3000)=nil, 0x2000) shmat(0x0, &(0x7f0000fe6000/0xe000)=nil, 0x9000) shmctl$IPC_RMID(0x0, 0x0) shmctl$IPC_RMID(0x0, 0x0) shmat(0x0, &(0x7f0000feb000/0x3000)=nil, 0x0) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x2000) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) mmap$perf(&(0x7f0000fed000/0x3000)=nil, 0x3000, 0x0, 0x13, r1, 0x4) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x80200, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x149, 0x7}, 0x10601, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = shmget(0x2, 0x2000, 0x2, &(0x7f0000ffc000/0x2000)=nil) shmat(r4, &(0x7f0000fed000/0x1000)=nil, 0x6000) openat2(r2, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)={0x40200, 0x1e1, 0x1b}, 0x18) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) [ 76.443394] audit: type=1400 audit(1667218991.024:6): avc: denied { execmem } for pid=281 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 12:23:11 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffef46}}, './file0\x00'}) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x882d00, 0x0) mount_setattr(r1, &(0x7f0000000040)='./file0\x00', 0x1800, &(0x7f0000000100)={0x200072, 0x4, 0xe0000, {r2}}, 0x20) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) open(0x0, 0x0, 0x48) r3 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(r3, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) 12:23:11 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) pread64(r0, &(0x7f0000000040)=""/35, 0x23, 0x0) ioctl$RTC_PIE_ON(r0, 0x7005) 12:23:11 executing program 5: alarm(0x1) alarm(0x0) 12:23:11 executing program 6: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @none, 0x1}, 0xe) 12:23:11 executing program 7: syz_emit_ethernet(0x4e, &(0x7f0000000140)={@local, @link_local, @void, {@ipv4={0x800, @tipc={{0x5, 0x4, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast}, @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}, 0x0) [ 77.721544] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 77.722688] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 77.724286] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 77.727171] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 77.728540] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 77.729537] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 77.734374] Bluetooth: hci0: HCI_REQ-0x0c1a [ 77.767951] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 77.769441] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 77.770571] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 77.771930] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 77.772629] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 77.773881] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 77.776375] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 77.777552] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 77.779337] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 77.781016] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 77.782251] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 77.783012] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 77.786218] Bluetooth: hci2: HCI_REQ-0x0c1a [ 77.787691] Bluetooth: hci1: HCI_REQ-0x0c1a [ 77.899480] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 77.901816] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 77.903354] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 77.905674] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 77.907563] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 77.908984] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 77.912211] Bluetooth: hci4: HCI_REQ-0x0c1a [ 78.033233] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 78.038251] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 78.057647] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 78.061240] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 78.071883] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 78.082585] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 78.087547] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 78.090225] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 78.091836] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 78.098152] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 78.099356] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 78.129401] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 78.142280] Bluetooth: hci7: HCI_REQ-0x0c1a [ 78.233732] Bluetooth: hci6: HCI_REQ-0x0c1a [ 79.806162] Bluetooth: hci0: command 0x0409 tx timeout [ 79.806165] Bluetooth: hci1: command 0x0409 tx timeout [ 79.806847] Bluetooth: hci2: command 0x0409 tx timeout [ 79.869673] Bluetooth: hci3: Opcode 0x c03 failed: -110 [ 79.934049] Bluetooth: hci4: command 0x0409 tx timeout [ 79.997726] Bluetooth: hci5: Opcode 0x c03 failed: -110 [ 80.253774] Bluetooth: hci6: command 0x0409 tx timeout [ 80.254490] Bluetooth: hci7: command 0x0409 tx timeout [ 81.853692] Bluetooth: hci0: command 0x041b tx timeout [ 81.854084] Bluetooth: hci2: command 0x041b tx timeout [ 81.854572] Bluetooth: hci1: command 0x041b tx timeout [ 81.981647] Bluetooth: hci4: command 0x041b tx timeout [ 82.302197] Bluetooth: hci7: command 0x041b tx timeout [ 82.302717] Bluetooth: hci6: command 0x041b tx timeout [ 83.078185] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 83.089448] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 83.091553] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 83.097831] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 83.101764] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 83.104381] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 83.130732] Bluetooth: hci3: HCI_REQ-0x0c1a [ 83.901806] Bluetooth: hci1: command 0x040f tx timeout [ 83.902466] Bluetooth: hci2: command 0x040f tx timeout [ 83.903626] Bluetooth: hci0: command 0x040f tx timeout [ 84.029661] Bluetooth: hci4: command 0x040f tx timeout [ 84.349748] Bluetooth: hci6: command 0x040f tx timeout [ 84.350156] Bluetooth: hci7: command 0x040f tx timeout [ 85.181727] Bluetooth: hci3: command 0x0409 tx timeout [ 85.373670] Bluetooth: hci5: Opcode 0x c03 failed: -110 [ 85.949676] Bluetooth: hci0: command 0x0419 tx timeout [ 85.950127] Bluetooth: hci2: command 0x0419 tx timeout [ 85.950513] Bluetooth: hci1: command 0x0419 tx timeout [ 86.077649] Bluetooth: hci4: command 0x0419 tx timeout [ 86.398161] Bluetooth: hci7: command 0x0419 tx timeout [ 86.398637] Bluetooth: hci6: command 0x0419 tx timeout [ 87.229743] Bluetooth: hci3: command 0x041b tx timeout [ 88.532752] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 88.535026] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 88.546872] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 88.579999] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 88.590970] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 88.609907] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 88.639723] Bluetooth: hci5: HCI_REQ-0x0c1a [ 89.277720] Bluetooth: hci3: command 0x040f tx timeout [ 90.685678] Bluetooth: hci5: command 0x0409 tx timeout [ 91.325688] Bluetooth: hci3: command 0x0419 tx timeout [ 92.733729] Bluetooth: hci5: command 0x041b tx timeout [ 94.781648] Bluetooth: hci5: command 0x040f tx timeout [ 96.829656] Bluetooth: hci5: command 0x0419 tx timeout [ 134.475850] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 134.476483] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 134.477907] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 134.672037] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 134.672850] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 134.674447] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 135.121465] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 135.122078] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 135.123690] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 135.293381] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 135.294010] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 135.295540] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 12:24:10 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) pread64(r0, &(0x7f0000000040)=""/35, 0x23, 0x0) ioctl$RTC_PIE_ON(r0, 0x7005) [ 135.882193] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 135.883363] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 135.888444] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready 12:24:10 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) pread64(r0, &(0x7f0000000040)=""/35, 0x23, 0x0) ioctl$RTC_PIE_ON(r0, 0x7005) [ 136.068409] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 136.069659] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 136.073426] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 12:24:10 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) pread64(r0, &(0x7f0000000040)=""/35, 0x23, 0x0) ioctl$RTC_PIE_ON(r0, 0x7005) 12:24:10 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000400)={0x2, 0x80, 0x2b, 0x9, 0xb2, 0x5, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0xb60, 0x4, @perf_bp={&(0x7f00000003c0), 0x9}, 0x344, 0x10001, 0x101, 0x4, 0x8, 0x80000001, 0xaf, 0x0, 0x5, 0x0, 0x12}, 0x0, 0xa, r0, 0x2) syz_read_part_table(0x2, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000000)="c9fa09343bb8fd97cd3b2abd40e23eb8b76915848124e29981a1bd8d3fe8b681f3fabb634fac1024abc0f1643d88e733fb348d73aa8350e91c48490251bf7f812e8f5d1173c0", 0x46, 0x100000000}, {0x0}]) signalfd4(r1, &(0x7f00000001c0)={[0xff8d]}, 0x8, 0x800) r2 = getpid() ptrace$peek(0x2, r2, &(0x7f0000000480)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, @perf_bp={0x0, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x7ff}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r3, 0x4, &(0x7f0000000240)='\x00', &(0x7f0000000300)='./file2\x00', 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001180)=ANY=[], 0x220) [ 136.302754] audit: type=1400 audit(1667219050.883:7): avc: denied { open } for pid=3708 comm="syz-executor.4" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 136.304471] audit: type=1400 audit(1667219050.883:8): avc: denied { kernel } for pid=3708 comm="syz-executor.4" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 136.331608] hrtimer: interrupt took 17122 ns [ 136.472019] loop4: detected capacity change from 0 to 264192 [ 139.724901] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 139.727386] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 139.728270] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 139.730248] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 139.731303] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 139.733289] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 139.735792] Bluetooth: hci2: HCI_REQ-0x0c1a [ 140.053108] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 140.110386] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 140.111220] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 140.112425] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 140.113146] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 140.114543] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 140.115321] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 140.115936] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 140.118008] Bluetooth: hci6: HCI_REQ-0x0c1a [ 140.171994] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 140.174703] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 140.175481] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 140.176253] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 140.178543] Bluetooth: hci4: HCI_REQ-0x0c1a [ 140.547378] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 140.555327] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 140.556642] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 140.559573] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 140.561292] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 140.562708] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 140.568088] Bluetooth: hci7: HCI_REQ-0x0c1a [ 141.757916] Bluetooth: hci2: command 0x0409 tx timeout [ 141.932180] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 141.933318] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 141.935911] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 142.141724] Bluetooth: hci6: command 0x0409 tx timeout [ 142.205924] Bluetooth: hci4: command 0x0409 tx timeout [ 142.589684] Bluetooth: hci7: command 0x0409 tx timeout [ 143.806693] Bluetooth: hci2: command 0x041b tx timeout [ 144.190844] Bluetooth: hci6: command 0x041b tx timeout [ 144.254815] Bluetooth: hci4: command 0x041b tx timeout [ 144.637721] Bluetooth: hci7: command 0x041b tx timeout [ 145.036987] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 145.042116] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 145.043940] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 145.047357] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 145.049059] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 145.050298] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 145.073912] Bluetooth: hci3: HCI_REQ-0x0c1a [ 145.853817] Bluetooth: hci2: command 0x040f tx timeout [ 146.078474] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 146.079455] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 146.084880] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 146.182733] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 146.183326] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 146.184821] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 146.238736] Bluetooth: hci6: command 0x040f tx timeout [ 146.301691] Bluetooth: hci4: command 0x040f tx timeout [ 146.685656] Bluetooth: hci7: command 0x040f tx timeout [ 147.134690] Bluetooth: hci3: command 0x0409 tx timeout [ 147.902653] Bluetooth: hci2: command 0x0419 tx timeout [ 148.285660] Bluetooth: hci6: command 0x0419 tx timeout [ 148.350637] Bluetooth: hci4: command 0x0419 tx timeout [ 148.733655] Bluetooth: hci7: command 0x0419 tx timeout [ 149.181744] Bluetooth: hci3: command 0x041b tx timeout [ 151.230701] Bluetooth: hci3: command 0x040f tx timeout [ 153.277663] Bluetooth: hci3: command 0x0419 tx timeout [ 176.257780] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 176.258338] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 176.260552] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 176.403941] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 176.404577] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 176.406531] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 177.273576] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 177.274651] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 177.276137] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 177.349135] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 177.349926] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 177.351369] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 177.439215] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 177.440111] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 177.449869] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 177.478879] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 177.479450] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 177.481406] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 177.537438] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 177.538127] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 177.539537] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 177.587578] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 177.588468] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 177.590063] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 178.301282] BUG: unable to handle page fault for address: ffffed100fffc000 [ 178.301834] #PF: supervisor write access in kernel mode [ 178.302192] #PF: error_code(0x0002) - not-present page [ 178.302533] PGD 7ffd3067 P4D 7ffd3067 PUD 7ffd2067 PMD 7ffd1067 PTE 0 [ 178.306671] Oops: 0002 [#1] PREEMPT SMP KASAN NOPTI [ 178.307467] CPU: 1 PID: 6128 Comm: syz-executor.2 Not tainted 6.1.0-rc3-next-20221031 #1 [ 178.308716] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 178.309982] RIP: 0010:__memset+0x24/0x50 [ 178.310679] Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 4d d4 12 00 66 66 2e 0f 1f 84 00 [ 178.313433] RSP: 0018:ffff88804179fcc0 EFLAGS: 00010212 [ 178.314294] RAX: 0000000000000000 RBX: ffff88800c0cb0c0 RCX: 1ffffe21fe60762b [ 178.315256] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 [ 178.316204] RBP: ffff88800c0eda00 R08: 0000000000000005 R09: ffffed1001819618 [ 178.317144] R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c0eda00 [ 178.318101] R13: ffff88800c0cb0c0 R14: ffffffff815f27a0 R15: 1ffff11001122a1f [ 178.319049] FS: 00007f0b1bc10700(0000) GS:ffff88806d100000(0000) knlGS:0000000000000000 [ 178.320116] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 178.320897] CR2: ffffed100fffc000 CR3: 000000000f734000 CR4: 0000000000350ee0 [ 178.321856] Call Trace: [ 178.322215] [ 178.322527] kasan_unpoison+0x23/0x60 [ 178.323055] mempool_exit+0x1c2/0x330 [ 178.323601] bioset_exit+0x2c9/0x630 [ 178.324137] disk_release+0x143/0x490 [ 178.324685] ? disk_release+0x0/0x490 [ 178.325231] ? device_release+0x0/0x250 [ 178.325808] device_release+0xa2/0x250 [ 178.326354] ? device_release+0x0/0x250 [ 178.326912] kobject_put+0x173/0x280 [ 178.327448] put_device+0x1b/0x40 [ 178.327938] put_disk+0x41/0x60 [ 178.328413] loop_control_ioctl+0x4d1/0x630 [ 178.329025] ? loop_control_ioctl+0x0/0x630 [ 178.329639] ? selinux_file_ioctl+0xb1/0x270 [ 178.330281] ? loop_control_ioctl+0x0/0x630 [ 178.330884] __x64_sys_ioctl+0x19a/0x220 [ 178.331451] do_syscall_64+0x3b/0xa0 [ 178.331993] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 178.332703] RIP: 0033:0x7f0b1e69ab19 [ 178.333225] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 178.335657] RSP: 002b:00007f0b1bc10188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 178.336666] RAX: ffffffffffffffda RBX: 00007f0b1e7adf60 RCX: 00007f0b1e69ab19 [ 178.337632] RDX: 0000000000000000 RSI: 0000000000004c81 RDI: 0000000000000006 [ 178.338595] RBP: 00007f0b1e6f4f6d R08: 0000000000000000 R09: 0000000000000000 [ 178.339559] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 178.340519] R13: 00007ffe395f7fff R14: 00007f0b1bc10300 R15: 0000000000022000 [ 178.341491] [ 178.341848] Modules linked in: [ 178.342292] CR2: ffffed100fffc000 [ 178.342773] ---[ end trace 0000000000000000 ]--- [ 178.343418] RIP: 0010:__memset+0x24/0x50 [ 178.344002] Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 4d d4 12 00 66 66 2e 0f 1f 84 00 [ 178.346459] RSP: 0018:ffff88804179fcc0 EFLAGS: 00010212 [ 178.347193] RAX: 0000000000000000 RBX: ffff88800c0cb0c0 RCX: 1ffffe21fe60762b [ 178.348180] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 [ 178.349109] RBP: ffff88800c0eda00 R08: 0000000000000005 R09: ffffed1001819618 [ 178.350071] R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c0eda00 [ 178.351082] R13: ffff88800c0cb0c0 R14: ffffffff815f27a0 R15: 1ffff11001122a1f [ 178.352081] FS: 00007f0b1bc10700(0000) GS:ffff88806d100000(0000) knlGS:0000000000000000 [ 178.353153] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 178.353963] CR2: ffffed100fffc000 CR3: 000000000f734000 CR4: 0000000000350ee0 [ 179.075431] ieee80211 phy20: Selected rate control algorithm 'minstrel_ht' [ 179.089366] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 179.090109] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 179.090931] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 179.095093] ieee80211 phy21: Selected rate control algorithm 'minstrel_ht' [ 179.107413] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 179.107913] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 179.108505] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 12:24:53 executing program 7: shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r0 = shmget(0x3, 0xa000, 0x20, &(0x7f0000ff6000/0xa000)=nil) shmget(0x0, 0x1000, 0x20, &(0x7f0000ffb000/0x1000)=nil) shmat(0x0, &(0x7f0000fe9000/0x3000)=nil, 0x2000) shmat(0x0, &(0x7f0000fe6000/0xe000)=nil, 0x9000) shmctl$IPC_RMID(0x0, 0x0) shmctl$IPC_RMID(0x0, 0x0) shmat(0x0, &(0x7f0000feb000/0x3000)=nil, 0x0) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x2000) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) mmap$perf(&(0x7f0000fed000/0x3000)=nil, 0x3000, 0x0, 0x13, r1, 0x4) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x80200, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x149, 0x7}, 0x10601, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = shmget(0x2, 0x2000, 0x2, &(0x7f0000ffc000/0x2000)=nil) shmat(r4, &(0x7f0000fed000/0x1000)=nil, 0x6000) openat2(r2, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)={0x40200, 0x1e1, 0x1b}, 0x18) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) 12:24:53 executing program 0: shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r0 = shmget(0x3, 0xa000, 0x20, &(0x7f0000ff6000/0xa000)=nil) shmget(0x0, 0x1000, 0x20, &(0x7f0000ffb000/0x1000)=nil) shmat(0x0, &(0x7f0000fe9000/0x3000)=nil, 0x2000) shmat(0x0, &(0x7f0000fe6000/0xe000)=nil, 0x9000) shmctl$IPC_RMID(0x0, 0x0) shmctl$IPC_RMID(0x0, 0x0) shmat(0x0, &(0x7f0000feb000/0x3000)=nil, 0x0) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x2000) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) mmap$perf(&(0x7f0000fed000/0x3000)=nil, 0x3000, 0x0, 0x13, r1, 0x4) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x80200, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x149, 0x7}, 0x10601, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = shmget(0x2, 0x2000, 0x2, &(0x7f0000ffc000/0x2000)=nil) shmat(r4, &(0x7f0000fed000/0x1000)=nil, 0x6000) openat2(r2, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)={0x40200, 0x1e1, 0x1b}, 0x18) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) 12:24:53 executing program 6: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @none, 0x1}, 0xe) 12:24:53 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffef46}}, './file0\x00'}) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x882d00, 0x0) mount_setattr(r1, &(0x7f0000000040)='./file0\x00', 0x1800, &(0x7f0000000100)={0x200072, 0x4, 0xe0000, {r2}}, 0x20) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) open(0x0, 0x0, 0x48) r3 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(r3, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) 12:24:53 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffef46}}, './file0\x00'}) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x882d00, 0x0) mount_setattr(r1, &(0x7f0000000040)='./file0\x00', 0x1800, &(0x7f0000000100)={0x200072, 0x4, 0xe0000, {r2}}, 0x20) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) open(0x0, 0x0, 0x48) r3 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(r3, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) 12:24:53 executing program 2: shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r0 = shmget(0x3, 0xa000, 0x20, &(0x7f0000ff6000/0xa000)=nil) shmget(0x0, 0x1000, 0x20, &(0x7f0000ffb000/0x1000)=nil) shmat(0x0, &(0x7f0000fe9000/0x3000)=nil, 0x2000) shmat(0x0, &(0x7f0000fe6000/0xe000)=nil, 0x9000) shmctl$IPC_RMID(0x0, 0x0) shmctl$IPC_RMID(0x0, 0x0) shmat(0x0, &(0x7f0000feb000/0x3000)=nil, 0x0) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x2000) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) mmap$perf(&(0x7f0000fed000/0x3000)=nil, 0x3000, 0x0, 0x13, r1, 0x4) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x80200, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x149, 0x7}, 0x10601, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = shmget(0x2, 0x2000, 0x2, &(0x7f0000ffc000/0x2000)=nil) shmat(r4, &(0x7f0000fed000/0x1000)=nil, 0x6000) openat2(r2, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)={0x40200, 0x1e1, 0x1b}, 0x18) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) 12:24:53 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000400)={0x2, 0x80, 0x2b, 0x9, 0xb2, 0x5, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0xb60, 0x4, @perf_bp={&(0x7f00000003c0), 0x9}, 0x344, 0x10001, 0x101, 0x4, 0x8, 0x80000001, 0xaf, 0x0, 0x5, 0x0, 0x12}, 0x0, 0xa, r0, 0x2) syz_read_part_table(0x2, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000000)="c9fa09343bb8fd97cd3b2abd40e23eb8b76915848124e29981a1bd8d3fe8b681f3fabb634fac1024abc0f1643d88e733fb348d73aa8350e91c48490251bf7f812e8f5d1173c0", 0x46, 0x100000000}, {0x0}]) signalfd4(r1, &(0x7f00000001c0)={[0xff8d]}, 0x8, 0x800) r2 = getpid() ptrace$peek(0x2, r2, &(0x7f0000000480)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, @perf_bp={0x0, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x7ff}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r3, 0x4, &(0x7f0000000240)='\x00', &(0x7f0000000300)='./file2\x00', 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001180)=ANY=[], 0x220) 12:24:53 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffef46}}, './file0\x00'}) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x882d00, 0x0) mount_setattr(r1, &(0x7f0000000040)='./file0\x00', 0x1800, &(0x7f0000000100)={0x200072, 0x4, 0xe0000, {r2}}, 0x20) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) open(0x0, 0x0, 0x48) r3 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(r3, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) [ 179.408281] loop4: detected capacity change from 0 to 264192 12:24:54 executing program 6: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @none, 0x1}, 0xe) [ 179.531934] BUG: unable to handle page fault for address: ffffed100fffc000 [ 179.532431] #PF: supervisor write access in kernel mode [ 179.532773] #PF: error_code(0x0002) - not-present page [ 179.533115] PGD 7ffd3067 P4D 7ffd3067 PUD 7ffd2067 PMD 7ffd1067 PTE 0 [ 179.533560] Oops: 0002 [#2] PREEMPT SMP KASAN NOPTI [ 179.533895] CPU: 1 PID: 6188 Comm: syz-executor.2 Tainted: G D 6.1.0-rc3-next-20221031 #1 [ 179.534508] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 179.535020] RIP: 0010:__memset+0x24/0x50 [ 179.535300] Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 4d d4 12 00 66 66 2e 0f 1f 84 00 [ 179.536422] RSP: 0018:ffff88803a75fcc0 EFLAGS: 00010212 [ 179.536759] RAX: 0000000000000000 RBX: ffff88800c0cb240 RCX: 1ffffe21fe607631 [ 179.537202] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 [ 179.537650] RBP: ffff88800c0eda00 R08: 0000000000000005 R09: ffffed1001819648 [ 179.538114] R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c0eda00 [ 179.538562] R13: ffff88800c0cb240 R14: ffffffff815f27a0 R15: 1ffff1100112261f [ 179.539030] FS: 00007f0b1bc10700(0000) GS:ffff88806d100000(0000) knlGS:0000000000000000 [ 179.539565] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 179.539947] CR2: ffffed100fffc000 CR3: 0000000015126000 CR4: 0000000000350ee0 [ 179.540409] Call Trace: [ 179.540590] [ 179.540749] kasan_unpoison+0x23/0x60 [ 179.541015] mempool_exit+0x1c2/0x330 [ 179.541286] bioset_exit+0x2c9/0x630 [ 179.541546] disk_release+0x143/0x490 [ 179.541817] ? disk_release+0x0/0x490 [ 179.542081] ? device_release+0x0/0x250 [ 179.542353] device_release+0xa2/0x250 [ 179.542615] ? device_release+0x0/0x250 [ 179.542881] kobject_put+0x173/0x280 [ 179.543136] put_device+0x1b/0x40 [ 179.543370] put_disk+0x41/0x60 [ 179.543598] loop_control_ioctl+0x4d1/0x630 [ 179.543890] ? loop_control_ioctl+0x0/0x630 [ 179.544181] ? selinux_file_ioctl+0xb1/0x270 [ 179.544484] ? loop_control_ioctl+0x0/0x630 [ 179.544780] __x64_sys_ioctl+0x19a/0x220 [ 179.545056] do_syscall_64+0x3b/0xa0 [ 179.545315] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 179.545653] RIP: 0033:0x7f0b1e69ab19 [ 179.545909] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 179.547075] RSP: 002b:00007f0b1bc10188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 179.547568] RAX: ffffffffffffffda RBX: 00007f0b1e7adf60 RCX: 00007f0b1e69ab19 [ 179.548027] RDX: 0000000000000001 RSI: 0000000000004c81 RDI: 0000000000000006 [ 179.548487] RBP: 00007f0b1e6f4f6d R08: 0000000000000000 R09: 0000000000000000 [ 179.548967] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 179.549461] R13: 00007ffe395f7fff R14: 00007f0b1bc10300 R15: 0000000000022000 [ 179.549957] [ 179.550114] Modules linked in: [ 179.550333] CR2: ffffed100fffc000 [ 179.550564] ---[ end trace 0000000000000000 ]--- [ 179.550887] RIP: 0010:__memset+0x24/0x50 [ 179.551171] Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 4d d4 12 00 66 66 2e 0f 1f 84 00 [ 179.552336] RSP: 0018:ffff88804179fcc0 EFLAGS: 00010212 [ 179.552686] RAX: 0000000000000000 RBX: ffff88800c0cb0c0 RCX: 1ffffe21fe60762b [ 179.553152] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 [ 179.553615] RBP: ffff88800c0eda00 R08: 0000000000000005 R09: ffffed1001819618 [ 179.554095] R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c0eda00 [ 179.554558] R13: ffff88800c0cb0c0 R14: ffffffff815f27a0 R15: 1ffff11001122a1f [ 179.555023] FS: 00007f0b1bc10700(0000) GS:ffff88806d100000(0000) knlGS:0000000000000000 [ 179.555550] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 179.555932] CR2: ffffed100fffc000 CR3: 0000000015126000 CR4: 0000000000350ee0 [ 179.621190] BUG: unable to handle page fault for address: ffffed100fffc000 [ 179.621678] #PF: supervisor write access in kernel mode [ 179.622042] #PF: error_code(0x0002) - not-present page [ 179.622365] PGD 7ffd3067 P4D 7ffd3067 PUD 7ffd2067 PMD 7ffd1067 PTE 0 [ 179.622783] Oops: 0002 [#3] PREEMPT SMP KASAN NOPTI [ 179.623094] CPU: 0 PID: 6194 Comm: syz-executor.0 Tainted: G D 6.1.0-rc3-next-20221031 #1 [ 179.623700] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 179.624231] RIP: 0010:__memset+0x24/0x50 [ 179.624519] Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 4d d4 12 00 66 66 2e 0f 1f 84 00 [ 179.625663] RSP: 0018:ffff88804192fcc0 EFLAGS: 00010212 [ 179.626020] RAX: 0000000000000000 RBX: ffff88800c0cb3c0 RCX: 1ffffe21fe607637 [ 179.626478] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 [ 179.626916] RBP: ffff88800c0eda00 R08: 0000000000000005 R09: ffffed1001819678 [ 179.627348] R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c0eda00 [ 179.627782] R13: ffff88800c0cb3c0 R14: ffffffff815f27a0 R15: 1ffff1100112221f [ 179.628221] FS: 00007f3c02811700(0000) GS:ffff88806d000000(0000) knlGS:0000000000000000 [ 179.628705] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 179.629061] CR2: ffffed100fffc000 CR3: 000000003af16000 CR4: 0000000000350ef0 [ 179.629491] Call Trace: [ 179.629658] [ 179.629815] kasan_unpoison+0x23/0x60 [ 179.630067] mempool_exit+0x1c2/0x330 [ 179.630320] bioset_exit+0x2c9/0x630 [ 179.630567] disk_release+0x143/0x490 [ 179.630814] ? disk_release+0x0/0x490 [ 179.631064] ? device_release+0x0/0x250 [ 179.631318] device_release+0xa2/0x250 [ 179.631568] ? device_release+0x0/0x250 [ 179.631830] kobject_put+0x173/0x280 [ 179.632082] put_device+0x1b/0x40 [ 179.632307] put_disk+0x41/0x60 [ 179.632526] loop_control_ioctl+0x4d1/0x630 [ 179.632803] ? loop_control_ioctl+0x0/0x630 [ 179.633078] ? selinux_file_ioctl+0xb1/0x270 [ 179.633370] ? loop_control_ioctl+0x0/0x630 [ 179.633644] __x64_sys_ioctl+0x19a/0x220 [ 179.633926] do_syscall_64+0x3b/0xa0 [ 179.634181] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 179.634508] RIP: 0033:0x7f3c0529bb19 [ 179.634744] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 179.635833] RSP: 002b:00007f3c02811188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 179.636301] RAX: ffffffffffffffda RBX: 00007f3c053aef60 RCX: 00007f3c0529bb19 [ 179.636737] RDX: 0000000000000002 RSI: 0000000000004c81 RDI: 0000000000000006 [ 179.637174] RBP: 00007f3c052f5f6d R08: 0000000000000000 R09: 0000000000000000 [ 179.637605] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 179.638059] R13: 00007ffddc574dcf R14: 00007f3c02811300 R15: 0000000000022000 [ 179.638498] [ 179.638649] Modules linked in: [ 179.638858] CR2: ffffed100fffc000 [ 179.639077] ---[ end trace 0000000000000000 ]--- [ 179.639366] RIP: 0010:__memset+0x24/0x50 [ 179.639634] Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 4d d4 12 00 66 66 2e 0f 1f 84 00 [ 179.640717] RSP: 0018:ffff88804179fcc0 EFLAGS: 00010212 [ 179.641045] RAX: 0000000000000000 RBX: ffff88800c0cb0c0 RCX: 1ffffe21fe60762b [ 179.641480] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 [ 179.641921] RBP: ffff88800c0eda00 R08: 0000000000000005 R09: ffffed1001819618 [ 179.642375] R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c0eda00 [ 179.642823] R13: ffff88800c0cb0c0 R14: ffffffff815f27a0 R15: 1ffff11001122a1f [ 179.643268] FS: 00007f3c02811700(0000) GS:ffff88806d000000(0000) knlGS:0000000000000000 [ 179.643759] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 179.644124] CR2: ffffed100fffc000 CR3: 000000003af16000 CR4: 0000000000350ef0 [ 179.720243] BUG: unable to handle page fault for address: ffffed100fffc000 [ 179.720741] #PF: supervisor write access in kernel mode [ 179.721086] #PF: error_code(0x0002) - not-present page [ 179.721434] PGD 7ffd3067 P4D 7ffd3067 PUD 7ffd2067 PMD 7ffd1067 PTE 0 [ 179.721895] Oops: 0002 [#4] PREEMPT SMP KASAN NOPTI [ 179.722228] CPU: 1 PID: 6196 Comm: syz-executor.7 Tainted: G D 6.1.0-rc3-next-20221031 #1 [ 179.722842] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 179.723370] RIP: 0010:__memset+0x24/0x50 [ 179.723661] Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 4d d4 12 00 66 66 2e 0f 1f 84 00 [ 179.724826] RSP: 0018:ffff888041397cc0 EFLAGS: 00010212 [ 179.725174] RAX: 0000000000000000 RBX: ffff88800c0cb540 RCX: 1ffffe21fe60763d [ 179.725639] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 [ 179.726111] RBP: ffff88800c0eda00 R08: 0000000000000005 R09: ffffed10018196a8 [ 179.726573] R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c0eda00 [ 179.727037] R13: ffff88800c0cb540 R14: ffffffff815f27a0 R15: 1ffff11001124e1f [ 179.727503] FS: 00007f70af76d700(0000) GS:ffff88806d100000(0000) knlGS:0000000000000000 [ 179.728032] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 179.728412] CR2: ffffed100fffc000 CR3: 0000000033f06000 CR4: 0000000000350ee0 [ 179.728856] Call Trace: [ 179.729025] [ 179.729174] kasan_unpoison+0x23/0x60 [ 179.729425] mempool_exit+0x1c2/0x330 [ 179.729679] bioset_exit+0x2c9/0x630 [ 179.729948] disk_release+0x143/0x490 [ 179.730200] ? disk_release+0x0/0x490 [ 179.730452] ? device_release+0x0/0x250 [ 179.730712] device_release+0xa2/0x250 [ 179.730966] ? device_release+0x0/0x250 [ 179.731230] kobject_put+0x173/0x280 [ 179.731475] put_device+0x1b/0x40 [ 179.731706] put_disk+0x41/0x60 [ 179.731929] loop_control_ioctl+0x4d1/0x630 [ 179.732211] ? loop_control_ioctl+0x0/0x630 [ 179.732491] ? selinux_file_ioctl+0xb1/0x270 [ 179.732789] ? loop_control_ioctl+0x0/0x630 [ 179.733072] __x64_sys_ioctl+0x19a/0x220 [ 179.733342] do_syscall_64+0x3b/0xa0 [ 179.733592] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 179.733934] RIP: 0033:0x7f70b21f7b19 [ 179.734179] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 179.735284] RSP: 002b:00007f70af76d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 179.735799] RAX: ffffffffffffffda RBX: 00007f70b230af60 RCX: 00007f70b21f7b19 [ 179.736270] RDX: 0000000000000003 RSI: 0000000000004c81 RDI: 0000000000000006 [ 179.736733] RBP: 00007f70b2251f6d R08: 0000000000000000 R09: 0000000000000000 [ 179.737195] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 179.737657] R13: 00007ffdcfa9d77f R14: 00007f70af76d300 R15: 0000000000022000 [ 179.738132] [ 179.738297] Modules linked in: [ 179.738516] CR2: ffffed100fffc000 [ 179.738751] ---[ end trace 0000000000000000 ]--- [ 179.739057] RIP: 0010:__memset+0x24/0x50 [ 179.739339] Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 4d d4 12 00 66 66 2e 0f 1f 84 00 [ 179.740501] RSP: 0018:ffff88804179fcc0 EFLAGS: 00010212 [ 179.740849] RAX: 0000000000000000 RBX: ffff88800c0cb0c0 RCX: 1ffffe21fe60762b [ 179.741308] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 [ 179.741778] RBP: ffff88800c0eda00 R08: 0000000000000005 R09: ffffed1001819618 [ 179.742265] R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c0eda00 [ 179.742714] R13: ffff88800c0cb0c0 R14: ffffffff815f27a0 R15: 1ffff11001122a1f [ 179.743158] FS: 00007f70af76d700(0000) GS:ffff88806d100000(0000) knlGS:0000000000000000 [ 179.743657] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 179.744027] CR2: ffffed100fffc000 CR3: 0000000033f06000 CR4: 0000000000350ee0 12:24:54 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffef46}}, './file0\x00'}) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x882d00, 0x0) mount_setattr(r1, &(0x7f0000000040)='./file0\x00', 0x1800, &(0x7f0000000100)={0x200072, 0x4, 0xe0000, {r2}}, 0x20) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) open(0x0, 0x0, 0x48) r3 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(r3, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) 12:24:54 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffef46}}, './file0\x00'}) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x882d00, 0x0) mount_setattr(r1, &(0x7f0000000040)='./file0\x00', 0x1800, &(0x7f0000000100)={0x200072, 0x4, 0xe0000, {r2}}, 0x20) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) open(0x0, 0x0, 0x48) r3 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(r3, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) 12:24:54 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000400)={0x2, 0x80, 0x2b, 0x9, 0xb2, 0x5, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0xb60, 0x4, @perf_bp={&(0x7f00000003c0), 0x9}, 0x344, 0x10001, 0x101, 0x4, 0x8, 0x80000001, 0xaf, 0x0, 0x5, 0x0, 0x12}, 0x0, 0xa, r0, 0x2) syz_read_part_table(0x2, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000000)="c9fa09343bb8fd97cd3b2abd40e23eb8b76915848124e29981a1bd8d3fe8b681f3fabb634fac1024abc0f1643d88e733fb348d73aa8350e91c48490251bf7f812e8f5d1173c0", 0x46, 0x100000000}, {0x0}]) signalfd4(r1, &(0x7f00000001c0)={[0xff8d]}, 0x8, 0x800) r2 = getpid() ptrace$peek(0x2, r2, &(0x7f0000000480)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, @perf_bp={0x0, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x7ff}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r3, 0x4, &(0x7f0000000240)='\x00', &(0x7f0000000300)='./file2\x00', 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001180)=ANY=[], 0x220) 12:24:54 executing program 6: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @none, 0x1}, 0xe) 12:24:54 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffef46}}, './file0\x00'}) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x882d00, 0x0) mount_setattr(r1, &(0x7f0000000040)='./file0\x00', 0x1800, &(0x7f0000000100)={0x200072, 0x4, 0xe0000, {r2}}, 0x20) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) open(0x0, 0x0, 0x48) r3 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(r3, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) 12:24:54 executing program 2: shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r0 = shmget(0x3, 0xa000, 0x20, &(0x7f0000ff6000/0xa000)=nil) shmget(0x0, 0x1000, 0x20, &(0x7f0000ffb000/0x1000)=nil) shmat(0x0, &(0x7f0000fe9000/0x3000)=nil, 0x2000) shmat(0x0, &(0x7f0000fe6000/0xe000)=nil, 0x9000) shmctl$IPC_RMID(0x0, 0x0) shmctl$IPC_RMID(0x0, 0x0) shmat(0x0, &(0x7f0000feb000/0x3000)=nil, 0x0) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x2000) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) mmap$perf(&(0x7f0000fed000/0x3000)=nil, 0x3000, 0x0, 0x13, r1, 0x4) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x80200, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x149, 0x7}, 0x10601, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = shmget(0x2, 0x2000, 0x2, &(0x7f0000ffc000/0x2000)=nil) shmat(r4, &(0x7f0000fed000/0x1000)=nil, 0x6000) openat2(r2, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)={0x40200, 0x1e1, 0x1b}, 0x18) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) 12:24:54 executing program 7: shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r0 = shmget(0x3, 0xa000, 0x20, &(0x7f0000ff6000/0xa000)=nil) shmget(0x0, 0x1000, 0x20, &(0x7f0000ffb000/0x1000)=nil) shmat(0x0, &(0x7f0000fe9000/0x3000)=nil, 0x2000) shmat(0x0, &(0x7f0000fe6000/0xe000)=nil, 0x9000) shmctl$IPC_RMID(0x0, 0x0) shmctl$IPC_RMID(0x0, 0x0) shmat(0x0, &(0x7f0000feb000/0x3000)=nil, 0x0) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x2000) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) mmap$perf(&(0x7f0000fed000/0x3000)=nil, 0x3000, 0x0, 0x13, r1, 0x4) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x80200, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x149, 0x7}, 0x10601, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = shmget(0x2, 0x2000, 0x2, &(0x7f0000ffc000/0x2000)=nil) shmat(r4, &(0x7f0000fed000/0x1000)=nil, 0x6000) openat2(r2, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)={0x40200, 0x1e1, 0x1b}, 0x18) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) 12:24:54 executing program 0: shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r0 = shmget(0x3, 0xa000, 0x20, &(0x7f0000ff6000/0xa000)=nil) shmget(0x0, 0x1000, 0x20, &(0x7f0000ffb000/0x1000)=nil) shmat(0x0, &(0x7f0000fe9000/0x3000)=nil, 0x2000) shmat(0x0, &(0x7f0000fe6000/0xe000)=nil, 0x9000) shmctl$IPC_RMID(0x0, 0x0) shmctl$IPC_RMID(0x0, 0x0) shmat(0x0, &(0x7f0000feb000/0x3000)=nil, 0x0) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x2000) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) mmap$perf(&(0x7f0000fed000/0x3000)=nil, 0x3000, 0x0, 0x13, r1, 0x4) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x80200, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x149, 0x7}, 0x10601, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = shmget(0x2, 0x2000, 0x2, &(0x7f0000ffc000/0x2000)=nil) shmat(r4, &(0x7f0000fed000/0x1000)=nil, 0x6000) openat2(r2, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)={0x40200, 0x1e1, 0x1b}, 0x18) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) [ 180.561069] BUG: unable to handle page fault for address: ffffed100fffc000 [ 180.561750] #PF: supervisor write access in kernel mode [ 180.562232] #PF: error_code(0x0002) - not-present page [ 180.562712] PGD 7ffd3067 P4D 7ffd3067 PUD 7ffd2067 PMD 7ffd1067 PTE 0 [ 180.563325] Oops: 0002 [#5] PREEMPT SMP KASAN NOPTI [ 180.563788] CPU: 0 PID: 6220 Comm: syz-executor.0 Tainted: G D 6.1.0-rc3-next-20221031 #1 [ 180.564613] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 180.565296] RIP: 0010:__memset+0x24/0x50 [ 180.565665] Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 4d d4 12 00 66 66 2e 0f 1f 84 00 [ 180.567102] RSP: 0018:ffff888040f67cc0 EFLAGS: 00010212 [ 180.567512] RAX: 0000000000000000 RBX: ffff88800c0cb6c0 RCX: 1ffffe21fe607643 [ 180.568098] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 [ 180.568671] RBP: ffff88800c0eda00 R08: 0000000000000005 R09: ffffed10018196d8 [ 180.569225] R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c0eda00 [ 180.569789] R13: ffff88800c0cb6c0 R14: ffffffff815f27a0 R15: 1ffff11001124a1f [ 180.570416] FS: 00007f3c02811700(0000) GS:ffff88806d000000(0000) knlGS:0000000000000000 [ 180.571140] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 180.571674] CR2: ffffed100fffc000 CR3: 0000000016912000 CR4: 0000000000350ef0 [ 180.572320] Call Trace: [ 180.572568] [ 180.572785] kasan_unpoison+0x23/0x60 [ 180.573155] mempool_exit+0x1c2/0x330 [ 180.573536] bioset_exit+0x2c9/0x630 [ 180.573913] disk_release+0x143/0x490 [ 180.574273] ? disk_release+0x0/0x490 [ 180.574637] ? device_release+0x0/0x250 [ 180.575023] device_release+0xa2/0x250 [ 180.575393] ? device_release+0x0/0x250 [ 180.575762] kobject_put+0x173/0x280 [ 180.576118] put_device+0x1b/0x40 [ 180.576450] put_disk+0x41/0x60 [ 180.576773] loop_control_ioctl+0x4d1/0x630 [ 180.577176] ? loop_control_ioctl+0x0/0x630 [ 180.577590] ? selinux_file_ioctl+0xb1/0x270 [ 180.578050] ? loop_control_ioctl+0x0/0x630 [ 180.578464] __x64_sys_ioctl+0x19a/0x220 [ 180.578877] do_syscall_64+0x3b/0xa0 [ 180.579253] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 180.579711] RIP: 0033:0x7f3c0529bb19 [ 180.580096] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 180.581784] RSP: 002b:00007f3c02811188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 180.582494] RAX: ffffffffffffffda RBX: 00007f3c053aef60 RCX: 00007f3c0529bb19 [ 180.583164] RDX: 0000000000000004 RSI: 0000000000004c81 RDI: 0000000000000006 [ 180.583804] RBP: 00007f3c052f5f6d R08: 0000000000000000 R09: 0000000000000000 [ 180.584453] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 180.585103] R13: 00007ffddc574dcf R14: 00007f3c02811300 R15: 0000000000022000 [ 180.585765] [ 180.585985] Modules linked in: [ 180.586285] CR2: ffffed100fffc000 [ 180.586608] ---[ end trace 0000000000000000 ]--- [ 180.587040] RIP: 0010:__memset+0x24/0x50 [ 180.587445] Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 4d d4 12 00 66 66 2e 0f 1f 84 00 [ 180.589049] RSP: 0018:ffff88804179fcc0 EFLAGS: 00010212 [ 180.589531] RAX: 0000000000000000 RBX: ffff88800c0cb0c0 RCX: 1ffffe21fe60762b [ 180.590203] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 [ 180.590860] RBP: ffff88800c0eda00 R08: 0000000000000005 R09: ffffed1001819618 [ 180.591509] R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c0eda00 [ 180.592161] R13: ffff88800c0cb0c0 R14: ffffffff815f27a0 R15: 1ffff11001122a1f [ 180.592801] FS: 00007f3c02811700(0000) GS:ffff88806d000000(0000) knlGS:0000000000000000 [ 180.593525] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 180.594074] CR2: ffffed100fffc000 CR3: 0000000016912000 CR4: 0000000000350ef0 12:24:55 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffef46}}, './file0\x00'}) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x882d00, 0x0) mount_setattr(r1, &(0x7f0000000040)='./file0\x00', 0x1800, &(0x7f0000000100)={0x200072, 0x4, 0xe0000, {r2}}, 0x20) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) open(0x0, 0x0, 0x48) r3 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(r3, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) 12:24:55 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffef46}}, './file0\x00'}) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x882d00, 0x0) mount_setattr(r1, &(0x7f0000000040)='./file0\x00', 0x1800, &(0x7f0000000100)={0x200072, 0x4, 0xe0000, {r2}}, 0x20) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) open(0x0, 0x0, 0x48) r3 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(r3, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) 12:24:55 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffef46}}, './file0\x00'}) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x882d00, 0x0) mount_setattr(r1, &(0x7f0000000040)='./file0\x00', 0x1800, &(0x7f0000000100)={0x200072, 0x4, 0xe0000, {r2}}, 0x20) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) open(0x0, 0x0, 0x48) r3 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(r3, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) 12:24:55 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffef46}}, './file0\x00'}) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x882d00, 0x0) mount_setattr(r1, &(0x7f0000000040)='./file0\x00', 0x1800, &(0x7f0000000100)={0x200072, 0x4, 0xe0000, {r2}}, 0x20) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) open(0x0, 0x0, 0x48) r3 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(r3, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) 12:24:55 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) rt_sigtimedwait(0x0, 0x0, 0x0, 0x0) 12:24:55 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffef46}}, './file0\x00'}) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x882d00, 0x0) mount_setattr(r1, &(0x7f0000000040)='./file0\x00', 0x1800, &(0x7f0000000100)={0x200072, 0x4, 0xe0000, {r2}}, 0x20) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) open(0x0, 0x0, 0x48) r3 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(r3, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) 12:24:55 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000005c0)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x6e6bb5}}, 0xb8}}, 0x0) 12:24:55 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000400)={0x2, 0x80, 0x2b, 0x9, 0xb2, 0x5, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0xb60, 0x4, @perf_bp={&(0x7f00000003c0), 0x9}, 0x344, 0x10001, 0x101, 0x4, 0x8, 0x80000001, 0xaf, 0x0, 0x5, 0x0, 0x12}, 0x0, 0xa, r0, 0x2) syz_read_part_table(0x2, 0x2, &(0x7f0000001f00)=[{&(0x7f0000000000)="c9fa09343bb8fd97cd3b2abd40e23eb8b76915848124e29981a1bd8d3fe8b681f3fabb634fac1024abc0f1643d88e733fb348d73aa8350e91c48490251bf7f812e8f5d1173c0", 0x46, 0x100000000}, {0x0}]) signalfd4(r1, &(0x7f00000001c0)={[0xff8d]}, 0x8, 0x800) r2 = getpid() ptrace$peek(0x2, r2, &(0x7f0000000480)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x200, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, @perf_bp={0x0, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x7ff}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r3, 0x4, &(0x7f0000000240)='\x00', &(0x7f0000000300)='./file2\x00', 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001180)=ANY=[], 0x220) 12:24:55 executing program 5: capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000580)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file1\x00', &(0x7f0000000180), 0x0, 0x0, 0x0) [ 181.385114] BUG: unable to handle page fault for address: ffffed100fffc000 [ 181.385867] #PF: supervisor write access in kernel mode [ 181.386377] #PF: error_code(0x0002) - not-present page [ 181.386874] PGD 7ffd3067 P4D 7ffd3067 PUD 7ffd2067 PMD 7ffd1067 PTE 0 [ 181.387525] Oops: 0002 [#6] PREEMPT SMP KASAN NOPTI [ 181.388013] CPU: 1 PID: 6222 Comm: syz-executor.2 Tainted: G D 6.1.0-rc3-next-20221031 #1 [ 181.388931] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 181.389717] RIP: 0010:__memset+0x24/0x50 [ 181.390162] Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 4d d4 12 00 66 66 2e 0f 1f 84 00 [ 181.391914] RSP: 0018:ffff888041707cc0 EFLAGS: 00010212 [ 181.392434] RAX: 0000000000000000 RBX: ffff88800c0cb9c0 RCX: 1ffffe21fe60764f [ 181.393125] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 [ 181.393815] RBP: ffff88800c0eda00 R08: 0000000000000005 R09: ffffed1001819738 [ 181.394508] R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c0eda00 [ 181.395205] R13: ffff88800c0cb9c0 R14: ffffffff815f27a0 R15: 1ffff1100112421f [ 181.395893] FS: 00007f0b1bc10700(0000) GS:ffff88806d100000(0000) knlGS:0000000000000000 [ 181.396661] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 181.397226] CR2: ffffed100fffc000 CR3: 000000001926c000 CR4: 0000000000350ee0 [ 181.397917] Call Trace: [ 181.398178] [ 181.398405] kasan_unpoison+0x23/0x60 [ 181.398790] mempool_exit+0x1c2/0x330 [ 181.399198] bioset_exit+0x2c9/0x630 [ 181.399588] ? _raw_spin_unlock+0x24/0x50 [ 181.400027] ? blkg_destroy_all.isra.0+0x157/0x230 [ 181.400549] disk_release+0x143/0x490 [ 181.400941] ? disk_release+0x0/0x490 [ 181.401334] ? device_release+0x0/0x250 [ 181.401760] device_release+0xa2/0x250 [ 181.402174] ? device_release+0x0/0x250 [ 181.402569] kobject_put+0x173/0x280 [ 181.402944] put_device+0x1b/0x40 [ 181.403294] put_disk+0x41/0x60 [ 181.403627] loop_control_ioctl+0x4d1/0x630 [ 181.404059] ? loop_control_ioctl+0x0/0x630 [ 181.404488] ? selinux_file_ioctl+0xb1/0x270 [ 181.404939] ? loop_control_ioctl+0x0/0x630 [ 181.405370] __x64_sys_ioctl+0x19a/0x220 [ 181.405797] do_syscall_64+0x3b/0xa0 [ 181.406183] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 181.406688] RIP: 0033:0x7f0b1e69ab19 [ 181.407057] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 181.408763] RSP: 002b:00007f0b1bc10188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 181.409491] RAX: ffffffffffffffda RBX: 00007f0b1e7adf60 RCX: 00007f0b1e69ab19 [ 181.410178] RDX: 0000000000000006 RSI: 0000000000004c81 RDI: 0000000000000006 [ 181.410859] RBP: 00007f0b1e6f4f6d R08: 0000000000000000 R09: 0000000000000000 [ 181.411539] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 181.412225] R13: 00007ffe395f7fff R14: 00007f0b1bc10300 R15: 0000000000022000 [ 181.412923] [ 181.413160] Modules linked in: [ 181.413479] CR2: ffffed100fffc000 [ 181.413833] ---[ end trace 0000000000000000 ]--- [ 181.414286] RIP: 0010:__memset+0x24/0x50 [ 181.414705] Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 4d d4 12 00 66 66 2e 0f 1f 84 00 [ 181.416426] RSP: 0018:ffff88804179fcc0 EFLAGS: 00010212 [ 181.416943] RAX: 0000000000000000 RBX: ffff88800c0cb0c0 RCX: 1ffffe21fe60762b [ 181.417628] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 [ 181.418322] RBP: ffff88800c0eda00 R08: 0000000000000005 R09: ffffed1001819618 [ 181.419005] R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c0eda00 [ 181.419684] R13: ffff88800c0cb0c0 R14: ffffffff815f27a0 R15: 1ffff11001122a1f [ 181.420374] FS: 00007f0b1bc10700(0000) GS:ffff88806d100000(0000) knlGS:0000000000000000 [ 181.421144] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 181.421706] CR2: ffffed100fffc000 CR3: 000000001926c000 CR4: 0000000000350ee0 [ 181.501461] BUG: unable to handle page fault for address: ffffed100fffc000 [ 181.502422] #PF: supervisor write access in kernel mode [ 181.503180] #PF: error_code(0x0002) - not-present page [ 181.503885] PGD 7ffd3067 P4D 7ffd3067 PUD 7ffd2067 PMD 7ffd1067 PTE 0 [ 181.504790] Oops: 0002 [#7] PREEMPT SMP KASAN NOPTI [ 181.505432] CPU: 0 PID: 6226 Comm: syz-executor.7 Tainted: G D 6.1.0-rc3-next-20221031 #1 [ 181.506653] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 181.507633] RIP: 0010:__memset+0x24/0x50 [ 181.508177] Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 4d d4 12 00 66 66 2e 0f 1f 84 00 [ 181.510372] RSP: 0018:ffff8880413afcc0 EFLAGS: 00010212 [ 181.510996] RAX: 0000000000000000 RBX: ffff88800c0cb840 RCX: 1ffffe21fe607649 [ 181.511881] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 [ 181.512733] RBP: ffff88800c0eda00 R08: 0000000000000005 R09: ffffed1001819708 [ 181.513610] R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c0eda00 [ 181.514458] R13: ffff88800c0cb840 R14: ffffffff815f27a0 R15: 1ffff1100112461f [ 181.515308] FS: 00007f70af76d700(0000) GS:ffff88806d000000(0000) knlGS:0000000000000000 [ 181.516270] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 181.516980] CR2: ffffed100fffc000 CR3: 0000000032dfc000 CR4: 0000000000350ef0 [ 181.517838] Call Trace: [ 181.518170] [ 181.518447] kasan_unpoison+0x23/0x60 [ 181.518919] mempool_exit+0x1c2/0x330 [ 181.519430] bioset_exit+0x2c9/0x630 [ 181.519903] ? _raw_spin_unlock+0x24/0x50 [ 181.520461] ? blkg_destroy_all.isra.0+0x157/0x230 [ 181.521079] disk_release+0x143/0x490 [ 181.521570] ? disk_release+0x0/0x490 [ 181.522048] ? device_release+0x0/0x250 [ 181.522573] device_release+0xa2/0x250 [ 181.523169] ? device_release+0x0/0x250 [ 181.523691] kobject_put+0x173/0x280 [ 181.524151] put_device+0x1b/0x40 [ 181.524625] put_disk+0x41/0x60 [ 181.525046] loop_control_ioctl+0x4d1/0x630 [ 181.525620] ? loop_control_ioctl+0x0/0x630 [ 181.526190] ? loop_control_ioctl+0x0/0x630 [ 181.526781] __x64_sys_ioctl+0x19a/0x220 [ 181.527290] do_syscall_64+0x3b/0xa0 [ 181.527797] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 181.528430] RIP: 0033:0x7f70b21f7b19 [ 181.528919] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 181.531117] RSP: 002b:00007f70af76d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 181.532031] RAX: ffffffffffffffda RBX: 00007f70b230af60 RCX: 00007f70b21f7b19 [ 181.532900] RDX: 0000000000000005 RSI: 0000000000004c81 RDI: 0000000000000006 [ 181.533775] RBP: 00007f70b2251f6d R08: 0000000000000000 R09: 0000000000000000 [ 181.534632] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 181.535485] R13: 00007ffdcfa9d77f R14: 00007f70af76d300 R15: 0000000000022000 [ 181.536324] [ 181.536638] Modules linked in: [ 181.537029] CR2: ffffed100fffc000 [ 181.537456] ---[ end trace 0000000000000000 ]--- [ 181.538047] RIP: 0010:__memset+0x24/0x50 [ 181.538555] Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 4d d4 12 00 66 66 2e 0f 1f 84 00 [ 181.540720] RSP: 0018:ffff88804179fcc0 EFLAGS: 00010212 [ 181.541389] RAX: 0000000000000000 RBX: ffff88800c0cb0c0 RCX: 1ffffe21fe60762b [ 181.542283] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 [ 181.543323] RBP: ffff88800c0eda00 R08: 0000000000000005 R09: ffffed1001819618 [ 181.544316] R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c0eda00 [ 181.545353] R13: ffff88800c0cb0c0 R14: ffffffff815f27a0 R15: 1ffff11001122a1f [ 181.546402] FS: 00007f70af76d700(0000) GS:ffff88806d000000(0000) knlGS:0000000000000000 [ 181.547520] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 181.548343] CR2: ffffed100fffc000 CR3: 0000000032dfc000 CR4: 0000000000350ef0 [ 181.565538] audit: type=1401 audit(1667219096.146:9): op=setxattr invalid_context="" 12:24:56 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x8, 0x0, 0x0) 12:24:56 executing program 0: shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r0 = shmget(0x3, 0xa000, 0x20, &(0x7f0000ff6000/0xa000)=nil) shmget(0x0, 0x1000, 0x20, &(0x7f0000ffb000/0x1000)=nil) shmat(0x0, &(0x7f0000fe9000/0x3000)=nil, 0x2000) shmat(0x0, &(0x7f0000fe6000/0xe000)=nil, 0x9000) shmctl$IPC_RMID(0x0, 0x0) shmctl$IPC_RMID(0x0, 0x0) shmat(0x0, &(0x7f0000feb000/0x3000)=nil, 0x0) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x2000) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) mmap$perf(&(0x7f0000fed000/0x3000)=nil, 0x3000, 0x0, 0x13, r1, 0x4) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x80200, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x149, 0x7}, 0x10601, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = shmget(0x2, 0x2000, 0x2, &(0x7f0000ffc000/0x2000)=nil) shmat(r4, &(0x7f0000fed000/0x1000)=nil, 0x6000) openat2(r2, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)={0x40200, 0x1e1, 0x1b}, 0x18) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) 12:24:56 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffef46}}, './file0\x00'}) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x882d00, 0x0) mount_setattr(r1, &(0x7f0000000040)='./file0\x00', 0x1800, &(0x7f0000000100)={0x200072, 0x4, 0xe0000, {r2}}, 0x20) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) open(0x0, 0x0, 0x48) r3 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(r3, 0x0, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) 12:24:56 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000005c0)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x6e6bb5}}, 0xb8}}, 0x0) 12:24:56 executing program 2: shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r0 = shmget(0x3, 0xa000, 0x20, &(0x7f0000ff6000/0xa000)=nil) shmget(0x0, 0x1000, 0x20, &(0x7f0000ffb000/0x1000)=nil) shmat(0x0, &(0x7f0000fe9000/0x3000)=nil, 0x2000) shmat(0x0, &(0x7f0000fe6000/0xe000)=nil, 0x9000) shmctl$IPC_RMID(0x0, 0x0) shmctl$IPC_RMID(0x0, 0x0) shmat(0x0, &(0x7f0000feb000/0x3000)=nil, 0x0) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x2000) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) mmap$perf(&(0x7f0000fed000/0x3000)=nil, 0x3000, 0x0, 0x13, r1, 0x4) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x80200, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x149, 0x7}, 0x10601, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = shmget(0x2, 0x2000, 0x2, &(0x7f0000ffc000/0x2000)=nil) shmat(r4, &(0x7f0000fed000/0x1000)=nil, 0x6000) openat2(r2, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)={0x40200, 0x1e1, 0x1b}, 0x18) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) 12:24:56 executing program 5: capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000580)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file1\x00', &(0x7f0000000180), 0x0, 0x0, 0x0) 12:24:56 executing program 7: shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r0 = shmget(0x3, 0xa000, 0x20, &(0x7f0000ff6000/0xa000)=nil) shmget(0x0, 0x1000, 0x20, &(0x7f0000ffb000/0x1000)=nil) shmat(0x0, &(0x7f0000fe9000/0x3000)=nil, 0x2000) shmat(0x0, &(0x7f0000fe6000/0xe000)=nil, 0x9000) shmctl$IPC_RMID(0x0, 0x0) shmctl$IPC_RMID(0x0, 0x0) shmat(0x0, &(0x7f0000feb000/0x3000)=nil, 0x0) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x2000) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) mmap$perf(&(0x7f0000fed000/0x3000)=nil, 0x3000, 0x0, 0x13, r1, 0x4) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x80200, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x149, 0x7}, 0x10601, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = shmget(0x2, 0x2000, 0x2, &(0x7f0000ffc000/0x2000)=nil) shmat(r4, &(0x7f0000fed000/0x1000)=nil, 0x6000) openat2(r2, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)={0x40200, 0x1e1, 0x1b}, 0x18) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) [ 181.724472] audit: type=1401 audit(1667219096.305:10): op=setxattr invalid_context="" [ 181.753114] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 181.768722] ieee80211 phy22: Selected rate control algorithm 'minstrel_ht' 12:24:56 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)=ANY=[@ANYBLOB="1c0000001d000100000000000000000004"], 0x1c}], 0x1}, 0x0) 12:24:56 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) getegid() 12:24:56 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000005c0)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x6e6bb5}}, 0xb8}}, 0x0) 12:24:56 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x3f, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000000000)=0x7, 0x4) 12:24:56 executing program 5: capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000580)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file1\x00', &(0x7f0000000180), 0x0, 0x0, 0x0) [ 181.831375] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 181.834721] ieee80211 phy23: Selected rate control algorithm 'minstrel_ht' [ 181.885782] audit: type=1401 audit(1667219096.463:11): op=setxattr invalid_context="" 12:24:56 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000005c0)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x6e6bb5}}, 0xb8}}, 0x0) [ 181.927165] BUG: unable to handle page fault for address: ffffed100fffc000 [ 181.927656] #PF: supervisor write access in kernel mode [ 181.928006] #PF: error_code(0x0002) - not-present page [ 181.928348] PGD 7ffd3067 P4D 7ffd3067 PUD 7ffd2067 PMD 7ffd1067 PTE 0 [ 181.928800] Oops: 0002 [#8] PREEMPT SMP KASAN NOPTI [ 181.929137] CPU: 1 PID: 6271 Comm: syz-executor.0 Tainted: G D 6.1.0-rc3-next-20221031 #1 [ 181.929738] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 181.930262] RIP: 0010:__memset+0x24/0x50 [ 181.930543] Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 4d d4 12 00 66 66 2e 0f 1f 84 00 [ 181.931660] RSP: 0018:ffff8880421afcc0 EFLAGS: 00010212 [ 181.931996] RAX: 0000000000000000 RBX: ffff88800c0cbb40 RCX: 1ffffe21fe607655 [ 181.932438] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 [ 181.932879] RBP: ffff88800c0eda00 R08: 0000000000000005 R09: ffffed1001819768 [ 181.933321] R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c0eda00 [ 181.933769] R13: ffff88800c0cbb40 R14: ffffffff815f27a0 R15: 1ffff11001125e1f [ 181.934214] FS: 00007f3c02811700(0000) GS:ffff88806d100000(0000) knlGS:0000000000000000 [ 181.934712] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 181.935076] CR2: ffffed100fffc000 CR3: 000000003ec0c000 CR4: 0000000000350ee0 [ 181.935521] Call Trace: [ 181.935691] [ 181.935840] kasan_unpoison+0x23/0x60 [ 181.936098] mempool_exit+0x1c2/0x330 [ 181.936362] bioset_exit+0x2c9/0x630 [ 181.936621] disk_release+0x143/0x490 [ 181.936888] ? disk_release+0x0/0x490 [ 181.937147] ? device_release+0x0/0x250 [ 181.937416] device_release+0xa2/0x250 [ 181.937678] ? device_release+0x0/0x250 [ 181.937959] kobject_put+0x173/0x280 [ 181.938212] put_device+0x1b/0x40 [ 181.938457] put_disk+0x41/0x60 [ 181.938689] loop_control_ioctl+0x4d1/0x630 [ 181.938990] ? loop_control_ioctl+0x0/0x630 [ 181.939279] ? selinux_file_ioctl+0xb1/0x270 [ 181.939592] ? loop_control_ioctl+0x0/0x630 [ 181.939894] __x64_sys_ioctl+0x19a/0x220 [ 181.940183] do_syscall_64+0x3b/0xa0 [ 181.940450] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 181.940797] RIP: 0033:0x7f3c0529bb19 [ 181.941049] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 181.942353] RSP: 002b:00007f3c02811188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 181.942918] RAX: ffffffffffffffda RBX: 00007f3c053aef60 RCX: 00007f3c0529bb19 [ 181.943371] RDX: 0000000000000007 RSI: 0000000000004c81 RDI: 0000000000000006 [ 181.943821] RBP: 00007f3c052f5f6d R08: 0000000000000000 R09: 0000000000000000 [ 181.944271] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 181.944719] R13: 00007ffddc574dcf R14: 00007f3c02811300 R15: 0000000000022000 [ 181.945173] [ 181.945327] Modules linked in: [ 181.945539] CR2: ffffed100fffc000 [ 181.945778] ---[ end trace 0000000000000000 ]--- [ 181.946075] RIP: 0010:__memset+0x24/0x50 [ 181.946352] Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 4d d4 12 00 66 66 2e 0f 1f 84 00 [ 181.947477] RSP: 0018:ffff88804179fcc0 EFLAGS: 00010212 [ 181.947814] RAX: 0000000000000000 RBX: ffff88800c0cb0c0 RCX: 1ffffe21fe60762b [ 181.948263] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 [ 181.948709] RBP: ffff88800c0eda00 R08: 0000000000000005 R09: ffffed1001819618 [ 181.949155] R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c0eda00 [ 181.949611] R13: ffff88800c0cb0c0 R14: ffffffff815f27a0 R15: 1ffff11001122a1f [ 181.950066] FS: 00007f3c02811700(0000) GS:ffff88806d100000(0000) knlGS:0000000000000000 [ 181.950568] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 181.950936] CR2: ffffed100fffc000 CR3: 000000003ec0c000 CR4: 0000000000350ee0 12:24:56 executing program 5: capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000580)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file1\x00', &(0x7f0000000180), 0x0, 0x0, 0x0) 12:24:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1b, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001000028020000028401001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35333334383534323200"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000dced220ba9804d58a8dffc387fa17f8a010000000c00000000000000d7f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000002500000000000000", 0x40, 0x540}, {&(0x7f0000010300)="0000000000000000000000000000000000000000010400"/32, 0x20, 0x640}, {&(0x7f0000010400)="030000000400000005000000dc000f000300040000000000000000000f004582", 0x20, 0x800}, {&(0x7f0000010500)="ffffffff07000000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d7f4655fd7f4655fd7f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd8f4655fd8f4655f00000000000004000200000000000000050000000d00"/64, 0x40, 0x1500}, {&(0x7f0000010f00)="20000000181166091811660900000000d7f4655f00"/32, 0x20, 0x1580}, {&(0x7f0000011000)="c0410000002c0000d7f4655fd7f4655fd7f4655f00000000000002001600000000000000000000000e0000000f000000100000001100000012000000130000001400000015000000160000001700000018000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000d7f4655f000000000000000000000000000002ea00"/192, 0xc0, 0x1e00}, {&(0x7f0000011100)="ed4100003c000000d8f4655fd8f4655fd8f4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c65310000000000000000000000000000000000000000000000000000007782994400000000000000000000000000000000000000000000000020000000181166091811660918116609d8f4655f181166090000000000000000000002ea04070000000000000000000000000000646174610000000000000000", 0xc0, 0x1f00}, {&(0x7f0000011200)="ed8100001a040000d8f4655fd8f4655fd8f4655f0000000000000100040000000000000001000000190000001a00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000567a372d00000000000000000000000000000000000000000000000020000000181166091811660918116609d8f4655f181166090000000000000000", 0xa0, 0x2000}, {&(0x7f0000011300)="ffa1000026000000d8f4655fd8f4655fd8f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3533333438353432322f66696c65302f66696c653000000000000000000000000000000000000000000000ae16d32f00000000000000000000000000000000000000000000000020000000181166091811660918116609d8f4655f181166090000000000000000", 0xa0, 0x2100}, {&(0x7f0000011400)="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", 0x1a0, 0x2200}, {&(0x7f0000011600)="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", 0x100, 0x2400}, {&(0x7f0000011700)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009403090166696c652e636f6c64000000", 0x80, 0x3400}, {&(0x7f0000011800)="0b0000000c0001022e000000020000000c0002022e2e000000000000e8030000", 0x20, 0x3800}, {&(0x7f0000011900)="00000000000400"/32, 0x20, 0x3c00}, {&(0x7f0000011a00)="00000000000400"/32, 0x20, 0x4000}, {&(0x7f0000011b00)="00000000000400"/32, 0x20, 0x4400}, {&(0x7f0000011c00)="00000000000400"/32, 0x20, 0x4800}, {&(0x7f0000011d00)="00000000000400"/32, 0x20, 0x4c00}, {&(0x7f0000011e00)="00000000000400"/32, 0x20, 0x5000}, {&(0x7f0000011f00)="00000000000400"/32, 0x20, 0x5400}, {&(0x7f0000012000)="00000000000400"/32, 0x20, 0x5800}, {&(0x7f0000012100)="00000000000400"/32, 0x20, 0x5c00}, {&(0x7f0000012200)="00000000000400"/32, 0x20, 0x6000}, {&(0x7f0000012300)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x6400}], 0x0, &(0x7f0000012800)) 12:24:56 executing program 4: syz_io_uring_setup(0x2a79, &(0x7f00000001c0), &(0x7f0000800000/0x800000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000440), 0x0) clock_gettime(0x0, &(0x7f00000012c0)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x41) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) syz_io_uring_setup(0x1d1b, &(0x7f0000000240)={0x0, 0x1d84}, &(0x7f000080c000/0x3000)=nil, &(0x7f0000bb2000/0x2000)=nil, 0x0, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @control}], 0xfffffdcd) [ 182.032037] audit: type=1401 audit(1667219096.613:12): op=setxattr invalid_context="" 12:24:56 executing program 6: mlock2(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x0) syz_io_uring_setup(0x42da, &(0x7f0000000100)={0x0, 0x0, 0x900}, &(0x7f0000680000/0x2000)=nil, &(0x7f0000c00000/0x400000)=nil, &(0x7f0000000180), &(0x7f00000002c0)) 12:24:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_int(r0, 0x1, 0x4a, 0x0, &(0x7f00000001c0)) 12:24:57 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$getflags(r0, 0x1) 12:24:57 executing program 4: r0 = gettid() setpgid(0x0, r0) 12:24:57 executing program 7: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0x80045301, &(0x7f0000000040)={0x0, 0x0, 'client1\x00', 0x0, "e8f818943464ed72", "f31f6fb242fee8b875ff35ed52674a22ac292cab500ecdd95e136b538f914139"}) 12:24:57 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() rt_sigqueueinfo(0x0, 0x11, &(0x7f0000000000)={0x0, 0x0, 0xfffffffe}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) 12:24:57 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}, {@dfltgid}]}}) 12:24:57 executing program 6: mlock2(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x0) syz_io_uring_setup(0x42da, &(0x7f0000000100)={0x0, 0x0, 0x900}, &(0x7f0000680000/0x2000)=nil, &(0x7f0000c00000/0x400000)=nil, &(0x7f0000000180), &(0x7f00000002c0)) 12:24:57 executing program 0: set_mempolicy(0x4, &(0x7f0000000380)=0x100000001, 0x8) 12:24:57 executing program 3: r0 = socket$inet(0x2, 0xa, 0x0) getsockopt$inet_buf(r0, 0x0, 0x0, 0x0, 0x0) 12:24:57 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) 12:24:57 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_RESIZEX(r0, 0x5423, &(0x7f0000000100)={0x0, 0xb}) 12:24:57 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) fcntl$lock(r0, 0x26, &(0x7f0000000040)) fcntl$lock(r0, 0x7, &(0x7f0000000040)) [ 182.768147] syz-executor.3 uses obsolete (PF_INET,SOCK_PACKET) 12:24:57 executing program 2: add_key$fscrypt_v1(&(0x7f0000000bc0), 0x0, &(0x7f0000000c40)={0x0, "e6c678246229fd92fad2284b2facbfb17065a1e57559aae48e03f644371e89f0c5e481c85c34d0c1b2b84823044695ca8d45e8588fd4d2be67937ee51a26b451"}, 0x48, 0xfffffffffffffffb) 12:24:57 executing program 0: mlock2(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') r1 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x96, 0x6, 0xff, 0x1, 0x0, 0xe14, 0xc1484, 0x3c8f1f3173da70d, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_config_ext={0xffffffff7fffffff, 0x21a}, 0x44080, 0x7, 0x200, 0x1, 0x6, 0xe7, 0x34, 0x0, 0x7fffffff, 0x0, 0x8000}, r1, 0x7, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat2(r0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) r2 = shmget(0x2, 0x1000, 0x873c6edcc2f4f695, &(0x7f0000ffb000/0x1000)=nil) shmat(r2, &(0x7f0000ffc000/0x3000)=nil, 0x0) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000480)=""/4096) shmat(r2, &(0x7f0000ffc000/0x4000)=nil, 0x4000) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r3) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) readahead(0xffffffffffffffff, 0x0, 0x9) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x5, 0xffffffb4, 0x5) ioctl$SNAPSHOT_FREE(r4, 0x3305) 12:24:57 executing program 2: r0 = epoll_create(0x4) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000200), 0x8, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)={0x20000000}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000240)={0xa0002000}) [ 183.134734] audit: type=1400 audit(1667219097.565:13): avc: denied { block_suspend } for pid=6339 comm="syz-executor.2" capability=36 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 [ 183.317312] random: crng reseeded on system resumption [ 183.330913] Restarting kernel threads ... done. 12:24:58 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x2000, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x4, 0xfe, 0x40, 0x5, 0x32, @ipv4={'\x00', '\xff\xff', @local}, @initdev={0xfe, 0x88, '\x00', 0x2, 0x0}, 0x7, 0x7800, 0x10001, 0x1}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @private, @local}, &(0x7f00000003c0)=0xc) socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) socket$nl_audit(0x10, 0x3, 0x9) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x1b, &(0x7f0000000000)={@dev={0xfe, 0x80, '\x00', 0xfd}}, 0x14) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x6, 0x5, 0x1, 0x3f, 0x0, 0x3ff, 0x50000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3b, 0x1, @perf_config_ext={0x1, 0x7fff}, 0xa8, 0x1, 0x20, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x4, 0x0, 0xdeb}, 0x0, 0x3, 0xffffffffffffffff, 0x3) 12:24:58 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/locks\x00', 0x0, 0x0) close(r0) 12:24:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000040)="7265707fb4afaf8657dcbcbd1c6de08d", 0x10) close_range(r0, 0xffffffffffffffff, 0x0) 12:24:58 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000140)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x48, r1, 0x103, 0x0, 0x0, {{0x8}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_FRAME={0x18, 0x33, @ctrl_frame=@bar={{}, {}, @device_b}}, @NL80211_ATTR_CONTROL_PORT_ETHERTYPE={0x6}, @NL80211_ATTR_MAC={0xa}]}, 0x48}}, 0x0) 12:24:58 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}, {@dfltgid}]}}) 12:24:58 executing program 6: mlock2(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x0) syz_io_uring_setup(0x42da, &(0x7f0000000100)={0x0, 0x0, 0x900}, &(0x7f0000680000/0x2000)=nil, &(0x7f0000c00000/0x400000)=nil, &(0x7f0000000180), &(0x7f00000002c0)) 12:24:58 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000140)={@local, @dev, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "b0e0ee", 0x3, 0x2c, 0x0, @private0, @mcast2, {[@routing]}}}}}, 0x0) [ 183.670680] random: crng reseeded on system resumption [ 183.674777] Restarting kernel threads ... done. 12:24:58 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) 12:24:58 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x2000, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x4, 0xfe, 0x40, 0x5, 0x32, @ipv4={'\x00', '\xff\xff', @local}, @initdev={0xfe, 0x88, '\x00', 0x2, 0x0}, 0x7, 0x7800, 0x10001, 0x1}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @private, @local}, &(0x7f00000003c0)=0xc) socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) socket$nl_audit(0x10, 0x3, 0x9) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x1b, &(0x7f0000000000)={@dev={0xfe, 0x80, '\x00', 0xfd}}, 0x14) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x6, 0x5, 0x1, 0x3f, 0x0, 0x3ff, 0x50000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3b, 0x1, @perf_config_ext={0x1, 0x7fff}, 0xa8, 0x1, 0x20, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x4, 0x0, 0xdeb}, 0x0, 0x3, 0xffffffffffffffff, 0x3) 12:24:58 executing program 0: mlock2(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') r1 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x96, 0x6, 0xff, 0x1, 0x0, 0xe14, 0xc1484, 0x3c8f1f3173da70d, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_config_ext={0xffffffff7fffffff, 0x21a}, 0x44080, 0x7, 0x200, 0x1, 0x6, 0xe7, 0x34, 0x0, 0x7fffffff, 0x0, 0x8000}, r1, 0x7, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat2(r0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) r2 = shmget(0x2, 0x1000, 0x873c6edcc2f4f695, &(0x7f0000ffb000/0x1000)=nil) shmat(r2, &(0x7f0000ffc000/0x3000)=nil, 0x0) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000480)=""/4096) shmat(r2, &(0x7f0000ffc000/0x4000)=nil, 0x4000) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r3) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) readahead(0xffffffffffffffff, 0x0, 0x9) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x5, 0xffffffb4, 0x5) ioctl$SNAPSHOT_FREE(r4, 0x3305) 12:24:58 executing program 6: mlock2(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x0) syz_io_uring_setup(0x42da, &(0x7f0000000100)={0x0, 0x0, 0x900}, &(0x7f0000680000/0x2000)=nil, &(0x7f0000c00000/0x400000)=nil, &(0x7f0000000180), &(0x7f00000002c0)) 12:24:58 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x2000, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x4, 0xfe, 0x40, 0x5, 0x32, @ipv4={'\x00', '\xff\xff', @local}, @initdev={0xfe, 0x88, '\x00', 0x2, 0x0}, 0x7, 0x7800, 0x10001, 0x1}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @private, @local}, &(0x7f00000003c0)=0xc) socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) socket$nl_audit(0x10, 0x3, 0x9) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x1b, &(0x7f0000000000)={@dev={0xfe, 0x80, '\x00', 0xfd}}, 0x14) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x6, 0x5, 0x1, 0x3f, 0x0, 0x3ff, 0x50000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3b, 0x1, @perf_config_ext={0x1, 0x7fff}, 0xa8, 0x1, 0x20, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x4, 0x0, 0xdeb}, 0x0, 0x3, 0xffffffffffffffff, 0x3) 12:24:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000040)="7265707fb4afaf8657dcbcbd1c6de08d", 0x10) close_range(r0, 0xffffffffffffffff, 0x0) 12:24:58 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}, {@dfltgid}]}}) 12:24:58 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000140)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x48, r1, 0x103, 0x0, 0x0, {{0x8}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_FRAME={0x18, 0x33, @ctrl_frame=@bar={{}, {}, @device_b}}, @NL80211_ATTR_CONTROL_PORT_ETHERTYPE={0x6}, @NL80211_ATTR_MAC={0xa}]}, 0x48}}, 0x0) 12:24:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000040)="7265707fb4afaf8657dcbcbd1c6de08d", 0x10) close_range(r0, 0xffffffffffffffff, 0x0) 12:24:58 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x2000, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x4, 0xfe, 0x40, 0x5, 0x32, @ipv4={'\x00', '\xff\xff', @local}, @initdev={0xfe, 0x88, '\x00', 0x2, 0x0}, 0x7, 0x7800, 0x10001, 0x1}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @private, @local}, &(0x7f00000003c0)=0xc) socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) socket$nl_audit(0x10, 0x3, 0x9) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x1b, &(0x7f0000000000)={@dev={0xfe, 0x80, '\x00', 0xfd}}, 0x14) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x6, 0x5, 0x1, 0x3f, 0x0, 0x3ff, 0x50000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3b, 0x1, @perf_config_ext={0x1, 0x7fff}, 0xa8, 0x1, 0x20, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x4, 0x0, 0xdeb}, 0x0, 0x3, 0xffffffffffffffff, 0x3) 12:24:58 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) [ 183.865021] random: crng reseeded on system resumption [ 183.898783] Restarting kernel threads ... done. 12:24:58 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}, {@dfltgid}]}}) 12:24:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000040)="7265707fb4afaf8657dcbcbd1c6de08d", 0x10) close_range(r0, 0xffffffffffffffff, 0x0) 12:24:58 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x2000, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x4, 0xfe, 0x40, 0x5, 0x32, @ipv4={'\x00', '\xff\xff', @local}, @initdev={0xfe, 0x88, '\x00', 0x2, 0x0}, 0x7, 0x7800, 0x10001, 0x1}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @private, @local}, &(0x7f00000003c0)=0xc) socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) socket$nl_audit(0x10, 0x3, 0x9) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x1b, &(0x7f0000000000)={@dev={0xfe, 0x80, '\x00', 0xfd}}, 0x14) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x6, 0x5, 0x1, 0x3f, 0x0, 0x3ff, 0x50000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3b, 0x1, @perf_config_ext={0x1, 0x7fff}, 0xa8, 0x1, 0x20, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x4, 0x0, 0xdeb}, 0x0, 0x3, 0xffffffffffffffff, 0x3) 12:24:58 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x2000, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x4, 0xfe, 0x40, 0x5, 0x32, @ipv4={'\x00', '\xff\xff', @local}, @initdev={0xfe, 0x88, '\x00', 0x2, 0x0}, 0x7, 0x7800, 0x10001, 0x1}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @private, @local}, &(0x7f00000003c0)=0xc) socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) socket$nl_audit(0x10, 0x3, 0x9) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x1b, &(0x7f0000000000)={@dev={0xfe, 0x80, '\x00', 0xfd}}, 0x14) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x6, 0x5, 0x1, 0x3f, 0x0, 0x3ff, 0x50000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3b, 0x1, @perf_config_ext={0x1, 0x7fff}, 0xa8, 0x1, 0x20, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x4, 0x0, 0xdeb}, 0x0, 0x3, 0xffffffffffffffff, 0x3) 12:24:58 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000140)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x48, r1, 0x103, 0x0, 0x0, {{0x8}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_FRAME={0x18, 0x33, @ctrl_frame=@bar={{}, {}, @device_b}}, @NL80211_ATTR_CONTROL_PORT_ETHERTYPE={0x6}, @NL80211_ATTR_MAC={0xa}]}, 0x48}}, 0x0) 12:24:58 executing program 0: mlock2(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') r1 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x96, 0x6, 0xff, 0x1, 0x0, 0xe14, 0xc1484, 0x3c8f1f3173da70d, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_config_ext={0xffffffff7fffffff, 0x21a}, 0x44080, 0x7, 0x200, 0x1, 0x6, 0xe7, 0x34, 0x0, 0x7fffffff, 0x0, 0x8000}, r1, 0x7, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat2(r0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) r2 = shmget(0x2, 0x1000, 0x873c6edcc2f4f695, &(0x7f0000ffb000/0x1000)=nil) shmat(r2, &(0x7f0000ffc000/0x3000)=nil, 0x0) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000480)=""/4096) shmat(r2, &(0x7f0000ffc000/0x4000)=nil, 0x4000) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r3) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) readahead(0xffffffffffffffff, 0x0, 0x9) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x5, 0xffffffb4, 0x5) ioctl$SNAPSHOT_FREE(r4, 0x3305) 12:24:58 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) [ 184.014513] random: crng reseeded on system resumption [ 184.031018] Restarting kernel threads ... done. 12:24:58 executing program 0: mlock2(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') r1 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x96, 0x6, 0xff, 0x1, 0x0, 0xe14, 0xc1484, 0x3c8f1f3173da70d, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_config_ext={0xffffffff7fffffff, 0x21a}, 0x44080, 0x7, 0x200, 0x1, 0x6, 0xe7, 0x34, 0x0, 0x7fffffff, 0x0, 0x8000}, r1, 0x7, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat2(r0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) r2 = shmget(0x2, 0x1000, 0x873c6edcc2f4f695, &(0x7f0000ffb000/0x1000)=nil) shmat(r2, &(0x7f0000ffc000/0x3000)=nil, 0x0) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000480)=""/4096) shmat(r2, &(0x7f0000ffc000/0x4000)=nil, 0x4000) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r3) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) readahead(0xffffffffffffffff, 0x0, 0x9) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x5, 0xffffffb4, 0x5) ioctl$SNAPSHOT_FREE(r4, 0x3305) 12:24:58 executing program 6: mlock2(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') r1 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x96, 0x6, 0xff, 0x1, 0x0, 0xe14, 0xc1484, 0x3c8f1f3173da70d, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_config_ext={0xffffffff7fffffff, 0x21a}, 0x44080, 0x7, 0x200, 0x1, 0x6, 0xe7, 0x34, 0x0, 0x7fffffff, 0x0, 0x8000}, r1, 0x7, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat2(r0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) r2 = shmget(0x2, 0x1000, 0x873c6edcc2f4f695, &(0x7f0000ffb000/0x1000)=nil) shmat(r2, &(0x7f0000ffc000/0x3000)=nil, 0x0) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000480)=""/4096) shmat(r2, &(0x7f0000ffc000/0x4000)=nil, 0x4000) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r3) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) readahead(0xffffffffffffffff, 0x0, 0x9) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x5, 0xffffffb4, 0x5) ioctl$SNAPSHOT_FREE(r4, 0x3305) 12:24:58 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x2000, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x4, 0xfe, 0x40, 0x5, 0x32, @ipv4={'\x00', '\xff\xff', @local}, @initdev={0xfe, 0x88, '\x00', 0x2, 0x0}, 0x7, 0x7800, 0x10001, 0x1}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @private, @local}, &(0x7f00000003c0)=0xc) socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) socket$nl_audit(0x10, 0x3, 0x9) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x1b, &(0x7f0000000000)={@dev={0xfe, 0x80, '\x00', 0xfd}}, 0x14) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x6, 0x5, 0x1, 0x3f, 0x0, 0x3ff, 0x50000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3b, 0x1, @perf_config_ext={0x1, 0x7fff}, 0xa8, 0x1, 0x20, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x4, 0x0, 0xdeb}, 0x0, 0x3, 0xffffffffffffffff, 0x3) 12:24:58 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x2000, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x4, 0xfe, 0x40, 0x5, 0x32, @ipv4={'\x00', '\xff\xff', @local}, @initdev={0xfe, 0x88, '\x00', 0x2, 0x0}, 0x7, 0x7800, 0x10001, 0x1}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @private, @local}, &(0x7f00000003c0)=0xc) socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) socket$nl_audit(0x10, 0x3, 0x9) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x1b, &(0x7f0000000000)={@dev={0xfe, 0x80, '\x00', 0xfd}}, 0x14) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x6, 0x5, 0x1, 0x3f, 0x0, 0x3ff, 0x50000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3b, 0x1, @perf_config_ext={0x1, 0x7fff}, 0xa8, 0x1, 0x20, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x4, 0x0, 0xdeb}, 0x0, 0x3, 0xffffffffffffffff, 0x3) [ 184.126391] random: crng reseeded on system resumption [ 184.162827] Restarting kernel threads ... done. 12:24:58 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x2000, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x4, 0xfe, 0x40, 0x5, 0x32, @ipv4={'\x00', '\xff\xff', @local}, @initdev={0xfe, 0x88, '\x00', 0x2, 0x0}, 0x7, 0x7800, 0x10001, 0x1}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @private, @local}, &(0x7f00000003c0)=0xc) socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) socket$nl_audit(0x10, 0x3, 0x9) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x1b, &(0x7f0000000000)={@dev={0xfe, 0x80, '\x00', 0xfd}}, 0x14) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x6, 0x5, 0x1, 0x3f, 0x0, 0x3ff, 0x50000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3b, 0x1, @perf_config_ext={0x1, 0x7fff}, 0xa8, 0x1, 0x20, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x4, 0x0, 0xdeb}, 0x0, 0x3, 0xffffffffffffffff, 0x3) 12:24:58 executing program 6: mlock2(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') r1 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x96, 0x6, 0xff, 0x1, 0x0, 0xe14, 0xc1484, 0x3c8f1f3173da70d, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_config_ext={0xffffffff7fffffff, 0x21a}, 0x44080, 0x7, 0x200, 0x1, 0x6, 0xe7, 0x34, 0x0, 0x7fffffff, 0x0, 0x8000}, r1, 0x7, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat2(r0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) r2 = shmget(0x2, 0x1000, 0x873c6edcc2f4f695, &(0x7f0000ffb000/0x1000)=nil) shmat(r2, &(0x7f0000ffc000/0x3000)=nil, 0x0) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000480)=""/4096) shmat(r2, &(0x7f0000ffc000/0x4000)=nil, 0x4000) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r3) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) readahead(0xffffffffffffffff, 0x0, 0x9) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x5, 0xffffffb4, 0x5) ioctl$SNAPSHOT_FREE(r4, 0x3305) 12:24:58 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000140)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x48, r1, 0x103, 0x0, 0x0, {{0x8}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_FRAME={0x18, 0x33, @ctrl_frame=@bar={{}, {}, @device_b}}, @NL80211_ATTR_CONTROL_PORT_ETHERTYPE={0x6}, @NL80211_ATTR_MAC={0xa}]}, 0x48}}, 0x0) 12:24:58 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x2000, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x4, 0xfe, 0x40, 0x5, 0x32, @ipv4={'\x00', '\xff\xff', @local}, @initdev={0xfe, 0x88, '\x00', 0x2, 0x0}, 0x7, 0x7800, 0x10001, 0x1}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @private, @local}, &(0x7f00000003c0)=0xc) socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) socket$nl_audit(0x10, 0x3, 0x9) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x1b, &(0x7f0000000000)={@dev={0xfe, 0x80, '\x00', 0xfd}}, 0x14) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x6, 0x5, 0x1, 0x3f, 0x0, 0x3ff, 0x50000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3b, 0x1, @perf_config_ext={0x1, 0x7fff}, 0xa8, 0x1, 0x20, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x4, 0x0, 0xdeb}, 0x0, 0x3, 0xffffffffffffffff, 0x3) 12:24:58 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x2000, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x4, 0xfe, 0x40, 0x5, 0x32, @ipv4={'\x00', '\xff\xff', @local}, @initdev={0xfe, 0x88, '\x00', 0x2, 0x0}, 0x7, 0x7800, 0x10001, 0x1}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @private, @local}, &(0x7f00000003c0)=0xc) socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) socket$nl_audit(0x10, 0x3, 0x9) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x1b, &(0x7f0000000000)={@dev={0xfe, 0x80, '\x00', 0xfd}}, 0x14) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x6, 0x5, 0x1, 0x3f, 0x0, 0x3ff, 0x50000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3b, 0x1, @perf_config_ext={0x1, 0x7fff}, 0xa8, 0x1, 0x20, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x4, 0x0, 0xdeb}, 0x0, 0x3, 0xffffffffffffffff, 0x3) 12:24:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x2000, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x4, 0xfe, 0x40, 0x5, 0x32, @ipv4={'\x00', '\xff\xff', @local}, @initdev={0xfe, 0x88, '\x00', 0x2, 0x0}, 0x7, 0x7800, 0x10001, 0x1}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @private, @local}, &(0x7f00000003c0)=0xc) socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) socket$nl_audit(0x10, 0x3, 0x9) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x1b, &(0x7f0000000000)={@dev={0xfe, 0x80, '\x00', 0xfd}}, 0x14) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x6, 0x5, 0x1, 0x3f, 0x0, 0x3ff, 0x50000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3b, 0x1, @perf_config_ext={0x1, 0x7fff}, 0xa8, 0x1, 0x20, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x4, 0x0, 0xdeb}, 0x0, 0x3, 0xffffffffffffffff, 0x3) 12:24:58 executing program 7: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000240)={0x14}, 0x14}}, 0x0) 12:24:58 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x14}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, 0x2, 0x2, 0x401, 0x0, 0x0, {}, [@CTA_EXPECT_HELP_NAME={0x5, 0x6, '\x00'}]}, 0x1c}}, 0x0) 12:24:58 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') open(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_setup(0x454c, &(0x7f0000000240)) setxattr$security_capability(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340), &(0x7f0000000500)=@v3={0x3000000, [{0x0, 0x72}, {0xffffffff, 0x2}]}, 0x18, 0x2) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xa, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) sendfile(r1, r0, 0x0, 0xfffffdef) 12:24:58 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() pidfd_open(r1, 0x0) syz_open_procfs(r1, &(0x7f00000000c0)='fd/4\x00') perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x3f, 0x5a, 0xea, 0x7f, 0x0, 0xfffffffffffeffff, 0x800, 0x11, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5c7, 0x2, @perf_bp={&(0x7f0000000240), 0x4}, 0x4401, 0x3ff, 0x1, 0x0, 0x3, 0x0, 0x905, 0x0, 0x4, 0x0, 0x4}, r1, 0xd, r0, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000080), 0x6) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(0xffffffffffffffff, &(0x7f00000000c0)=""/98, 0x62, 0x7fff) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x3, 0x0, 0x1, 0x40, 0x0, 0x6b, 0x68104, 0x7, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x9, 0x8}, 0x2000, 0x94c9, 0x1f, 0x0, 0x2, 0x9, 0x6, 0x0, 0xa5a2, 0x0, 0x3}, 0x0, 0x2, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x7fff) write$bt_hci(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="210600000005020000fdffff0000c2933d24c94cc58c27a899a50ff3e3a0cfda8c77358361059faf9ca735702669d87b236c8204ed6dd40e144998620000ed1d691bf1a2dd6998a1"], 0x13) fcntl$getownex(r2, 0x10, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff, 0x4a}) r3 = accept$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @private}}, &(0x7f0000000040)=0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) pwritev2(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x8, 0x5, 0x11) 12:24:58 executing program 7: rt_sigtimedwait(&(0x7f0000000180), 0x0, &(0x7f00000001c0)={0x0, 0x989680}, 0x8) [ 184.301734] random: crng reseeded on system resumption 12:24:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x2000, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x4, 0xfe, 0x40, 0x5, 0x32, @ipv4={'\x00', '\xff\xff', @local}, @initdev={0xfe, 0x88, '\x00', 0x2, 0x0}, 0x7, 0x7800, 0x10001, 0x1}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @private, @local}, &(0x7f00000003c0)=0xc) socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) socket$nl_audit(0x10, 0x3, 0x9) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x1b, &(0x7f0000000000)={@dev={0xfe, 0x80, '\x00', 0xfd}}, 0x14) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x6, 0x5, 0x1, 0x3f, 0x0, 0x3ff, 0x50000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3b, 0x1, @perf_config_ext={0x1, 0x7fff}, 0xa8, 0x1, 0x20, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x4, 0x0, 0xdeb}, 0x0, 0x3, 0xffffffffffffffff, 0x3) 12:24:58 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x2000, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x4, 0xfe, 0x40, 0x5, 0x32, @ipv4={'\x00', '\xff\xff', @local}, @initdev={0xfe, 0x88, '\x00', 0x2, 0x0}, 0x7, 0x7800, 0x10001, 0x1}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @private, @local}, &(0x7f00000003c0)=0xc) socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) socket$nl_audit(0x10, 0x3, 0x9) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x1b, &(0x7f0000000000)={@dev={0xfe, 0x80, '\x00', 0xfd}}, 0x14) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x6, 0x5, 0x1, 0x3f, 0x0, 0x3ff, 0x50000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3b, 0x1, @perf_config_ext={0x1, 0x7fff}, 0xa8, 0x1, 0x20, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x4, 0x0, 0xdeb}, 0x0, 0x3, 0xffffffffffffffff, 0x3) [ 184.343642] Restarting kernel threads ... done. 12:24:58 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x2000, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x4, 0xfe, 0x40, 0x5, 0x32, @ipv4={'\x00', '\xff\xff', @local}, @initdev={0xfe, 0x88, '\x00', 0x2, 0x0}, 0x7, 0x7800, 0x10001, 0x1}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @private, @local}, &(0x7f00000003c0)=0xc) socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) socket$nl_audit(0x10, 0x3, 0x9) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x1b, &(0x7f0000000000)={@dev={0xfe, 0x80, '\x00', 0xfd}}, 0x14) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x6, 0x5, 0x1, 0x3f, 0x0, 0x3ff, 0x50000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3b, 0x1, @perf_config_ext={0x1, 0x7fff}, 0xa8, 0x1, 0x20, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x4, 0x0, 0xdeb}, 0x0, 0x3, 0xffffffffffffffff, 0x3) 12:24:58 executing program 7: syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) 12:24:58 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='attr/fscreate\x00') pread64(r0, 0x0, 0x0, 0x0) 12:24:58 executing program 6: mlock2(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') r1 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x96, 0x6, 0xff, 0x1, 0x0, 0xe14, 0xc1484, 0x3c8f1f3173da70d, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_config_ext={0xffffffff7fffffff, 0x21a}, 0x44080, 0x7, 0x200, 0x1, 0x6, 0xe7, 0x34, 0x0, 0x7fffffff, 0x0, 0x8000}, r1, 0x7, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat2(r0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) r2 = shmget(0x2, 0x1000, 0x873c6edcc2f4f695, &(0x7f0000ffb000/0x1000)=nil) shmat(r2, &(0x7f0000ffc000/0x3000)=nil, 0x0) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000480)=""/4096) shmat(r2, &(0x7f0000ffc000/0x4000)=nil, 0x4000) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r3) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) readahead(0xffffffffffffffff, 0x0, 0x9) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x5, 0xffffffb4, 0x5) ioctl$SNAPSHOT_FREE(r4, 0x3305) 12:24:59 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x2000, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x4, 0xfe, 0x40, 0x5, 0x32, @ipv4={'\x00', '\xff\xff', @local}, @initdev={0xfe, 0x88, '\x00', 0x2, 0x0}, 0x7, 0x7800, 0x10001, 0x1}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @private, @local}, &(0x7f00000003c0)=0xc) socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) socket$nl_audit(0x10, 0x3, 0x9) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x1b, &(0x7f0000000000)={@dev={0xfe, 0x80, '\x00', 0xfd}}, 0x14) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x6, 0x5, 0x1, 0x3f, 0x0, 0x3ff, 0x50000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3b, 0x1, @perf_config_ext={0x1, 0x7fff}, 0xa8, 0x1, 0x20, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x4, 0x0, 0xdeb}, 0x0, 0x3, 0xffffffffffffffff, 0x3) 12:24:59 executing program 7: syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) [ 184.546514] random: crng reseeded on system resumption [ 184.565724] Restarting kernel threads ... done. [ 185.123528] syz-executor.0 (6440) used greatest stack depth: 23608 bytes left 12:24:59 executing program 7: syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) 12:24:59 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() pidfd_open(r1, 0x0) syz_open_procfs(r1, &(0x7f00000000c0)='fd/4\x00') perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x3f, 0x5a, 0xea, 0x7f, 0x0, 0xfffffffffffeffff, 0x800, 0x11, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5c7, 0x2, @perf_bp={&(0x7f0000000240), 0x4}, 0x4401, 0x3ff, 0x1, 0x0, 0x3, 0x0, 0x905, 0x0, 0x4, 0x0, 0x4}, r1, 0xd, r0, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000080), 0x6) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(0xffffffffffffffff, &(0x7f00000000c0)=""/98, 0x62, 0x7fff) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x3, 0x0, 0x1, 0x40, 0x0, 0x6b, 0x68104, 0x7, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x9, 0x8}, 0x2000, 0x94c9, 0x1f, 0x0, 0x2, 0x9, 0x6, 0x0, 0xa5a2, 0x0, 0x3}, 0x0, 0x2, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x7fff) write$bt_hci(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="210600000005020000fdffff0000c2933d24c94cc58c27a899a50ff3e3a0cfda8c77358361059faf9ca735702669d87b236c8204ed6dd40e144998620000ed1d691bf1a2dd6998a1"], 0x13) fcntl$getownex(r2, 0x10, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff, 0x4a}) r3 = accept$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @private}}, &(0x7f0000000040)=0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) pwritev2(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x8, 0x5, 0x11) 12:24:59 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() pidfd_open(r1, 0x0) syz_open_procfs(r1, &(0x7f00000000c0)='fd/4\x00') perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x3f, 0x5a, 0xea, 0x7f, 0x0, 0xfffffffffffeffff, 0x800, 0x11, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5c7, 0x2, @perf_bp={&(0x7f0000000240), 0x4}, 0x4401, 0x3ff, 0x1, 0x0, 0x3, 0x0, 0x905, 0x0, 0x4, 0x0, 0x4}, r1, 0xd, r0, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000080), 0x6) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(0xffffffffffffffff, &(0x7f00000000c0)=""/98, 0x62, 0x7fff) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x3, 0x0, 0x1, 0x40, 0x0, 0x6b, 0x68104, 0x7, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x9, 0x8}, 0x2000, 0x94c9, 0x1f, 0x0, 0x2, 0x9, 0x6, 0x0, 0xa5a2, 0x0, 0x3}, 0x0, 0x2, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x7fff) write$bt_hci(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="210600000005020000fdffff0000c2933d24c94cc58c27a899a50ff3e3a0cfda8c77358361059faf9ca735702669d87b236c8204ed6dd40e144998620000ed1d691bf1a2dd6998a1"], 0x13) fcntl$getownex(r2, 0x10, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff, 0x4a}) r3 = accept$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @private}}, &(0x7f0000000040)=0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) pwritev2(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x8, 0x5, 0x11) 12:24:59 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='attr/fscreate\x00') pread64(r0, 0x0, 0x0, 0x0) 12:24:59 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() pidfd_open(r1, 0x0) syz_open_procfs(r1, &(0x7f00000000c0)='fd/4\x00') perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x3f, 0x5a, 0xea, 0x7f, 0x0, 0xfffffffffffeffff, 0x800, 0x11, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5c7, 0x2, @perf_bp={&(0x7f0000000240), 0x4}, 0x4401, 0x3ff, 0x1, 0x0, 0x3, 0x0, 0x905, 0x0, 0x4, 0x0, 0x4}, r1, 0xd, r0, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000080), 0x6) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(0xffffffffffffffff, &(0x7f00000000c0)=""/98, 0x62, 0x7fff) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x3, 0x0, 0x1, 0x40, 0x0, 0x6b, 0x68104, 0x7, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x9, 0x8}, 0x2000, 0x94c9, 0x1f, 0x0, 0x2, 0x9, 0x6, 0x0, 0xa5a2, 0x0, 0x3}, 0x0, 0x2, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x7fff) write$bt_hci(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="210600000005020000fdffff0000c2933d24c94cc58c27a899a50ff3e3a0cfda8c77358361059faf9ca735702669d87b236c8204ed6dd40e144998620000ed1d691bf1a2dd6998a1"], 0x13) fcntl$getownex(r2, 0x10, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff, 0x4a}) r3 = accept$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @private}}, &(0x7f0000000040)=0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) pwritev2(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x8, 0x5, 0x11) 12:24:59 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() pidfd_open(r1, 0x0) syz_open_procfs(r1, &(0x7f00000000c0)='fd/4\x00') perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x3f, 0x5a, 0xea, 0x7f, 0x0, 0xfffffffffffeffff, 0x800, 0x11, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5c7, 0x2, @perf_bp={&(0x7f0000000240), 0x4}, 0x4401, 0x3ff, 0x1, 0x0, 0x3, 0x0, 0x905, 0x0, 0x4, 0x0, 0x4}, r1, 0xd, r0, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000080), 0x6) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(0xffffffffffffffff, &(0x7f00000000c0)=""/98, 0x62, 0x7fff) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x3, 0x0, 0x1, 0x40, 0x0, 0x6b, 0x68104, 0x7, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x9, 0x8}, 0x2000, 0x94c9, 0x1f, 0x0, 0x2, 0x9, 0x6, 0x0, 0xa5a2, 0x0, 0x3}, 0x0, 0x2, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x7fff) write$bt_hci(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="210600000005020000fdffff0000c2933d24c94cc58c27a899a50ff3e3a0cfda8c77358361059faf9ca735702669d87b236c8204ed6dd40e144998620000ed1d691bf1a2dd6998a1"], 0x13) fcntl$getownex(r2, 0x10, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff, 0x4a}) r3 = accept$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @private}}, &(0x7f0000000040)=0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) pwritev2(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x8, 0x5, 0x11) 12:24:59 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') open(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_setup(0x454c, &(0x7f0000000240)) setxattr$security_capability(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340), &(0x7f0000000500)=@v3={0x3000000, [{0x0, 0x72}, {0xffffffff, 0x2}]}, 0x18, 0x2) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xa, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) sendfile(r1, r0, 0x0, 0xfffffdef) 12:24:59 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() pidfd_open(r1, 0x0) syz_open_procfs(r1, &(0x7f00000000c0)='fd/4\x00') perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x3f, 0x5a, 0xea, 0x7f, 0x0, 0xfffffffffffeffff, 0x800, 0x11, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5c7, 0x2, @perf_bp={&(0x7f0000000240), 0x4}, 0x4401, 0x3ff, 0x1, 0x0, 0x3, 0x0, 0x905, 0x0, 0x4, 0x0, 0x4}, r1, 0xd, r0, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000080), 0x6) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(0xffffffffffffffff, &(0x7f00000000c0)=""/98, 0x62, 0x7fff) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x3, 0x0, 0x1, 0x40, 0x0, 0x6b, 0x68104, 0x7, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x9, 0x8}, 0x2000, 0x94c9, 0x1f, 0x0, 0x2, 0x9, 0x6, 0x0, 0xa5a2, 0x0, 0x3}, 0x0, 0x2, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x7fff) write$bt_hci(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="210600000005020000fdffff0000c2933d24c94cc58c27a899a50ff3e3a0cfda8c77358361059faf9ca735702669d87b236c8204ed6dd40e144998620000ed1d691bf1a2dd6998a1"], 0x13) fcntl$getownex(r2, 0x10, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff, 0x4a}) r3 = accept$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @private}}, &(0x7f0000000040)=0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) pwritev2(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x8, 0x5, 0x11) 12:24:59 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='attr/fscreate\x00') pread64(r0, 0x0, 0x0, 0x0) 12:24:59 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='attr/fscreate\x00') pread64(r0, 0x0, 0x0, 0x0) 12:24:59 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() pidfd_open(r1, 0x0) syz_open_procfs(r1, &(0x7f00000000c0)='fd/4\x00') perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x3f, 0x5a, 0xea, 0x7f, 0x0, 0xfffffffffffeffff, 0x800, 0x11, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5c7, 0x2, @perf_bp={&(0x7f0000000240), 0x4}, 0x4401, 0x3ff, 0x1, 0x0, 0x3, 0x0, 0x905, 0x0, 0x4, 0x0, 0x4}, r1, 0xd, r0, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000080), 0x6) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(0xffffffffffffffff, &(0x7f00000000c0)=""/98, 0x62, 0x7fff) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x3, 0x0, 0x1, 0x40, 0x0, 0x6b, 0x68104, 0x7, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x9, 0x8}, 0x2000, 0x94c9, 0x1f, 0x0, 0x2, 0x9, 0x6, 0x0, 0xa5a2, 0x0, 0x3}, 0x0, 0x2, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x7fff) write$bt_hci(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="210600000005020000fdffff0000c2933d24c94cc58c27a899a50ff3e3a0cfda8c77358361059faf9ca735702669d87b236c8204ed6dd40e144998620000ed1d691bf1a2dd6998a1"], 0x13) fcntl$getownex(r2, 0x10, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff, 0x4a}) r3 = accept$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @private}}, &(0x7f0000000040)=0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) pwritev2(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x8, 0x5, 0x11) 12:24:59 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() pidfd_open(r1, 0x0) syz_open_procfs(r1, &(0x7f00000000c0)='fd/4\x00') perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x3f, 0x5a, 0xea, 0x7f, 0x0, 0xfffffffffffeffff, 0x800, 0x11, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5c7, 0x2, @perf_bp={&(0x7f0000000240), 0x4}, 0x4401, 0x3ff, 0x1, 0x0, 0x3, 0x0, 0x905, 0x0, 0x4, 0x0, 0x4}, r1, 0xd, r0, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000080), 0x6) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(0xffffffffffffffff, &(0x7f00000000c0)=""/98, 0x62, 0x7fff) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x3, 0x0, 0x1, 0x40, 0x0, 0x6b, 0x68104, 0x7, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x9, 0x8}, 0x2000, 0x94c9, 0x1f, 0x0, 0x2, 0x9, 0x6, 0x0, 0xa5a2, 0x0, 0x3}, 0x0, 0x2, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x7fff) write$bt_hci(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="210600000005020000fdffff0000c2933d24c94cc58c27a899a50ff3e3a0cfda8c77358361059faf9ca735702669d87b236c8204ed6dd40e144998620000ed1d691bf1a2dd6998a1"], 0x13) fcntl$getownex(r2, 0x10, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff, 0x4a}) r3 = accept$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @private}}, &(0x7f0000000040)=0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) pwritev2(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x8, 0x5, 0x11) 12:24:59 executing program 7: syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) 12:25:00 executing program 2: getpriority(0x1, 0xffffffffffffffff) 12:25:00 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x1c) 12:25:00 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() pidfd_open(r1, 0x0) syz_open_procfs(r1, &(0x7f00000000c0)='fd/4\x00') perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x3f, 0x5a, 0xea, 0x7f, 0x0, 0xfffffffffffeffff, 0x800, 0x11, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5c7, 0x2, @perf_bp={&(0x7f0000000240), 0x4}, 0x4401, 0x3ff, 0x1, 0x0, 0x3, 0x0, 0x905, 0x0, 0x4, 0x0, 0x4}, r1, 0xd, r0, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000080), 0x6) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(0xffffffffffffffff, &(0x7f00000000c0)=""/98, 0x62, 0x7fff) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x3, 0x0, 0x1, 0x40, 0x0, 0x6b, 0x68104, 0x7, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x9, 0x8}, 0x2000, 0x94c9, 0x1f, 0x0, 0x2, 0x9, 0x6, 0x0, 0xa5a2, 0x0, 0x3}, 0x0, 0x2, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x7fff) write$bt_hci(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="210600000005020000fdffff0000c2933d24c94cc58c27a899a50ff3e3a0cfda8c77358361059faf9ca735702669d87b236c8204ed6dd40e144998620000ed1d691bf1a2dd6998a1"], 0x13) fcntl$getownex(r2, 0x10, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff, 0x4a}) r3 = accept$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @private}}, &(0x7f0000000040)=0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) pwritev2(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x8, 0x5, 0x11) 12:25:00 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() pidfd_open(r1, 0x0) syz_open_procfs(r1, &(0x7f00000000c0)='fd/4\x00') perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x3f, 0x5a, 0xea, 0x7f, 0x0, 0xfffffffffffeffff, 0x800, 0x11, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5c7, 0x2, @perf_bp={&(0x7f0000000240), 0x4}, 0x4401, 0x3ff, 0x1, 0x0, 0x3, 0x0, 0x905, 0x0, 0x4, 0x0, 0x4}, r1, 0xd, r0, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000080), 0x6) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(0xffffffffffffffff, &(0x7f00000000c0)=""/98, 0x62, 0x7fff) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x3, 0x0, 0x1, 0x40, 0x0, 0x6b, 0x68104, 0x7, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x9, 0x8}, 0x2000, 0x94c9, 0x1f, 0x0, 0x2, 0x9, 0x6, 0x0, 0xa5a2, 0x0, 0x3}, 0x0, 0x2, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x7fff) write$bt_hci(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="210600000005020000fdffff0000c2933d24c94cc58c27a899a50ff3e3a0cfda8c77358361059faf9ca735702669d87b236c8204ed6dd40e144998620000ed1d691bf1a2dd6998a1"], 0x13) fcntl$getownex(r2, 0x10, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff, 0x4a}) r3 = accept$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @private}}, &(0x7f0000000040)=0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) pwritev2(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x8, 0x5, 0x11) 12:25:00 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() pidfd_open(r1, 0x0) syz_open_procfs(r1, &(0x7f00000000c0)='fd/4\x00') perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x3f, 0x5a, 0xea, 0x7f, 0x0, 0xfffffffffffeffff, 0x800, 0x11, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5c7, 0x2, @perf_bp={&(0x7f0000000240), 0x4}, 0x4401, 0x3ff, 0x1, 0x0, 0x3, 0x0, 0x905, 0x0, 0x4, 0x0, 0x4}, r1, 0xd, r0, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000080), 0x6) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(0xffffffffffffffff, &(0x7f00000000c0)=""/98, 0x62, 0x7fff) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x3, 0x0, 0x1, 0x40, 0x0, 0x6b, 0x68104, 0x7, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x9, 0x8}, 0x2000, 0x94c9, 0x1f, 0x0, 0x2, 0x9, 0x6, 0x0, 0xa5a2, 0x0, 0x3}, 0x0, 0x2, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x7fff) write$bt_hci(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="210600000005020000fdffff0000c2933d24c94cc58c27a899a50ff3e3a0cfda8c77358361059faf9ca735702669d87b236c8204ed6dd40e144998620000ed1d691bf1a2dd6998a1"], 0x13) fcntl$getownex(r2, 0x10, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff, 0x4a}) r3 = accept$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @private}}, &(0x7f0000000040)=0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) pwritev2(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x8, 0x5, 0x11) 12:25:00 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x1c) 12:25:00 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x1c) 12:25:00 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x1c) 12:25:00 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() pidfd_open(r1, 0x0) syz_open_procfs(r1, &(0x7f00000000c0)='fd/4\x00') perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x3f, 0x5a, 0xea, 0x7f, 0x0, 0xfffffffffffeffff, 0x800, 0x11, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5c7, 0x2, @perf_bp={&(0x7f0000000240), 0x4}, 0x4401, 0x3ff, 0x1, 0x0, 0x3, 0x0, 0x905, 0x0, 0x4, 0x0, 0x4}, r1, 0xd, r0, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000080), 0x6) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(0xffffffffffffffff, &(0x7f00000000c0)=""/98, 0x62, 0x7fff) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x3, 0x0, 0x1, 0x40, 0x0, 0x6b, 0x68104, 0x7, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x9, 0x8}, 0x2000, 0x94c9, 0x1f, 0x0, 0x2, 0x9, 0x6, 0x0, 0xa5a2, 0x0, 0x3}, 0x0, 0x2, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x7fff) write$bt_hci(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="210600000005020000fdffff0000c2933d24c94cc58c27a899a50ff3e3a0cfda8c77358361059faf9ca735702669d87b236c8204ed6dd40e144998620000ed1d691bf1a2dd6998a1"], 0x13) fcntl$getownex(r2, 0x10, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff, 0x4a}) r3 = accept$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @private}}, &(0x7f0000000040)=0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) pwritev2(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x8, 0x5, 0x11) 12:25:00 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() pidfd_open(r1, 0x0) syz_open_procfs(r1, &(0x7f00000000c0)='fd/4\x00') perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x3f, 0x5a, 0xea, 0x7f, 0x0, 0xfffffffffffeffff, 0x800, 0x11, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5c7, 0x2, @perf_bp={&(0x7f0000000240), 0x4}, 0x4401, 0x3ff, 0x1, 0x0, 0x3, 0x0, 0x905, 0x0, 0x4, 0x0, 0x4}, r1, 0xd, r0, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000080), 0x6) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(0xffffffffffffffff, &(0x7f00000000c0)=""/98, 0x62, 0x7fff) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x3, 0x0, 0x1, 0x40, 0x0, 0x6b, 0x68104, 0x7, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x9, 0x8}, 0x2000, 0x94c9, 0x1f, 0x0, 0x2, 0x9, 0x6, 0x0, 0xa5a2, 0x0, 0x3}, 0x0, 0x2, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x7fff) write$bt_hci(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="210600000005020000fdffff0000c2933d24c94cc58c27a899a50ff3e3a0cfda8c77358361059faf9ca735702669d87b236c8204ed6dd40e144998620000ed1d691bf1a2dd6998a1"], 0x13) fcntl$getownex(r2, 0x10, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff, 0x4a}) r3 = accept$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @private}}, &(0x7f0000000040)=0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) pwritev2(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x8, 0x5, 0x11) 12:25:00 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() pidfd_open(r1, 0x0) syz_open_procfs(r1, &(0x7f00000000c0)='fd/4\x00') perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x3f, 0x5a, 0xea, 0x7f, 0x0, 0xfffffffffffeffff, 0x800, 0x11, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5c7, 0x2, @perf_bp={&(0x7f0000000240), 0x4}, 0x4401, 0x3ff, 0x1, 0x0, 0x3, 0x0, 0x905, 0x0, 0x4, 0x0, 0x4}, r1, 0xd, r0, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000080), 0x6) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(0xffffffffffffffff, &(0x7f00000000c0)=""/98, 0x62, 0x7fff) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x3, 0x0, 0x1, 0x40, 0x0, 0x6b, 0x68104, 0x7, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x9, 0x8}, 0x2000, 0x94c9, 0x1f, 0x0, 0x2, 0x9, 0x6, 0x0, 0xa5a2, 0x0, 0x3}, 0x0, 0x2, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f00000000c0)=""/98, 0x62, 0x7fff) write$bt_hci(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="210600000005020000fdffff0000c2933d24c94cc58c27a899a50ff3e3a0cfda8c77358361059faf9ca735702669d87b236c8204ed6dd40e144998620000ed1d691bf1a2dd6998a1"], 0x13) fcntl$getownex(r2, 0x10, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xff VM DIAGNOSIS: 12:24:53 Registers: info registers vcpu 0 RAX=0000000000000000 RBX=0000000000000001 RCX=0000000000000001 RDX=0000000000000000 RSI=ffff88803c3ff7c8 RDI=ffff88803c3ff790 RBP=ffff88803c3ff780 RSP=ffff88803c3ff658 R8 =ffffffff85c433c6 R9 =ffffffff85c433ca R10=ffffed100787fef2 R11=ffff88803c3ff768 R12=ffff88803c3ff769 R13=ffff88803c3ff788 R14=ffff88803c3ff728 R15=ffffffff85c433cb RIP=ffffffff811280b2 RFL=00000293 [--S-A-C] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806d000000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0607741000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe060773f000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f4b51b218e0 CR3=000000003ef62000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000ff0000 XMM01=6a6e695f31313230385f7a7973006273 XMM02=00000000000000000000000000000000 XMM03=00007f0b1e7817c800007f0b1e7817c0 XMM04=ffffffffffffffffffffffff00000000 XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=0000000000000044 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff82451091 RDI=ffffffff879a19e0 RBP=ffffffff879a19a0 RSP=ffff88804179f4e0 R8 =0000000000000001 R9 =000000000000000a R10=0000000000000044 R11=0000000000000001 R12=0000000000000044 R13=ffffffff879a19a0 R14=0000000000000010 R15=ffffffff82451080 RIP=ffffffff824510e9 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f0b1bc10700 00000000 00000000 GS =0000 ffff88806d100000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe42673fa000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe42673f8000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=ffffed100fffc000 CR3=000000000f734000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=0070656474666f732e73656c75646f6d XMM01=0070656474666f732e73656c75646f6d XMM02=00000000000000000000ffffffffffff XMM03=00000000000000000000ff00000000ff XMM04=2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f XMM05=00000000000000000000000000000000 XMM06=00000000000000000000000000000000 XMM07=00000000000000000000000000000000 XMM08=676f6c206d6f74737563000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000