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"}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:07:48 executing program 2: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:07:48 executing program 0: ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x94, 0x1, 0xf6, 0x0, 0x0, 0x8001, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x89040, 0x3, 0x0, 0x9, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002c80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000018800)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000015d40)=ANY=[@ANYBLOB="20001a00000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x20}}], 0x2, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000001880)=ANY=[@ANYBLOB="a0000000000007280001800c00028005000100840000000c00028005000100880000000c000280050001002f00000008000440000000090c0001800600034000000000000003ff0c0002800500010021000000060013400003000006000340000200000c00028005000100010000000600034000010000140001800800010000000000080002000a01010208000440fffffffd5cf03c6fba1e96bac815b838796a78636b26bde7b1b4ba1842ed1ce6"], 0xa0}, 0x1, 0x0, 0x0, 0x8810}, 0x0) r1 = getpid() epoll_create(0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x3ff, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x100, 0x2}, 0xe) sendmsg$NL80211_CMD_PROBE_CLIENT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x5c, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0x4208, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x94) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) 19:07:48 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:07:48 executing program 6: r0 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x0, 0x0, @fd_index, 0x8, 0x0, 0x0, 0x0, 0x0, {0x0, r0}}, 0x10000) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_OPENAT2={0x1c, 0x5, 0x0, 0xffffffffffffffff, &(0x7f0000000140)={0x12000, 0x80, 0x4}, &(0x7f0000000180)='./file0\x00', 0x18, 0x0, 0x23456, {0x0, r0}}, 0x2fd) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r1, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) open(&(0x7f0000000080)='./file0\x00', 0x1e7980, 0x88) 19:07:48 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f00000002c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="400000000000006b2e2f66696c6531007e30245af92a26beb785a7562b537de6085f6c11334dca923f2340000000000000001c44c07cd7229672ab4a2fcf525e3787cec74ee3c88561449a0a3b78f8a18f8e20d82763e9cf407fee8f85da195ac93cbd5a99615bbfe7a49bfebb721ee07bc5dcb07349542491c4e1df2b6e9117505df0cc6cc12539c1e07f7dabde0d09c31b98e24fedebef230aa45bc2da2f01cb3582"]) openat(r2, &(0x7f00000000c0)='./file1\x00', 0x0, 0x8c) openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x100, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:08:03 executing program 0: ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x94, 0x1, 0xf6, 0x0, 0x0, 0x8001, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x89040, 0x3, 0x0, 0x9, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002c80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000018800)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000015d40)=ANY=[@ANYBLOB="20001a00000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x20}}], 0x2, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000001880)=ANY=[@ANYBLOB="a0000000000007280001800c00028005000100840000000c00028005000100880000000c000280050001002f00000008000440000000090c0001800600034000000000000003ff0c0002800500010021000000060013400003000006000340000200000c00028005000100010000000600034000010000140001800800010000000000080002000a01010208000440fffffffd5cf03c6fba1e96bac815b838796a78636b26bde7b1b4ba1842ed1ce6"], 0xa0}, 0x1, 0x0, 0x0, 0x8810}, 0x0) r1 = getpid() epoll_create(0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x3ff, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x100, 0x2}, 0xe) sendmsg$NL80211_CMD_PROBE_CLIENT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x5c, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0x4208, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x94) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) 19:08:03 executing program 2: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:08:03 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @any, 0xfffb}, 0xe) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed, 0x3}, 0xe) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0xd8) dup2(r1, 0xffffffffffffffff) connect$bt_l2cap(r1, &(0x7f0000000040)={0x1f, 0x71, @none, 0x1, 0x2}, 0xe) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r2, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x864) bind$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @any, 0x9380}, 0xe) getpeername(r0, 0x0, &(0x7f00000000c0)) 19:08:03 executing program 4: r0 = creat(&(0x7f00000000c0)='./file2\x00', 0x0) fcntl$setlease(r0, 0x400, 0x1) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000080)='./binderfs/binder1\x00', 0x2, 0x0) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000000100)={r0}) fcntl$setown(r0, 0x8, 0xffffffffffffffff) creat(&(0x7f0000000040)='./file2\x00', 0x0) creat(&(0x7f0000000000)='./file2\x00', 0x0) 19:08:03 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) syz_io_uring_setup(0x7243, &(0x7f0000000600)={0x0, 0xff69, 0x20, 0x2, 0x24, 0x0, r1}, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000ff6000/0x1000)=nil, &(0x7f0000000500), &(0x7f0000000540)) pread64(r1, &(0x7f0000000080)=""/45, 0x2d, 0x7fff) 19:08:03 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@initdev, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@private}}, &(0x7f0000000180)=0xe8) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB="7472616e73b6ff0000000000000000011500f85242028899312ae9d7efdc8a427df29bbf7294a9e4765970089376f737bb084fd2c22f8c298cee68f28105baf7e2fcb5d97052a029c69960646df80dc2c8472a0aca3b6b214aaa133d70e01ec2765b23369e620100008000000000db8f1a86bedfcd9079be748e69dfdff79fe5e5d8b22ea5ddff1e4556ac28ede112d1128b679cfa4584f82cde637b9e33baf00aa6a0aa95f701d502198bc9ce1dd6cf69fa78b6a9a3fe41dad6ec2e9eeb223a1aabc19c706276ca284f7fe6de2b", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="2c6d6d61702c6163636573733d636c69656e742c63616368657461673d5e5e5d232c6e6f657874656e642c616669643d3078303030303030303030303030303030362c736d61636b6673726f6f743d002c646566636f6e746578743d726f6f742c7065726d69745f646972656374696f2c7569643c8e1301bef9725d18b17b2c1e6d967d4e864a2a64b4775d2269d12b4efa3f28d9802cf3eb42fe7cec03e964cc2e502e5897", @ANYRESDEC=r1, @ANYBLOB=',func=PATH_CHECK,\x00']) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:08:03 executing program 6: r0 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x0, 0x0, @fd_index, 0x8, 0x0, 0x0, 0x0, 0x0, {0x0, r0}}, 0x10000) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_OPENAT2={0x1c, 0x5, 0x0, 0xffffffffffffffff, &(0x7f0000000140)={0x12000, 0x80, 0x4}, &(0x7f0000000180)='./file0\x00', 0x18, 0x0, 0x23456, {0x0, r0}}, 0x2fd) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r1, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) open(&(0x7f0000000080)='./file0\x00', 0x1e7980, 0x88) 19:08:03 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:08:03 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:08:03 executing program 2: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:08:03 executing program 6: r0 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x0, 0x0, @fd_index, 0x8, 0x0, 0x0, 0x0, 0x0, {0x0, r0}}, 0x10000) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_OPENAT2={0x1c, 0x5, 0x0, 0xffffffffffffffff, &(0x7f0000000140)={0x12000, 0x80, 0x4}, &(0x7f0000000180)='./file0\x00', 0x18, 0x0, 0x23456, {0x0, r0}}, 0x2fd) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r1, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) open(&(0x7f0000000080)='./file0\x00', 0x1e7980, 0x88) 19:08:03 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x400000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xe74, 0xfff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f00000002c0)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xe6\xf1\a\xdb\xc2m\xb2w\b\xb7*IXTv\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xadb,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9a\x930O{\x18N5\xee\xcc\xdew\aR8\xd9\xacJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3\xea\xdb\xae\x9d\xf5\xf7\xe4\xd7\x12\xdb0\x86\xf5\xab<0\xe7W\xc7\xda\x15\xf1\xbfA\xc4>\xc4~\xde\xb7[\xae\b\xa6\xdc\xf4\x83\x92\x80\xa1\xe10\xea\xef;Hl', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r1, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:08:03 executing program 0: ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x94, 0x1, 0xf6, 0x0, 0x0, 0x8001, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x89040, 0x3, 0x0, 0x9, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002c80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000018800)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000015d40)=ANY=[@ANYBLOB="20001a00000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x20}}], 0x2, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000001880)=ANY=[@ANYBLOB="a0000000000007280001800c00028005000100840000000c00028005000100880000000c000280050001002f00000008000440000000090c0001800600034000000000000003ff0c0002800500010021000000060013400003000006000340000200000c00028005000100010000000600034000010000140001800800010000000000080002000a01010208000440fffffffd5cf03c6fba1e96bac815b838796a78636b26bde7b1b4ba1842ed1ce6"], 0xa0}, 0x1, 0x0, 0x0, 0x8810}, 0x0) r1 = getpid() epoll_create(0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x3ff, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x100, 0x2}, 0xe) sendmsg$NL80211_CMD_PROBE_CLIENT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x5c, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0x4208, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0x94) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) 19:08:03 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, 0x0, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:08:03 executing program 2: clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:08:03 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {0x1f}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) syz_io_uring_setup(0x7243, &(0x7f0000000600)={0x0, 0xff69, 0x20, 0x2, 0x24, 0x0, r0}, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000ff6000/0x1000)=nil, &(0x7f0000000500), &(0x7f0000000540)) signalfd4(r0, &(0x7f0000000080)={[0x9]}, 0x8, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_io_uring_setup(0x5d1c, &(0x7f00000002c0), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000200), &(0x7f0000000140)) syz_io_uring_setup(0x7243, &(0x7f0000000600)={0x0, 0xff69, 0x20, 0x2, 0x24, 0x0, r1}, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000ff6000/0x1000)=nil, &(0x7f0000000500), &(0x7f0000000540)) fallocate(r1, 0x2b, 0x0, 0x390c) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:08:03 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:08:18 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r1, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r2) r3 = syz_genetlink_get_family_id$nl802154(&(0x7f00000000c0), r0) sendmsg$NL802154_CMD_DEL_SEC_KEY(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)={0x114, r3, 0x400, 0x70bd29, 0x25dfdbfc, {}, [@NL802154_ATTR_SEC_KEY={0xc, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x3}]}, @NL802154_ATTR_SEC_KEY={0xb8, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x9}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x90}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "2f52bed384c7ae4428a4013ffc9f5022"}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "70e0126793e69d8b6dc3b1336291295b"}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "f11a840b4b0281165225529eb76cdb07"}, @NL802154_KEY_ATTR_ID={0x68, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0xc8e}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x3c, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0xffff}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x1}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x3}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0302}}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0x3}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0302}}]}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0xffffff01}, @NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x401}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x7}]}]}, @NL802154_ATTR_SEC_KEY={0x3c, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_USAGE_CMDS={0x24, 0x3, "f229cf6d85c55d6bed21bb123e23e7776966d32fb812bdd631cc7a2063f757a3"}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "adf10f628b3b7d8478f9d70511f1c88b"}]}]}, 0x114}, 0x1, 0x0, 0x0, 0x40}, 0x24000) 19:08:18 executing program 2: clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:08:18 executing program 0: ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x94, 0x1, 0xf6, 0x0, 0x0, 0x8001, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x89040, 0x3, 0x0, 0x9, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002c80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000018800)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000015d40)=ANY=[@ANYBLOB="20001a00000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x20}}], 0x2, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000001880)=ANY=[@ANYBLOB="a0000000000007280001800c00028005000100840000000c00028005000100880000000c000280050001002f00000008000440000000090c0001800600034000000000000003ff0c0002800500010021000000060013400003000006000340000200000c00028005000100010000000600034000010000140001800800010000000000080002000a01010208000440fffffffd5cf03c6fba1e96bac815b838796a78636b26bde7b1b4ba1842ed1ce6"], 0xa0}, 0x1, 0x0, 0x0, 0x8810}, 0x0) r1 = getpid() epoll_create(0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x3ff, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x100, 0x2}, 0xe) sendmsg$NL80211_CMD_PROBE_CLIENT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x5c, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0x4208, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0x94) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) 19:08:18 executing program 4: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = syz_io_uring_setup(0x4d4f, &(0x7f0000000240), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000000, 0x13, r1, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) io_uring_enter(r1, 0x58af, 0x0, 0x2, 0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) creat(&(0x7f0000000040)='./file2\x00', 0x0) creat(&(0x7f0000000000)='./file2\x00', 0x0) 19:08:18 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @any, 0xfffb}, 0xe) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @any, 0x3}, 0xe) getpeername(r0, 0x0, &(0x7f00000000c0)) 19:08:18 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:08:18 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, 0x0, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:08:18 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) r1 = openat2(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={0x40000, 0x100, 0x1}, 0x18) bind$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x32}}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x400, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:08:18 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:08:18 executing program 2: clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:08:18 executing program 5: perf_event_open(&(0x7f0000000480)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000000, 0x40010, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58af, 0x0, 0x2, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000080)='syz', 0x1) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:08:18 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000004c0)=ANY=[@ANYBLOB="01000000010000001800000446ff36d2cb6155c4a039de94c3da655d9f698b71ea69a55775f2c8ccef3dd7b74c36f5162a1d91df3456c513dc52e9602b9ef383cf6eecb8fa4e724cd0090b930992e799e783a5adf53cddda172704020a000000b26f000000000000", @ANYRES32, @ANYRES32, @ANYBLOB='\b\x00\x00\x00./file1\x00']) ioctl$TIOCL_SCROLLCONSOLE(r0, 0x5453, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) syz_io_uring_setup(0x752d, &(0x7f0000000380)={0x0, 0x52b2, 0x2, 0x1}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, 0x0, &(0x7f0000000400)) lseek(0xffffffffffffffff, 0x800, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:08:18 executing program 4: r0 = creat(&(0x7f00000000c0)='./file2\x00', 0x0) fcntl$setlease(r0, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x1) fcntl$setown(r0, 0x8, 0xffffffffffffffff) r1 = creat(&(0x7f0000000040)='./file2\x00', 0x0) r2 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) syz_io_uring_setup(0x7243, &(0x7f0000000600)={0x0, 0xff69, 0x20, 0x2, 0x24, 0x0, r2}, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000ff6000/0x1000)=nil, &(0x7f0000000500), &(0x7f0000000540)) r3 = syz_io_uring_setup(0x4d4f, &(0x7f0000000240), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000000, 0x13, r3, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r3, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58af, 0x0, 0x2, 0x0, 0x0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(0xffffffffffffffff, 0xc038943b, &(0x7f00000001c0)={0x8, 0x8, '\x00', 0x0, &(0x7f0000000180)=[0x0]}) io_uring_enter(r3, 0x58af, 0x0, 0x2, 0x0, 0x0) r4 = syz_io_uring_setup(0x4d4f, &(0x7f0000000240), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000000, 0x13, r4, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r4, 0x0) io_uring_enter(r4, 0x58af, 0x0, 0x2, 0x0, 0x0) ppoll(&(0x7f0000000080)=[{r2, 0x4}, {r3, 0x80}, {r1, 0x8040}, {r4, 0x40}], 0x4, &(0x7f0000000100), &(0x7f0000000140)={[0x5f]}, 0x8) creat(&(0x7f0000000000)='./file2\x00', 0x0) 19:08:18 executing program 0: ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x94, 0x1, 0xf6, 0x0, 0x0, 0x8001, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x89040, 0x3, 0x0, 0x9, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002c80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000018800)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000015d40)=ANY=[@ANYBLOB="20001a00000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x20}}], 0x2, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000001880)=ANY=[@ANYBLOB="a0000000000007280001800c00028005000100840000000c00028005000100880000000c000280050001002f00000008000440000000090c0001800600034000000000000003ff0c0002800500010021000000060013400003000006000340000200000c00028005000100010000000600034000010000140001800800010000000000080002000a01010208000440fffffffd5cf03c6fba1e96bac815b838796a78636b26bde7b1b4ba1842ed1ce6"], 0xa0}, 0x1, 0x0, 0x0, 0x8810}, 0x0) r1 = getpid() epoll_create(0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x3ff, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x100, 0x2}, 0xe) sendmsg$NL80211_CMD_PROBE_CLIENT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x5c, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0x4208, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0x94) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) [ 2497.748188] Bluetooth: hci2: command 0x0405 tx timeout [ 2500.625045] Bluetooth: hci6: command 0x0409 tx timeout [ 2502.672394] Bluetooth: hci6: command 0x041b tx timeout [ 2504.722419] Bluetooth: hci6: command 0x040f tx timeout [ 2505.328989] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2505.330604] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2505.333066] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 2505.373171] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2505.374233] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2505.376047] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2506.768403] Bluetooth: hci6: command 0x0419 tx timeout 19:08:42 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x42200, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x159) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x399002, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, r0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) fspick(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) keyctl$set_reqkey_keyring(0xe, 0x0) 19:08:42 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(0x0, 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:08:42 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, 0x0, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:08:42 executing program 4: r0 = creat(&(0x7f00000000c0)='./file2\x00', 0x0) r1 = accept$packet(r0, &(0x7f0000000080), &(0x7f0000000100)=0x14) fcntl$setlease(r1, 0x400, 0x2) fcntl$setown(r0, 0x8, 0xffffffffffffffff) creat(&(0x7f0000000040)='./file2\x00', 0x0) r2 = syz_io_uring_setup(0x4d4f, &(0x7f0000000240), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000080)=@IORING_OP_ASYNC_CANCEL, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000000, 0x13, r2, 0x0) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r2, 0x0) syz_io_uring_submit(r5, r4, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) r6 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) syz_io_uring_submit(r5, 0x0, &(0x7f0000000240)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x3, 0x0, r6, 0x0, &(0x7f0000000140)="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", 0xfd, 0x21, 0x1}, 0x0) creat(&(0x7f0000000000)='./file2\x00', 0x0) 19:08:42 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:08:42 executing program 1: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0xaba7}}, './file0\x00'}) clone3(&(0x7f0000001200)={0x88338d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r2, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000800)={{0x7f, 0x45, 0x4c, 0x46, 0x1f, 0x9, 0x0, 0x9, 0xfa3, 0x2, 0x3e, 0x7, 0x138, 0x40, 0x1d6, 0x6, 0x5, 0x38, 0x2, 0x5, 0x200, 0x3}, [{0x6474e551, 0x2, 0x4, 0x7fff, 0x5, 0x8, 0x2, 0xfffffffffffffffd}], "f649e68472e17f29aaa15a830e12cced6525ee22bc081a80ca3d62ada0e110945702df5237827f4e1a33b0573e1a4031abfd30cff773a9e712a52cf65f2e470c301d28899278dfecab5e2894ac47344ef0fb08a17ebeac7774733c8e1cc4c9d32857c6a7d84feffd5a44948733f36310703f6767cfb5f2a839b2903251e6134b9bfd2700bbe95db70f2368b1061d3f088a15ff42369eb1761171cec500d93c2c4190165d62c0f271977061abe4d93cee7aa935133a5cfcdd476eae9d201839b21573e4f1b18ddb3013b41afff7d2660edc87622ee9cbc34e5fda865ecd34ee42f2a5fd8b173653be28733827", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x864) execveat(r2, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)='##\x00', &(0x7f0000000180)='(:#.{\\\x00', &(0x7f00000001c0)=']:\x00', &(0x7f0000000200)='[@/\x00', &(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)='\x00', &(0x7f0000000340)='dns_resolver\x00'], &(0x7f00000003c0), 0x100) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:08:42 executing program 0: ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x94, 0x1, 0xf6, 0x0, 0x0, 0x8001, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x89040, 0x3, 0x0, 0x9, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002c80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000018800)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000015d40)=ANY=[@ANYBLOB="20001a00000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x20}}], 0x2, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000001880)=ANY=[@ANYBLOB="a0000000000007280001800c00028005000100840000000c00028005000100880000000c000280050001002f00000008000440000000090c0001800600034000000000000003ff0c0002800500010021000000060013400003000006000340000200000c00028005000100010000000600034000010000140001800800010000000000080002000a01010208000440fffffffd5cf03c6fba1e96bac815b838796a78636b26bde7b1b4ba1842ed1ce6"], 0xa0}, 0x1, 0x0, 0x0, 0x8810}, 0x0) r1 = getpid() epoll_create(0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x3ff, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x100, 0x2}, 0xe) sendmsg$NL80211_CMD_PROBE_CLIENT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x5c, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0x4208, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB], 0x94) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) 19:08:42 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @any, 0xfffb}, 0xe) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed, 0x3}, 0xe) getpeername(r0, 0x0, &(0x7f00000000c0)) 19:08:43 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:08:43 executing program 0: ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x94, 0x1, 0xf6, 0x0, 0x0, 0x8001, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x89040, 0x3, 0x0, 0x9, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002c80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000018800)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000015d40)=ANY=[@ANYBLOB="20001a00000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x20}}], 0x2, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000001880)=ANY=[@ANYBLOB="a0000000000007280001800c00028005000100840000000c00028005000100880000000c000280050001002f00000008000440000000090c0001800600034000000000000003ff0c0002800500010021000000060013400003000006000340000200000c00028005000100010000000600034000010000140001800800010000000000080002000a01010208000440fffffffd5cf03c6fba1e96bac815b838796a78636b26bde7b1b4ba1842ed1ce6"], 0xa0}, 0x1, 0x0, 0x0, 0x8810}, 0x0) r1 = getpid() epoll_create(0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x3ff, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x100, 0x2}, 0xe) sendmsg$NL80211_CMD_PROBE_CLIENT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x5c, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0x4208, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB], 0x94) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) 19:08:43 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:08:43 executing program 4: r0 = creat(&(0x7f00000001c0)='./file2\x00', 0x0) fcntl$setlease(r0, 0x400, 0x1) r1 = fcntl$getown(r0, 0x9) fcntl$setown(r0, 0x8, r1) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f00000000c0)={r0, 0x4, 0x91, 0x100000001}) openat$cgroup_ro(r2, &(0x7f0000000100)='rdma.current\x00', 0x0, 0x0) creat(&(0x7f0000000040)='./file2\x00', 0x0) creat(&(0x7f0000000000)='./file2\x00', 0xe0) openat(0xffffffffffffffff, &(0x7f0000001740)='./file2\x00', 0x10085, 0x78) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000140)={0xcb, 0x0, 0x1000}) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000001780)=ANY=[@ANYBLOB="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"], 0x1015, 0x0) 19:08:43 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040), 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:08:43 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() pidfd_open(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x9, 0x5, 0x3, 0x2, 0x0, 0x400, 0x80114, 0x1b, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x200000, 0x4, @perf_config_ext={0x9, 0x4}, 0x43180, 0x400, 0x1, 0x4, 0x9, 0x4, 0x8, 0x0, 0x9}, r0, 0x5, 0xffffffffffffffff, 0x3) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ADD_IFACE(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB='\x00\a\x00\x00', @ANYRES16, @ANYBLOB="010000000000000000002100000009001f00706879310000000005002000010000000c000500000000000000f481"], 0x34}}, 0x0) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:08:43 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:08:43 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f00000001c0)={0x0, 0xfffffffffffffffb, 0x57, 0x5, @buffer={0x0, 0xb, &(0x7f0000000080)=""/11}, &(0x7f0000000140)="2e7aa6f6d05502ae09703525371363a21daa09f5d3f8413d4b5d21fcc3a60485d283126da77565aa79941400c3f68a7039d5fe01fcd731e8e247ac91cf1b3f52e6e6dc1bcee44855cae9a17410f0fc741085471e39573f", &(0x7f00000002c0)=""/227, 0x3, 0x14, 0x3, &(0x7f00000000c0)}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 2521.937062] Bluetooth: hci6: command 0x0405 tx timeout [ 2524.701265] Bluetooth: hci2: command 0x0409 tx timeout [ 2526.736514] Bluetooth: hci2: command 0x041b tx timeout [ 2528.784448] Bluetooth: hci2: command 0x040f tx timeout [ 2529.648819] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2529.649914] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2529.651880] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 2529.690955] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2529.691995] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2529.693784] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2530.832415] Bluetooth: hci2: command 0x0419 tx timeout 19:09:07 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) keyctl$set_reqkey_keyring(0xe, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:09:07 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040), 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:09:07 executing program 4: r0 = creat(&(0x7f00000000c0)='./file2\x00', 0x0) fcntl$setlease(r0, 0x400, 0x1) fcntl$setown(r0, 0x8, 0xffffffffffffffff) creat(&(0x7f0000000000)='./file2\x00', 0x0) r1 = epoll_create1(0x0) fremovexattr(r1, &(0x7f0000000040)=@random={'trusted.', '\x00'}) 19:09:07 executing program 0: ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x94, 0x1, 0xf6, 0x0, 0x0, 0x8001, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x89040, 0x3, 0x0, 0x9, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002c80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000018800)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000015d40)=ANY=[@ANYBLOB="20001a00000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x20}}], 0x2, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000001880)=ANY=[@ANYBLOB="a0000000000007280001800c00028005000100840000000c00028005000100880000000c000280050001002f00000008000440000000090c0001800600034000000000000003ff0c0002800500010021000000060013400003000006000340000200000c00028005000100010000000600034000010000140001800800010000000000080002000a01010208000440fffffffd5cf03c6fba1e96bac815b838796a78636b26bde7b1b4ba1842ed1ce6"], 0xa0}, 0x1, 0x0, 0x0, 0x8810}, 0x0) r1 = getpid() epoll_create(0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x3ff, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x100, 0x2}, 0xe) sendmsg$NL80211_CMD_PROBE_CLIENT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x5c, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0x4208, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB], 0x94) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) 19:09:07 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:09:07 executing program 2: perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:09:07 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) ioctl$BTRFS_IOC_QGROUP_CREATE(r0, 0x4010942a, &(0x7f0000000080)={0x0, 0x7fffffff}) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r1) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ADD_IFACE(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000002100000009001f00706879310000000005002000010000000c000500000000000020f481"], 0x34}}, 0x0) syz_genetlink_get_family_id$ieee802154(&(0x7f00000000c0), r3) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:09:07 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0xfffb}, 0xe) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed, 0x3}, 0xe) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x401}}, './file0\x00'}) dup(r1) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000100)={[0x9]}, 0x8, 0x80000) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) getpeername(r0, 0x0, &(0x7f00000000c0)) 19:09:07 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @any, 0xfffb}, 0xe) connect$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x0, @any, 0x3}, 0xe) getpeername(r0, 0x0, &(0x7f00000000c0)) 19:09:07 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r0) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000140)='\x00', r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendfile(0xffffffffffffffff, r2, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:09:07 executing program 1: r0 = gettid() r1 = pidfd_open(r0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x402, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xf}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7de7dea2}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) readv(r1, &(0x7f0000000640)=[{&(0x7f0000000180)}, {&(0x7f00000001c0)=""/33, 0x21}, {&(0x7f00000002c0)=""/186, 0xba}, {&(0x7f0000000380)=""/180, 0xb4}, {&(0x7f0000000200)=""/17, 0x11}, {&(0x7f0000000500)=""/107, 0x6b}, {&(0x7f0000000580)=""/178, 0xb2}], 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x10081, 0x0) bind$packet(r2, &(0x7f0000000140)={0x11, 0xd, 0x0, 0x1, 0x7f, 0x6, @random="ddf753c5bcb8"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:09:07 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040), 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:09:07 executing program 0: ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x94, 0x1, 0xf6, 0x0, 0x0, 0x8001, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x89040, 0x3, 0x0, 0x9, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002c80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000018800)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000015d40)=ANY=[@ANYBLOB="20001a00000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x20}}], 0x2, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000001880)=ANY=[@ANYBLOB="a0000000000007280001800c00028005000100840000000c00028005000100880000000c000280050001002f00000008000440000000090c0001800600034000000000000003ff0c0002800500010021000000060013400003000006000340000200000c00028005000100010000000600034000010000140001800800010000000000080002000a01010208000440fffffffd5cf03c6fba1e96bac815b838796a78636b26bde7b1b4ba1842ed1ce6"], 0xa0}, 0x1, 0x0, 0x0, 0x8810}, 0x0) r1 = getpid() epoll_create(0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x3ff, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x100, 0x2}, 0xe) sendmsg$NL80211_CMD_PROBE_CLIENT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x5c, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0x4208, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f6600006530202ab02020205ed92d2b2426282b2d5d205c202b23402b219b2e7d2d203a202f6465762f6c6f6f702d636f6e74726f6c00202662200a049a69a2c25fc047d9"], 0x94) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) 19:09:07 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:09:07 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:09:07 executing program 2: perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:09:07 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:09:07 executing program 5: perf_event_open(&(0x7f0000000480)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x100, 0xfffffffffffffffd, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) dup2(r2, 0xffffffffffffffff) pidfd_getfd(r2, r1, 0x0) mknodat(r2, &(0x7f0000000080)='./file0\x00', 0x400, 0x20) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 2546.256388] Bluetooth: hci2: command 0x0405 tx timeout 19:09:22 executing program 0: ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x94, 0x1, 0xf6, 0x0, 0x0, 0x8001, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x89040, 0x3, 0x0, 0x9, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002c80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000018800)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000015d40)=ANY=[@ANYBLOB="20001a00000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x20}}], 0x2, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000001880)=ANY=[@ANYBLOB="a0000000000007280001800c00028005000100840000000c00028005000100880000000c000280050001002f00000008000440000000090c0001800600034000000000000003ff0c0002800500010021000000060013400003000006000340000200000c00028005000100010000000600034000010000140001800800010000000000080002000a01010208000440fffffffd5cf03c6fba1e96bac815b838796a78636b26bde7b1b4ba1842ed1ce6"], 0xa0}, 0x1, 0x0, 0x0, 0x8810}, 0x0) r1 = getpid() epoll_create(0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x3ff, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x100, 0x2}, 0xe) sendmsg$NL80211_CMD_PROBE_CLIENT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x5c, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0x4208, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f6600006530202ab02020205ed92d2b2426282b2d5d205c202b23402b219b2e7d2d203a202f6465762f6c6f6f702d636f6e74726f6c00202662200a049a69a2c25fc047d9"], 0x94) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) 19:09:22 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @any, 0xfffb}, 0xe) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x3}, 0xe) getpeername(r0, 0x0, &(0x7f00000000c0)) r1 = syz_io_uring_complete(0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'wlan1\x00'}) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000000040), &(0x7f0000000100)=0xc) 19:09:22 executing program 4: r0 = creat(&(0x7f00000000c0)='./file2\x00', 0x0) fcntl$setlease(r0, 0x400, 0x1) fcntl$setown(r0, 0x8, 0xffffffffffffffff) creat(&(0x7f0000000040)='./file2\x00', 0x0) mount$bind(&(0x7f0000000080)='./file2\x00', &(0x7f0000000100)='./file2\x00', &(0x7f0000000140), 0x80, 0x0) creat(&(0x7f0000000000)='./file2\x00', 0x0) 19:09:22 executing program 2: perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:09:22 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x6, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x5916, 0x7}, 0x95cd469b4b581ea7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000280)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xba\x8a\xff\xff\xff\xff\xff\xffv\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\x01\xdc\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x1003f, 0x4) keyctl$set_reqkey_keyring(0xe, 0x2) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) syncfs(r0) io_uring_enter(0xffffffffffffffff, 0x58af, 0x0, 0x2, 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_DEL_MFC(r1, 0x29, 0xcd, &(0x7f00000001c0)={{0xa, 0x4e22, 0x81, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7}, {0xa, 0x4e24, 0xffffff9b, @ipv4={'\x00', '\xff\xff', @local}, 0x6225}, 0x4, [0x2, 0xfffffff8, 0x3, 0x1, 0x9, 0x3ff, 0x8001, 0x5d]}, 0x5c) 19:09:22 executing program 6: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) perf_event_open(&(0x7f0000000680)={0x2, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000580), 0xe}, 0x10090, 0x0, 0xfffffffc, 0x0, 0xfffffffffffffffe, 0xfffffffe, 0x0, 0x0, 0xffffffff}, 0x0, 0x4, r1, 0x0) r2 = syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r4, 0xc018937b, &(0x7f0000000800)=ANY=[@ANYBLOB="01000000819bf0fa5c7a53749108e127873bd9c89b9c0d4f4449f9b1df702b144de1f2cedfd8f7bd5c3cb75c47aa48aa28de74d767a22c9b4f0f470ee278209224d51383711dbb117d4a91e3233844d44131a436f6347a5e6736551475e84616bd1e5d4ccf9fe04671fa66b1eb262a1c12aeb3c5544355743db6d852d818e0633bc0eb0c9f613a62e047934b63d804b1221e3c4945f5a6e13034fb23dd2dd864b0e4b208b148f3e8d59ea6a662760c9c279c5f31dd62e76c7bf6ee", @ANYRES32=r2, @ANYRES32=0xffffffffffffffff, @ANYRESHEX, @ANYRESOCT]) ioctl$EXT4_IOC_GROUP_EXTEND(r5, 0x40086607, &(0x7f0000000080)=0xc0) fsetxattr$security_ima(r1, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="0436a730000000e3e2d9ff14b43e0b735a4fdf810709e56db90174406e013e1e1fd0d7e137949b1e6fa8e511babf52bfb909c632d8a376a23ef184a0ecd1ff8ab8ca9f8f7c52b1a5c54ca4b243ce9ce461e4ec19c12252be6a9323bf8389475a501c0185959f58d4feec2654a5b4017058ab8ccc7ceca96fef95994e9e13a40c2ecb33d30d110965811726af312a8d3e00"/155], 0x3, 0x0) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$nfs(&(0x7f0000000240), &(0x7f00000002c0)='./file0/../file0\x00', 0x0, 0x3, &(0x7f0000000500)=[{&(0x7f0000000300)="b09456e1cc1abe3be01b5ab628f4f34a9a6cc65a92f9877ae3771e21d09c820335483bdc14c4696a6b7661a1c0cd40bf760bbd9d7976fb11c6db4c32f90d212b2447c78c0bb70e2341b9135a36e3d037b1", 0x51, 0xffffffffffffffff}, {&(0x7f00000003c0)="734392bf111e34ad89833539b8bc9d0c90f5905727c06cb62a77178037bdf869a9e9f9cf93423b1c6c08e00a09fffd1739e62303500b707c15a15ce9cff7d35d67b8f1929ea5dbb86e30efc44374d16ea8b43e80ec4d305a95b6b85adc47c8abfc", 0x61, 0x42}, {&(0x7f0000000440)="ffdd14b2d545b969616d54fa413948ca8c884e05a5e0b29fda45678de5b6ea9b32040cfbe28f87c93cf898c2624a360384a71f96dc79194b8c9cf744da855ca0b5aaf22f51db7f7c1cf4850f245977421e5f993e2c5e97146ac61139caedb63455f06e0ac29e00f522a151c2774de3ac62b0621adbe8f1cbca71952a01bd410dbd0731eb96367acfaef362026b898c9311a95951a302f26d1b3d3c6fb59470b3ce9e99d98277d23940f8e92a64207f20951d9407895b748c482f265db1ff0ac5", 0xc0, 0x5}], 0x1001000, &(0x7f0000000900)=ANY=[@ANYBLOB="2dc4000000646e6f2c3970002c5b892c657569643d", @ANYRESDEC=r6, @ANYBLOB="2c61756469742f7d87b3d32c995d46bc261a9b5c9b2c61707072616973696d617369672c0000000000000000003f9d8352b22ce59ef39655517c8a5e295a74175bf4b63322a1207afc4641dc51e6976e93564df6c82c8d97110e7b4ff5b44cdd0a685b9956744c3962da4fcb06b12bcfc08c6dbcc1db8d32b56de89501553015aeb017da71b0f54ccced22c48c4e5ee883b1f2b838"]) setsockopt$inet6_udp_int(r5, 0x11, 0xa, &(0x7f00000005c0)=0x4, 0x4) ioctl$F2FS_IOC_GET_FEATURES(r5, 0x8004f50c, &(0x7f0000000100)) close_range(r7, 0xffffffffffffffff, 0x0) r8 = dup2(r7, r7) ioctl$HIDIOCINITREPORT(r8, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r8, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 19:09:22 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x188318d80, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f00000000c0)={'wpan3\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r1, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:09:22 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:09:22 executing program 1: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58af, 0x0, 0x2, 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000140)=""/18, 0x12, 0x800) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f00000000c0)={r0, 0x3, 0x0, 0x20}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f00007fd000/0x800000)=nil, 0x800000, 0x1000007, 0x80010, r0, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000080)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0xa97a46663c36e1fe, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x8) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:09:22 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000, 0x8002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup3(r0, r0, 0x80000) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r1, 0x6628) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140), 0x2500, 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:09:22 executing program 6: ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x94, 0x1, 0xf6, 0x0, 0x0, 0x8001, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x89040, 0x3, 0x0, 0x9, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002c80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000018800)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000015d40)=ANY=[@ANYBLOB="20001a00000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x20}}], 0x2, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000001880)=ANY=[@ANYBLOB="a0000000000007280001800c00028005000100840000000c00028005000100880000000c000280050001002f00000008000440000000090c0001800600034000000000000003ff0c0002800500010021000000060013400003000006000340000200000c00028005000100010000000600034000010000140001800800010000000000080002000a01010208000440fffffffd5cf03c6fba1e96bac815b838796a78636b26bde7b1b4ba1842ed1ce6"], 0xa0}, 0x1, 0x0, 0x0, 0x8810}, 0x0) r1 = getpid() epoll_create(0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x3ff, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x100, 0x2}, 0xe) sendmsg$NL80211_CMD_PROBE_CLIENT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x5c, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0x4208, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f6600006530202ab02020205ed92d2b2426282b2d5d205c202b23402b219b2e7d2d203a202f6465762f6c6f6f702d636f6e74726f6c00202662200a049a69a2c25fc047d9"], 0x94) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) 19:09:22 executing program 2: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:09:22 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:09:22 executing program 0: ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x94, 0x1, 0xf6, 0x0, 0x0, 0x8001, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x89040, 0x3, 0x0, 0x9, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002c80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000018800)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000015d40)=ANY=[@ANYBLOB="20001a00000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x20}}], 0x2, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000001880)=ANY=[@ANYBLOB="a0000000000007280001800c00028005000100840000000c00028005000100880000000c000280050001002f00000008000440000000090c0001800600034000000000000003ff0c0002800500010021000000060013400003000006000340000200000c00028005000100010000000600034000010000140001800800010000000000080002000a01010208000440fffffffd5cf03c6fba1e96bac815b838796a78636b26bde7b1b4ba1842ed1ce6"], 0xa0}, 0x1, 0x0, 0x0, 0x8810}, 0x0) r1 = getpid() epoll_create(0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x3ff, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x100, 0x2}, 0xe) sendmsg$NL80211_CMD_PROBE_CLIENT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x5c, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0x4208, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f6600006530202ab02020205ed92d2b2426282b2d5d205c202b23402b219b2e7d2d203a202f6465762f6c6f6f702d636f6e74726f6c00202662200a049a69a2c25fc047d9"], 0x94) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) 19:09:22 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r2, 0x0, 0x500000001) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ADD_IFACE(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16, @ANYBLOB="010000000000000000002100000009001f00706879310000000005002000010000000c000500000000000000f481", @ANYRES32=r1], 0x34}}, 0x0) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x40, r3, 0x1, 0x70bd2a, 0x25dfdbfc, {}, [@IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0202}}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x8040081) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:09:22 executing program 2: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 2561.234472] Bluetooth: hci2: command 0x0405 tx timeout 19:09:42 executing program 6: ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x94, 0x1, 0xf6, 0x0, 0x0, 0x8001, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x89040, 0x3, 0x0, 0x9, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002c80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000018800)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000015d40)=ANY=[@ANYBLOB="20001a00000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x20}}], 0x2, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000001880)=ANY=[@ANYBLOB="a0000000000007280001800c00028005000100840000000c00028005000100880000000c000280050001002f00000008000440000000090c0001800600034000000000000003ff0c0002800500010021000000060013400003000006000340000200000c00028005000100010000000600034000010000140001800800010000000000080002000a01010208000440fffffffd5cf03c6fba1e96bac815b838796a78636b26bde7b1b4ba1842ed1ce6"], 0xa0}, 0x1, 0x0, 0x0, 0x8810}, 0x0) r1 = getpid() epoll_create(0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x3ff, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x100, 0x2}, 0xe) sendmsg$NL80211_CMD_PROBE_CLIENT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x5c, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0x4208, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f6600006530202ab02020205ed92d2b2426282b2d5d205c202b23402b219b2e7d2d203a202f6465762f6c6f6f702d636f6e74726f6c00202662200a049a69a2c25fc047d9"], 0x94) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) 19:09:42 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @none, 0xfffb}, 0xe) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed, 0x3}, 0xe) getpeername(r0, 0x0, &(0x7f00000000c0)) 19:09:42 executing program 4: r0 = creat(&(0x7f0000000080)='./file2\x00', 0x1b8) fcntl$setlease(r0, 0x400, 0x1) fcntl$setown(r0, 0x8, 0xffffffffffffffff) creat(&(0x7f0000000040)='./file2\x00', 0x0) creat(&(0x7f0000000000)='./file2\x00', 0x0) 19:09:42 executing program 0: ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x94, 0x1, 0xf6, 0x0, 0x0, 0x8001, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x89040, 0x3, 0x0, 0x9, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002c80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000018800)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000015d40)=ANY=[@ANYBLOB="20001a00000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x20}}], 0x2, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000001880)=ANY=[@ANYBLOB="a0000000000007280001800c00028005000100840000000c00028005000100880000000c000280050001002f00000008000440000000090c0001800600034000000000000003ff0c0002800500010021000000060013400003000006000340000200000c00028005000100010000000600034000010000140001800800010000000000080002000a01010208000440fffffffd5cf03c6fba1e96bac815b838796a78636b26bde7b1b4ba1842ed1ce6"], 0xa0}, 0x1, 0x0, 0x0, 0x8810}, 0x0) r1 = getpid() epoll_create(0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x3ff, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x100, 0x2}, 0xe) sendmsg$NL80211_CMD_PROBE_CLIENT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x5c, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0x4208, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f6600006530202ab02020205ed92d2b2426282b2d5d205c202b23402b219b2e7d2d203a202f6465762f6c6f6f702d636f6e74726f6c00202662200a049a69a2c25fc047d986535a476e28d697f6a490d03c29af6c2e04a0c8ed8b1fff9cfe88dd19236b37e38df7a856"], 0x94) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) 19:09:42 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000080)='id_legacy\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b2\x10\x10\x9do\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80\a\x00\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cXF\x991.', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:09:42 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:09:42 executing program 2: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:09:42 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4305, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffbf, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9f0000000e0356469101dd94d34fa2f45b568fb8003660512237e29c4baf1ccaeba5b977c8842ad98aa7455a205aaa84eb6968bb92b6987218f048021f22023a987ac9c8937fce1d9acdc328aa5b1860817583d51949be46db5a8639356004130c3aa345e62de6a9e658975331eac0b6f533533f896532ce5a39dd6ab57ee710c3fbdb2f14289dcc5bb8dab5c776", @ANYRES16=r1, @ANYBLOB="010000000000000000002100000009001f00706879310000000005002000010000000c000500000000000000f481"], 0x34}}, 0x0) sendmsg$NLBL_CALIPSO_C_REMOVE(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x3c, 0x0, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8000}, 0x84) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:09:42 executing program 6: ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x94, 0x1, 0xf6, 0x0, 0x0, 0x8001, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x89040, 0x3, 0x0, 0x9, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002c80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000018800)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000015d40)=ANY=[@ANYBLOB="20001a00000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x20}}], 0x2, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000001880)=ANY=[@ANYBLOB="a0000000000007280001800c00028005000100840000000c00028005000100880000000c000280050001002f00000008000440000000090c0001800600034000000000000003ff0c0002800500010021000000060013400003000006000340000200000c00028005000100010000000600034000010000140001800800010000000000080002000a01010208000440fffffffd5cf03c6fba1e96bac815b838796a78636b26bde7b1b4ba1842ed1ce6"], 0xa0}, 0x1, 0x0, 0x0, 0x8810}, 0x0) r1 = getpid() epoll_create(0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x3ff, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x100, 0x2}, 0xe) sendmsg$NL80211_CMD_PROBE_CLIENT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x5c, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0x4208, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f6600006530202ab02020205ed92d2b2426282b2d5d205c202b23402b219b2e7d2d203a202f6465762f6c6f6f702d636f6e74726f6c00202662200a049a69a2c25fc047d9"], 0x94) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) 19:09:42 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @any, 0xfffb}, 0xe) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed, 0x3}, 0xe) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000002680)={0x1, 'nr0\x00', {}, 0x2}) getpeername(r0, 0x0, &(0x7f00000000c0)) sendmmsg(r0, &(0x7f0000003c80)=[{{&(0x7f0000000100)=@can, 0x80, &(0x7f0000001440)=[{&(0x7f0000000180)="828a9b006166e9bac15640e5bd1f2831980c311997827455249d75427fbad3678ca3ee7a27addd75bd3645cd7db14552a4b4fa781b4b921aa1d9e06164b860fb3ad0e04c4ca1ca5d09afbc48a4e305905d25b28b9065f3d9fbc0b1956051990feb52b6143caaa78d04d7eb8f3dd0f7591a322a21", 0x74}, {&(0x7f0000000200)="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", 0x1000}, {&(0x7f0000000040)="7abaad04c9ecfe054657aab078f12b7ff4b3613020aa5272e3b7d80ed8af30", 0x1f}, {&(0x7f0000001200)="09b056c332ca7ecab630b2b1c123b57bb6ee67ef65fcac64026cb01abb5abf75dc5c14669a41a0bcafe9544707792622b547828e3206bfd8144ad189a7cd89b1824dcb7d39fe764570e80debb44970ad3ad6c1bced328273abeec77ef385a102607ba274fb2e9a71cc05", 0x6a}, {&(0x7f0000001280)="adca6254efc19bf29b820649d0e48be74ec8fe3bddf46aa638a9e6f208b561981d074f62f903cc4bf9be00a943801f0cfc7814510cdc", 0x36}, {&(0x7f00000012c0)="d30228d5a34d51063f98f6e93d71acc8756359527acea1bd970992014a7d355c124cfca4f270486195de2c5749e54703b666d436b8fa81739caad25712ae90cb79995c282f003e9c32ab470c783d2a97642ce9418319f6c446b85ec26cb42b2d9ec6f917ed424b9703f4a03e54", 0x6d}, {&(0x7f0000001340)="b0b9e9ccbd585c48e960f669d1d513de624dc32801e3c8e1ac140d0e33223fb3e8275829cad51da0d2ca4dc2e42c67bdf09e37d6e38875fd3b30bcac84b0473bc21f1292654902e58bc497e4426b7eba297e84b16dc87bde88a62b32a4ebf929c345ac47fd1730655368290fe1abd5e922231fa7c3531d968448750cd7c28eb46521eb811cf4e03a3a065cc58494c3fe5073c361d2926d48fdf9802c933c19a7d0424e962ee8fb564d6ccc2c73a4ef3e976883740db91c09b492b26e5855a1e74e5019a0d9c7e7063ac20376974f04ea4d51f040b207ead24b43858f0b61d205388f71f2de7172af626acb4a", 0xec}], 0x7, &(0x7f00000014c0)=[{0x108, 0x3a, 0x43, "57f4388ed630210ea8ac1333fbdbd99bba4cd8d5d1e4e6a234388d39b6f21571159f3fe0e2e270f9e866d902439b5919d6fa3227850b93d7d11bf554115434fa6e6d369e4b74c9ad10851362f56844e1126fb67ac505784fc544276db76041b2ffd3a7672b1f2beb35cb29233b54650240993f2d9ae6732f018f0491568709b0ab9e13b194c2366df0316b21a6480695408911c105fad60af96dd13d50e875dd1d8171c64572fc628ae0c5180f4a5e7422a08f6ab4199d471e966496c5b9a25b8dc865407145e13967fff408e508ef70a6d9ff8e4bce4058ce0172e5ee569dbb0643e348c2ebf7947160bf0463e79c5062bacfcea60861"}, {0x18, 0x114, 0x1bb, "1b24f6"}, {0xe8, 0x102, 0x4, "2a94a1222cc60019f475c8d90731e5a094db8c37b91d5b2eb901d561c56d84c4300a5a7b3f9829e9a47535eee266911424c98bb2f5d45aea11b99acab3f6672298643c116de09a52d1aa65e9088335d74da22b7fef450c1ea16f571857ab84d4e786ca79e353ed18940acf5061733662d8f215c13e9df9d6ada56421d5cb94d706d1a133f90d5079a7695cd604b219f0d04c84250d6970436fb6c815805a1f89002cf0c4f7add0535ca4a1b57690180e9ab92ef9c6e44536c7c9ea2ee3b23c399d4f62946489fdba1c8b8c2d7dfc476867b3f46cb9"}, {0x18, 0x88, 0x18, "e19936af5866"}, {0xb0, 0x7dee79ce3938d29a, 0x6, "d3769fe856f793fd3b86c51e1486c7aeab49006c9e9903fd42471a3cbcaa60987611e2f13ccca0c800faaf8bdd7dc934a47f29dd27f9cf63188c4c19e65479e5963542e9ec32779b5c54d8a0ba2dc431a2dd942f7a4c7102fd1262a2c20beb9fb16f945e1f168cae85cc853f85c2cf0ead1f861121237d9a5758616d896d4ac3b5c9693a73cbb9c61bd7a62969386e68895efea89810b8ee2bbffa981c43"}], 0x2d0}}, {{&(0x7f00000017c0)=@ll={0x11, 0x15, 0x0, 0x1, 0x8, 0x6, @remote}, 0x80, &(0x7f0000001a00)=[{&(0x7f0000001840)="ae97b027170ac87f2dc7f12c4b1bb02c79f97698f906b8b729573b349fa228c77449c81d50f3de8f5050ea3111990255bb69dcc3d393c3bd85582a6caecb77b22f4600329595d2d0e4b2614c54969939392c1cdd5260d08a69730988903c30758df8930040687aa24e2dee1d8ee1a50698f805284f0aac62835f26c2e0234a0ace13adef504c46e3c1ac7d666a2072995a8e677c73e969490e48b43d3da34f0172a7130e9c32f4c3e9cf9aa6f8b925be72af68a81c9eaa04e015345292c124202f80234ea68c716b6363e93956402e7d51379c", 0xd3}, {&(0x7f0000001940)="da0e317acd0f44a8d39cb45e3c50c6898ffa4d93311510f37df2facaa8c689ae8f8365d12fb2", 0x26}, {&(0x7f0000001980)="7b5c640e4186d924edef70729615414281f15006083f6eb54c54154ebba52e6f9d450d0446e85a7aee19024a51f5de3f219e21ef2c3f25bf726756228c650ba653cf62d2389ad846ddae56", 0x4b}], 0x3, &(0x7f0000001a40)=[{0x100, 0x1, 0x9, "f259e4de51114b43698d95d1bd93c9f0e999032c3881562176ab55c17d2e231ab7dbeb7c51b1f36ba2c1b5839256cd06f4cbea131b2f99e5bfcdb0c0cee403af867ec78e169d1979d99d28966ad8dbb24de7e2bf5426939be2ffad2ed82cb1b8bb7294199a12975329bbb5f782e4d8480b9c57271744ce8ec5e92f7bd3d9830a3aa007e313167e3afde06ac3e8469f7b53f4c8b010f931da4b3711b215f180b6542bef70c6458b3feef5f8dc0a684bb97a231641c31082cad729e13094810c9cf4fb9c8ff9a73765c01c49a86875c9db000f09deb7f618fa296460e5aa705193e857a36048fa8deef80fc9e1e9c55b"}], 0x100}}, {{&(0x7f0000001b40)=@in={0x2, 0x4e23, @empty}, 0x80, &(0x7f0000001e80)=[{&(0x7f0000001bc0)="68ad19ecf7ab068fe37ea6c513d310951dba4a102a6dc178bd63032ecac44b801a41d537cbdaa91e96c0737212710db26b08c61d8debb449260b9d795725198a8c4cf557c2e6a64c1405cee35663b7d39338e014e2ac3653b306b906e8caa9661bc0f16a4f90570929db92ae6e41a75307e861b1a77cb89dec21c0de478d913bcb6bc319073a8ed95cd8971fcc202067cbe61d6e4d338817948c48e637d2b0e98a9ba805edb448334df34a1f4e47e5449f24c69668806a49b29e5da0f8a913509a8f5769d38434a2f9584d30d720f378ff58e5d5e63ad6b4b6f7b876618f4fd70d7bdc192360cab5af87a0b1ab33ff4c", 0xf0}, {&(0x7f0000001cc0)="b9713c7780e9c2b88f6a9754dfceca6d8f0a1c42c1719dc5ed867dfe3fe0d920b00239ee88803385af0481885ce9320806b659dc5ebdcb684a16253e3a9a1c8b272da919cbbcb7afa0b238317f19c22a52839992071888ded613306cf739e2f2a4e97e1a8e42b302962b6c53aa2c781732252df0a0e149d77799b2bb92001fec29eca5b2cdb57e9c", 0x88}, {&(0x7f0000001d80)="5b5e2ff365b2639be75a5ea2a4523414948507b67fde49a11f4ea70d996503cfcfa7e59375330b67ad62b5bd22b2bf1385fdd16d5afc2c81502b32fb22234cff00a0b6333d60a9ffd393046895e085d1f11eecf2b76eaea212fa8b29d4210a5a2b2d18073bf9ec6474d39521bba1bd010ba3cbd62bed13543b15ecc03ab6a22ce95478d0ec4ffefc7c6675e19ec3f7b651ce", 0x92}, {&(0x7f0000001e40)="319f8ce619eb53ce5a6e921a", 0xc}], 0x4, &(0x7f0000001ec0)=[{0xe0, 0x84, 0x8001, "5d896bf311c0fdcf5306c21db013ba68b927913e7cd421ba9811db859999650ea02abdf6699249c9aecbbfc38881b06521d5a452cee94ff00efd0de978156a3b0171647789419fe6a6ad04e577a23be533d5d3d557b80396c3488d29f1af82ea44c766f511f39e17e40e66fb1bfc784d9f20d2fd0e42c4efed345475f0efc9bba363e0c6a857e042bb60686fc30a7d6879a1bdc2d8aa8d838a7906c5a99164f353088917e5e4dc619dc0b5c546dd6d160dbd8ab00cbea83d7b6fd22348a0412ac1f7143575892c757c085fdd08f2"}, {0x48, 0x102, 0x9900, "e088fe877189783e6755cf69462e04d381976c0a06ec5e5a4fdfb5d32fdf723984a57a610a1a4b21524e542eee55a55e413d7e74a56b04"}], 0x128}}, {{&(0x7f0000002000)=@nl=@unspec, 0x80, &(0x7f0000002100)=[{&(0x7f0000002080)="ce5c46bab499a31af7ed10983b81d493150331b9ed6ff52a8574af8b8b206985b00effafa501aec503d0223e798f3193987d97f297eba46d7d3f9a7c4463796c2f8dc87a1fcef25ffc84611c6180003cc9a3e7b3695d899048948c301ffd9644d12e2d", 0x63}], 0x1, &(0x7f0000002140)=[{0x78, 0x104, 0x401, "cfdbf7f8cd85d0e29ca940e65cbc38fa7ac0aaebc4503f5040f7a3d58623c05183fbeeca487fc4bcfb6259187af1019c15730a8e555fc88b227c6b884c7011d1a78b896981f0dad731c58290c705f96abb029a71089af188ba832b5a2c88ff2827bcb59e10"}, {0x70, 0x10f, 0x4, "29f3de16c8fd82c8cebb09465a8e00a68f2321861a3eb3c802837660fffe3e89177141303620895cdd70c3c7197089300e2c6a8f69f6ea8cfeb16273560db98288f055015b240195a5767438df1fa119a2e17e17df5b0ac0ec1e590d82"}], 0xe8}}, {{&(0x7f0000002240)=@ll={0x11, 0x1c, 0x0, 0x1, 0x80, 0x6, @local}, 0x80, &(0x7f0000002600)=[{&(0x7f00000022c0)="f92e3c0599d62fb188dd2754f323915e3afcdec11ec682944eb9e92bd1aef1e8cfdd8b195f6b76575d8eca47653997b42b7ee78121e22241f00ece4f1762ee", 0x3f}, {&(0x7f0000002300)="de69e95257706787b8780de1686064d222f77d5690c891216f13814c53454dfcdf986d5b51071375b26d33e149c3ac3b3fa0898c0d2f7f9a287edb44fe8c256b8e7f2dbcbf20dc07b23fa19a7b71f164b210dd77211e771ab4a3ead4713bfd38a1de51e79bb8c19da458960f47b42fd162617f53736c291f56e51d49d77d11e4e6a8a35017f8fa", 0x87}, {&(0x7f00000023c0)="d1e5395f30bb0384e40ac218c06fe74aa4e111f8317518aff8dd5981ab33ee02d065338af816927d9a4b0030f160804becea4f4292f1106a4f86c6a3aa1b45cb045c45b67a7a02cf1b9c07e99ff7d352d967d21de95b6563722dc531394f68ae2ea2d130615e0e1fb1dd02", 0x6b}, {&(0x7f0000002440)="3337c5a4d414f98ff753b1afab9d61be002e4c9bc40bbb94881b328d390bdac51148c1a26d987f616967c9ac83750d6a2434b5790d32c37de335a489b66e6ce351a96601661aa648", 0x48}, {&(0x7f00000024c0)="e549462af95bd2699f943edd66633254b4df80715f03a00aea1a402dedc60c28586922bb8c8ebe313f3439c720b40d679d58ad8a69282ec11800228b6197e4f146596dd7e522f05726e4c905cb681103cfd9162122763c0ae13add5d7b529d38eb742042b34dfd12a263dac6ec7e5e0986dd0011ce55751d0f19fb8d7c8cf37c998a8a4862a2b1", 0x87}, {&(0x7f0000002580)="ab1f03b4d783c00ff7b2d786d535fa47d2b52cdd752628568a71904cd4aefe6968c35fcf9e4291cedfd41bcd7f8e8aac921c80b81ca16e29f7e5f227e86540b3c296000f21d39aa52d3f12ca6f626bdbbe3af89a21f1623fc2e90219046c5200a8945e22882e4b40d22ff795f5e2a761dc0f4f", 0x73}], 0x6}}, {{0x0, 0x0, &(0x7f0000003a80)=[{&(0x7f0000002680)}, {&(0x7f00000026c0)="e3fdb592988dca0662a9273954f849723458faa8c6bbcf4c85ac2547072ad81082724a7e1350e44362b920fa442a9f100a84848136a6b82268b8a46b223cd75c0f0bdbac5dcb012071ff76d8070063fd3556b20a35944a96cdc2efb51dd36218d785532c410f8c2f14590aeb3af65637d284dd611267cbd046a53f9f9db527ec8565c348cdefde0b46f005b3aa9f48c0fb598b849005ac57289ab809b1394358ba6e5a788db8b1c180e84016f959daf1b6c0f69adddb", 0xb6}, {&(0x7f0000002780)="9c137a12c31e9ee5c114a5a8aefd5267a19f1a58663e14d3b58246b4a66a5fa8993e504984decfcca82155383cc7b5bef94bdeb9bc54f36c3e70e904fac295b5f37d7a2197a6c498b3d7c33b1e6e4821a384d05c306ef05bb711af2190e07bb50e4789f75427960ef864b53c4ed602dabfb8ff0d197299b2ef0bca", 0x7b}, {&(0x7f0000002800)="adf0e62f2e64695e548a18b748ff1adc5dab1e27114f73e63d5d762581f5424b8805ba45a0d263d2cd9dc9948f7098c79f4aad42611421736c02f1c68119081bb5887e7cc578c9b4887706bda581c774326e9e52ca09c5e3e90485874fa964d4cf529f5edd99cc909fe6df239050f916af2701b1da2c28764d39f44cb7f4e055e9adf40882ca4757ed93199abd875c3a194f599c244968383baefebda12134a17aebf12ce77cfb17bf224660a14a687eed1fb791f128cf59", 0xb8}, {&(0x7f00000028c0)="7ad78216b2edde1583bd6e069103f1d5a73349", 0x13}, {&(0x7f0000002900)="2783d25295", 0x5}, {&(0x7f0000002940)="4e4445f343f33a0fb74a9b69c28319d4300e7aa8af31b1b4165b3b869cc2c38a01e9b69eaed770c8641981a102271ddfecb398a0", 0x34}, {0x0}, {&(0x7f0000002980)="30b85e26fa5f40fbecf5c797965e7e778d3224477a29c93b1309be0ebf49ae322df499991bd5072597725b4a40e54c4c6ff44a8bec32f5df4d70d9d2fd4c7e6fa878c1ef17d9bf0dfc88f34b3ae9ddeb120a7507e121f3f4df32e41bab8445cfc87865ddfccac5f599ea59249b8fe47217b6cfad8e404dd38d208ec780106a43b8e04379207f2971717bad25532d81bf8ff83ada7054bda072478a91ff40e86af1a5d687c4bb1219adcbf0a7f6c0a688d8c1422a6b271382248b088f33d833d61e2b7d1649f747c3e870840f589c14a23afde515b38efbf663eaeda24146a2b15664f4cf0098ec89b3542f4f1a91594e55ab840a7a918f3223", 0xf9}, {&(0x7f0000002a80)="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", 0x1000}], 0xa, &(0x7f0000003b40)=[{0x40, 0x103, 0x1, "b8aa077377378919a5f70ffa2a76035ff149525ab0999da08ecab4308981f728fefdb32a991cb6cd2f7486"}, {0x48, 0x29, 0x35, "206aaa3cd4da216d300d6b601192aabca4b5b34a73dcf4db17b4a1cad05c0a513b1b15fa5724e7755e45d916c513f5e78bd1c36e9d"}, {0x80, 0x0, 0x8, "1ed0d60da5cf4631e28c71e0108ed5a559cc0cf01fe2ea76bbdf9f85a282ba59b9170c8924839438435a19973d10e2f30f1a87f0ca1a3d2b6c0678b439c3b53a4416c369bcd4907492c23b6036a74341c543eb86b4cdabd7f8a21722b428f7ee2aacae7452923fff5efef79cded38409"}], 0x108}}], 0x6, 0x48000) 19:09:42 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) openat(r1, &(0x7f0000000080)='./file0\x00', 0x400000, 0x148) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, r0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:09:42 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:09:42 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000400)={&(0x7f00000002c0)={0x10c, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_MLSLVLLST={0xe8, 0x8, 0x0, 0x1, [{0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3c6f636b}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xea}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x36787984}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7a09e430}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7728fc68}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xc4}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x2d}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb7}]}, {0x44, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x5f}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x6f}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x32}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5a31ced3}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x58}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xdf}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x54}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x41}]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x13}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe5}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x74}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x19}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x25b8f463}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2497bbe0}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x38b7880a}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7bb82f8b}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x333d6ae9}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x10c}, 0x1, 0x0, 0x0, 0x20004040}, 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x21, 0x0, 0x1003800, 0x0) keyctl$set_reqkey_keyring(0xe, 0x4) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x10001}}, './file0\x00'}) finit_module(r2, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:09:42 executing program 0: ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x94, 0x1, 0xf6, 0x0, 0x0, 0x8001, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x89040, 0x3, 0x0, 0x9, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002c80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000018800)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000015d40)=ANY=[@ANYBLOB="20001a00000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x20}}], 0x2, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000001880)=ANY=[@ANYBLOB="a0000000000007280001800c00028005000100840000000c00028005000100880000000c000280050001002f00000008000440000000090c0001800600034000000000000003ff0c0002800500010021000000060013400003000006000340000200000c00028005000100010000000600034000010000140001800800010000000000080002000a01010208000440fffffffd5cf03c6fba1e96bac815b838796a78636b26bde7b1b4ba1842ed1ce6"], 0xa0}, 0x1, 0x0, 0x0, 0x8810}, 0x0) r1 = getpid() epoll_create(0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x3ff, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x100, 0x2}, 0xe) sendmsg$NL80211_CMD_PROBE_CLIENT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x5c, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0x4208, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f6600006530202ab02020205ed92d2b2426282b2d5d205c202b23402b219b2e7d2d203a202f6465762f6c6f6f702d636f6e74726f6c00202662200a049a69a2c25fc047d986535a476e28d697f6a490d03c29af6c2e04a0c8ed8b1fff9cfe88dd19236b37e38df7a856"], 0x94) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) 19:09:42 executing program 2: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:09:42 executing program 6: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="2e40060900000065"]) r1 = syz_open_dev$hiddev(&(0x7f0000000000), 0x6, 0x3) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000005, 0x30, r1, 0xfd9ee000) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000140)={{0x3, 0x1f}, 'port1\x00', 0xdc, 0x1082, 0x8000, 0x3, 0x19, 0x40, 0x5, 0x0, 0x4, 0x2}) [ 2581.712381] Bluetooth: hci2: command 0x0405 tx timeout 19:09:57 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:09:57 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r1, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="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"/2148], 0x864) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0xd1) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:09:57 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x200001, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = socket$inet(0x2, 0x1, 0x0) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) perf_event_open(&(0x7f0000001380)={0x0, 0x80, 0x7, 0x7, 0x1, 0xc, 0x0, 0x7, 0x26100, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8, 0x1}, 0x104, 0x9e24, 0x0, 0x4, 0xffff, 0x9, 0x6, 0x0, 0x1}, 0x0, 0x5, 0xffffffffffffffff, 0x8) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10) setsockopt$inet_int(r0, 0x0, 0x22, &(0x7f0000000100), 0x4) connect$inet(r0, &(0x7f0000000140)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0xfffffffffffffffe, 0x4) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$lock(r1, 0x26, &(0x7f0000000180)={0x1, 0x0, 0x0, 0xce5}) fcntl$lock(r1, 0x5, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) sendto$inet(r1, &(0x7f0000000380)="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", 0x1000, 0x40010, &(0x7f0000000080)={0x2, 0x4e23, @private=0xa010102}, 0x10) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x80800, 0x0) sendmsg$NFULNL_MSG_CONFIG(r2, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)=ANY=[@ANYBLOB="30000000010402d6afd3a8b200e5a0458ef703697354573a0200000000000800000cb01f3100000608e904010008100340000000000a0002000000000100cdade9000000"], 0x30}}, 0x4044880) fallocate(r2, 0x78, 0x9, 0xc000) openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0x8080, 0x0) unshare(0x48020200) 19:09:57 executing program 4: r0 = creat(&(0x7f00000000c0)='./file2\x00', 0x0) fcntl$setlease(r0, 0x400, 0x1) fcntl$setown(r0, 0x8, 0xffffffffffffffff) socket$inet(0x2, 0x8000a, 0x1ae7502d) creat(&(0x7f0000000080)='./file2\x00', 0x180) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0x138, 0x1a, 0x1, 0x0, 0x0, {{@in=@broadcast, @in=@private}, {@in6=@private1, 0x0, 0x3c}, @in=@local, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(aes)\x00'}}}]}, 0x138}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_CONNECT={0x10, 0xdde661a22b4a8336, 0x0, r1, 0x80, &(0x7f0000000100)=@l2={0x1f, 0x625, @none, 0x5, 0x2}, 0x0, 0x0, 0x1}, 0x3) creat(&(0x7f0000000000)='./file2\x00', 0x0) 19:09:57 executing program 2: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:09:57 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:09:57 executing program 0: ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x94, 0x1, 0xf6, 0x0, 0x0, 0x8001, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x89040, 0x3, 0x0, 0x9, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002c80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000018800)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000015d40)=ANY=[@ANYBLOB="20001a00000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x20}}], 0x2, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000001880)=ANY=[@ANYBLOB="a0000000000007280001800c00028005000100840000000c00028005000100880000000c000280050001002f00000008000440000000090c0001800600034000000000000003ff0c0002800500010021000000060013400003000006000340000200000c00028005000100010000000600034000010000140001800800010000000000080002000a01010208000440fffffffd5cf03c6fba1e96bac815b838796a78636b26bde7b1b4ba1842ed1ce6"], 0xa0}, 0x1, 0x0, 0x0, 0x8810}, 0x0) r1 = getpid() epoll_create(0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x3ff, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x100, 0x2}, 0xe) sendmsg$NL80211_CMD_PROBE_CLIENT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x5c, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0x4208, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f6600006530202ab02020205ed92d2b2426282b2d5d205c202b23402b219b2e7d2d203a202f6465762f6c6f6f702d636f6e74726f6c00202662200a049a69a2c25fc047d986535a476e28d697f6a490d03c29af6c2e04a0c8ed8b1fff9cfe88dd19236b37e38df7a856"], 0x94) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) 19:09:57 executing program 6: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) recvmsg(r0, &(0x7f00000026c0)={0x0, 0x0, 0x0}, 0x40010120) bind$bt_l2cap(r0, &(0x7f0000001c80)={0x1f, 0x0, @any, 0x2, 0x1}, 0xe) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000040)=0x8) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r1, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000800)={{0x7f, 0x45, 0x4c, 0x46, 0x1f, 0x9, 0x0, 0x3, 0xfa3, 0x2, 0x3e, 0x7, 0x138, 0x40, 0x2c4, 0x6, 0x5, 0x38, 0x2, 0x5, 0x200, 0x43}, [{0x6474e551, 0x2, 0x4, 0x7fff, 0x5, 0x8, 0x2, 0xfffffffffffffffd}], "f649e68472e17f29aaa15a830e12cced6525ee22bc081a80ca3d62ada0e110945702df5237827f4e1a33b0573e1a4031abfd30cff773a9e712a52cf65f2e470c301d28899278dfecab5e2894ac47344ef0fb08a17ebeac7774733c8e1cc4c9d32857c6a7d84feffd5a44948733f36310703f6767cfb5f2a839b2903251e6134b9bfd2700bbe95db70f2368b1061d3f088a15ff42369eb1761171cec500d93c2c4190165d62c0f271977061abe4d93cee7aa935133a5cfcdd476eae9d201839b21573e4f1b18ddb3013b41afff7d2660edc87622ee9cbc34e5fda865ecd34ee42f2a5fd8b173653be28733827", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x864) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0x3f, @any, 0x9, 0x1}, 0xe) bind$bt_l2cap(r1, &(0x7f0000000080)={0x1f, 0x40, @none, 0x400, 0x2}, 0xe) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) sendmmsg(r2, &(0x7f0000002440)=[{{&(0x7f0000000240)=@qipcrtr={0x2a, 0xffffffff, 0x1}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000100)="7779cf8e0eb985370271b00d602f82598c81ad43aa5623e4fa261f04d0fabc08d531ada43536c8bc475b5a90923e4075", 0x30}, {&(0x7f00000002c0)="61a2114eb04ef220c13e712df4b5bbf69e9e1a5fa5204f6e0926c2ab1c32b282fb08fcb4", 0x24}, {&(0x7f0000000300)="6466eeecb20e8f6075b8f2946608d3eeb8feb45c22508d69adb1cf96b8e376f2c7fc83369d5a0c10ad96d3683e653e4dd30c6a3493aa778f21ef9a864ba3", 0x3e}, {&(0x7f0000000340)="0638931fcb86583e814ce87588b0c6082ab9f0e1a9bce88882d62dbbe7b99c47666e10eb07439e1bc399c28735ca214add55", 0x32}, {&(0x7f0000000380)="d9e9a1dd4449788571b20ef54ff1f9b9251eea87fd6e87712cd9f56ebfb28294a329d2a529ec53ed707440334b6eb6b7d49e698b8f903fed9450e59792c831f1dcaaf06a4377c10ce3e0a80bfcdfcc96287f1ab31aa5f75e1c58f010fdd5555222666b14", 0x64}, {&(0x7f0000000400)="ccc4542dfd533eb9d82cf1b444af", 0xe}], 0x6, &(0x7f00000004c0)=[{0x70, 0x115, 0x1000, "9e820dfc4e1907423d061e6d5f062f0e86fdc9a0462eac225ee0a42de3d1d79f2347c4aadc908e35b5402da2f2966b75dac6156f3d429ded5ce965f630597f5ae2c10fd1bbf369d1a867ac272c11b0d6601892cd8f84ffe11d9ea5fb0d396482"}], 0x70}}, {{&(0x7f0000000540)=@caif=@dbg={0x25, 0x81, 0x9}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000005c0)="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", 0xfe}, {&(0x7f00000006c0)="b2adace489f7a61fb7b5b28a17ca8c7451851aced847e732caed1b61c3a87f5c9705d5571f2a5657628fe8b69e26f8f8a2a389d1b6e11fdc6f40dbb85cf48f1c3a41d36d3ef302e1414c37fa8377b698e96a2e6d554d387b0600b98024f68b4420e870c575ef15c1569fc8d0304ea267f1addf969b49f06cdb21f18748aa2c8127c095db313dfb76a785799ef7c3e1fbd2c65424a8e6bd2149e6c614f8b6020ab4dfed7acfffe2702727646c99dc309df1170b22463e56882908c0637f5c08fe1db7763052726d0ce0caa61629e4b8c8603233745e", 0xd5}], 0x2, &(0x7f0000001080)=[{0x78, 0x112, 0x2df8, "4708b4c68796a0823fb548286c3b96b2c1e2e40abc93b69db590f3b8154acf73fe90063322159fdb9a716541e36225b79a99b6232a8c502c3ac9b7ee7276b83e3d178b4948fe22d2793a5001d67ebecb528268136649ce31f3877da285a7705bdd2c16"}, {0x80, 0xff, 0x0, "a8c3d1410ae1fccd4aa281d574b6340cd8fa7c077700945b23994340bd0e0dd3087054c283ba72b6a325cbdf14e98ad0a1ebf15ff3c74795708eb41f652adb0da7345596be2bcada346cd60f04c3d10cb655e04da3173048356a73b49f9d2550762bb76be05cb30d39898f1acf86"}, {0x38, 0x18f, 0x2, "3836319725f020e055d51609b3423ee93a6c637babd94b1cd9afd2bb847acc7040ad6565d5"}, {0x10, 0x115, 0x7}, {0x50, 0x112, 0x5f1, "98617cf726353365b8ed5d227c3ff802a3e79fa786615759db1a2cb0ad30b1b5c8909c27bbcbd1009658ef3f8468bd4189019a644e916ad242aa2c3075cc"}], 0x190}}, {{&(0x7f0000001240)=@llc={0x1a, 0x7, 0x0, 0x9, 0x20, 0x3, @random="c09386e5152e"}, 0x80, &(0x7f00000015c0)=[{&(0x7f00000012c0)="e51fe2", 0x3}, {&(0x7f0000001300)="1cf61ecb189fd7c3e364f233c6ac2513a32855ca1ec481b8735c87830acdcf34a200f1641dd15aa7fe484b9a3636d80b63c45dac236ff96ef23f61048d5b54a3d1b06d2cf6b7d5870eeac5654078c27f24833d872cf70b7d65cf5ba34bfad7b0e33b2a8e4b", 0x65}, {&(0x7f0000001380)="bb14676e939b97a55af3ccd9ebaf15043d5e154a39cc2331e2eea788bd8f2fab5dba7c64484608a56649837eebf785c4bf91d71d517f86b8b092637e46967e346d5688a5d2c4ce28c89268ddba6c48d2dbfbc08628bd6e720b543fc788e2e842bf2e0c34479f0db5c71b0840803e4ac3d189281c93248f36ed0983d714a9e8b890b260c775ad976cd11eccb5f14c98ad15da73", 0x93}, {&(0x7f0000001440)="a71cea", 0x3}, {&(0x7f0000001480)="4ff7ac156c47bc235cfa3a1cad1a19f14553", 0x12}, {&(0x7f00000014c0)="6223be854915387aecf786bea541243d1acce26137e4a4f709464f1da19bc415a60c1cdc4118d4d8ad67de8297252d7bca3add0c055ce9fff44ab06cb3c6e25b165b1a27c3333536c7a9096641e1964d07ba4d033ec11e4553c9dfadb181aca16248bd0452c7617f8f60a3e9ef73e710f4b4f698dce4537918591b3d5d2c54fcd4e534d028a2bbb3a0d21399bb7ebd851aec6519df713a9b93", 0x99}, {&(0x7f0000001580)="1abcb66a9eeead95f2a523fdde9c1c20f955823f3f766c6073da4821dd0fc442545228ef2493e215", 0x28}], 0x7, &(0x7f0000002700)=[{0x1010, 0x103, 0x20000, "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"}, {0x40, 0x114, 0x9, "b951f176f80b55a50667a03b0a74cf0bb601ebf19d3c9ebbeb72dc725dcc94dece9bd31bd169102ac5d553"}, {0x78, 0x114, 0x5, "e6302d5e9548f957b64461b34aa0a6aa53c09ff2a060d83f64e013772d0c5bb2b8518acd693bdd8e50932bd847f7bd9c6b580c74d606fc4080bf9aaca7d7550eddc204faebba63fe13be5b756ca970b40fc2c2b809e64ece2ea3268f1e76f6f43cd6aa4732f7f0"}, {0x70, 0x104, 0x6, "05819c6911030a6a93cb46d969306983a5415c283d17fa286669674349138a89cf4173d8f56878bae8a1adb50bf242429d004364cc4a4e64c672baa7cad6b02481c6ccdcde10aaa81b415615656b6de737de5c093a9c170f7000fba61a888b"}], 0x1138}}, {{&(0x7f0000001640)=@sco={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0x80, &(0x7f0000001880)=[{&(0x7f00000016c0)="2854990635f7f5cb5a1f33ad9fefac08460fde5fb6071cd27743b30852d9c7e408fa04acad69050819ca238a4c0ab316e11ae7d731cb221024e0a9af5e1fbad532b10a1c2b7a2fe19dd2b056e557a3a0ac4b906359a2795c1c336894a7339d40ea2604c22d5fcba83e779ca037aafd668144600bc9d2ffc828827fb9e433540b3080079b6114b4e6dda99420e029f0b473685b3be0acdb69ffad67696af3a055f53dd6790e3cbfeb9275700c00094a5be741318bade91159f792d1e30a76f51e96d20ea820a2cd07add514515dca00a53c0e16a41590bd6785ddfff6ac6293431e0f50afb00439f5a2a577680fabe91897bc6d1fdd81", 0xf6}, {&(0x7f00000017c0)="e2444aa1ef30fd", 0x7}, {&(0x7f0000001800)="c7ace6c471ee2540549fda7d9cd6edcc", 0x10}, {&(0x7f0000001840)="8af3fa7496abfc", 0x7}, {&(0x7f0000003840)="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", 0x1000}], 0x5, &(0x7f0000001900)=[{0xc0, 0x104, 0x56bd, "aecbf6afe0002ddb4c02b0c85b2c7d10c6df207c3e9a9445351dbd2fbf1c09e17c1dc580b1503424659a8aef526e60bd627e8bc07e74b3edcacc1da05ca231988ef19a2c3f6dc15fd354d30e0db81066304d8c08d8f811829c309819d7a3e0de32c3f2dd0477423677e0df93b3ed77e9b3eccce17380a0e01efee81ba1afb5b6767366606bdce8fc5a6dd74c0435877dd9f1410529c7e0e8de3360fdbf73361c4866a05adb562d02858f197e3b7372"}, {0x38, 0x104, 0x3, "85835a081df76eb977cbe2551a510062d59752a164307398c96fbe1a3de98fdedd"}, {0xb8, 0x3a, 0x2, "d9ba67d367c06f42ab183ddb751e5a6012d8972f568f699b3ffb1a2c1bf42219c81bd497feff6de3dd43487c848fca9260c8f5731c90b7c056c1429237180aee1df6e6274b514cdb898c7136af097981073e4fe444b58b84b3d5b04a44c1afee1ac73862aa64991c9e708bbac2e6836f543e469cc049afb70350a3e65b9a70d02b53a5daa7d3cd30f4bb75a2dc6a651774913f8f5409d2821c556e92cf005d5fae3be430d0"}], 0x1b0}}, {{&(0x7f0000001ac0)=@llc={0x1a, 0x110, 0x7f, 0x9, 0x0, 0xc0, @random="3153f903dadd"}, 0x80, &(0x7f0000001dc0)=[{&(0x7f0000001b40)="9c01f4c6894d196ad846c0c94d774669774aaca11d19f8726b9915c80cad4bc2fb334ef6bb50ae1a21cb87fad6817c434e2b6537d4d1d146b6ba7e1d81e1e29d1f1ea294b194ecc72be20ebd6763462d26a23a7d279e33fa29eaf56500838bca5b3b35b87e811ed01edba92c727f6012361755169956a4db99ca8896938f81f06c601163ddf11f80efa25b1887094ccc73796ea75825382bd720411c3a7cf7fd307cd21d22cb39f73f3f991f3a85", 0xae}, {&(0x7f0000001c00)="6f8219929e71110ae4816169c67b16af6bc099dbf765038d4dfd9cf1c0a1ea1668a8b6a52adef924f07d12d1105ac1dcd46128aefcedbae0106d92d59570a36682150f24ebf7ad379596a78e3f3efaf24f317bc03bca6dd1a6bbbcf06668aeb214442b", 0x63}, {&(0x7f0000001c80)}, {&(0x7f0000001cc0)="beaa7d394327dcf7ea8cbf1c0213141b4ecc3f8013ab2ed71b4b502827fb1e565205d4c8c3826d160b4e150832cf0629f19b66e7823d78754ca41941ad6b039f55556c32d9697f1532b39ead228e0347e2631f774e6d1f768d351a53197171820b1cc53cef1f2c7400e5f476aa6f58792b529feec526c926c7e5ca9e60622c08e0378da563addf4b109dfde88ed46ad33a6e382f9e11c64c506a1c22381dd4828716a3c94f4bf52b64f53623563167cc26139982d16a34a552e8e42c43408c1abf344cfb39", 0xc5}], 0x4, &(0x7f0000001e00)=[{0xd8, 0x108, 0x9, "5792c049dba40dc4d313960a58519c2755bb18dff8a4c9b1d06d9aaeb188387c0329b00f2645f50b239409fa618c1b5e985acb80234353d37f473dafc9733351797e97a3d617dc1b5cd9a0704f0e62f2a2b6a729ffde28b26fef5204815fb544b7c6e219a2663a1680690135a9e4e8941137951e3f6d3cd6f233ab86b1c369a2ccb29c51b32cb650cc97208d27190fee116a3a4aa06e6c4886c96e3b3cf97de29d417f3e4b92acd5b6c6bd602ad697ac34828be5456cba7879b7668c443ac5479bd4d28a4f1ac838"}, {0x110, 0x112, 0xb9b7, "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"}, {0xd0, 0x117, 0x0, "e6ffa0c357b241311970da311f2305ab64d9049a7436852407fb63303774f64a5769274302a868413d63922ad3ce3a66d83bc31fc0eca146a7f8adfffaf93f07f160be5d4f0be260563d1618dd52c82ae059d108149ffc5a46a8b470f37fa573e671ba45832514e97305cccfc4fc46c924b107947408575e3837a057f553b3c2ec5c410fde97221d1b1784fc149fae54ecd21de4f7f2a0f352b275c7bebb39164e12d294096d3404e71b5edf058f5b45385ef8c33933c5f9098c865718c17e"}, {0x38, 0x118, 0x3f, "b915500d3ffa430b678805164e15474a6f29acc3b245ec47d3b5178d7b66538e6e602bdf1f"}, {0x80, 0x102, 0x4, "9768020765add32d953c5be516c5f17e56d19aff06ece7ff0e8fd5c1ec8bd288dc22b7e89140e85e56e738b6b6c36f99a739e7fd3257742e00d47785334d86a91d0ba48a34c6aa12010aba95be2c95c1c1e53b2cdcf8c65198f84f1305ddad5242e50418451f235e08cb9e197b83bc92"}, {0xc8, 0x108, 0x100, "b90efca8c8a979ac0ce44dd20dd004fa9934b10929d94146da731e542d2713e3c9d8b48d21aa859edf43f49005431d43cd6fd116003adfa980fc74d788ac947ecefa2ee28e27f38d988705e17478a8e1d4867f557701e06ef1c38423bca4e62ae9d0b0d160e38ec0b7e543ef9c6023fa2a35980e90494d4b5cf38b58abd862e43a3589c0ab02b1fba5494aa9fd1b7208830911a922e82efa449b7b186cc08f0e8f37cc3d68a93a955ce55dfefad756ad8f419993"}, {0x90, 0x114, 0x6, "a317c67a6916d094f6e18fa0fe692d4537a818baf2c5ccac9ef244a234842ed311cc178e29cb9aecc2f76714f0aa91441f4d878362080ac3aaf928f87c02243d827e20c22227b318d6fe981bd61c51ded6b447e4e2cae22e82b5702ca539735377fda8982faa4930caa20437c229378e7e51f9e2b606554c8ade"}, {0x60, 0x1da, 0x9, "9dbe2a28584ca4942cfb0e39d2b0df812c7bd30939ee3caf01a11c45d9bffeafe6e54f7fb4d061de9bdc35908fb2d56ff1f45348a7975f1df1fcf88cafc07d42193b191cf03b10f368837e"}, {0x80, 0x1, 0x8001, "7a0583e18c1f711f34484d1c4ba8a47da0c46e631448ec9df8ff6b465717f20a194c12bf1f14e0f7a634db95f5f0d39f533f2433930245a83f80bdf92a7980cb8781fe199af4c59022e92928d186d3c206f6e9b2971d17a729aa3b4b9a4bac084f0f3032b9e7ad1c255aaa"}], 0x5a8}}], 0x5, 0x4000000) 19:09:57 executing program 6: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) add_key$keyring(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000440)) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000240)={0x0, 0x0}) r3 = add_key$user(&(0x7f00000002c0), 0x0, &(0x7f0000000880), 0x0, 0x0) keyctl$revoke(0x3, r3) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffc, r1, 0x0) r4 = add_key$keyring(&(0x7f0000000740), 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$revoke(0x3, r4) keyctl$chown(0x4, 0x0, 0xee01, 0x0) ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)={0x2, 0x0, @auto=[0x30]}, 0x9, r2) r6 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$search(0xa, r5, &(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz', 0x1}, r6) unshare(0x48020200) 19:09:57 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0x4) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x3c, r1, 0x100, 0x70bd2c, 0x25dfdbfe, {}, [@IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x6}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_SHORT={0x8, 0x2c, 0x7}, @IEEE802154_ATTR_PAN_ID={0x6}, @IEEE802154_ATTR_SHORT_ADDR={0x6}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0xff}]}, 0x3c}, 0x1, 0x0, 0x0, 0x44}, 0x145) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r2, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:09:57 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:09:57 executing program 0: ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x94, 0x1, 0xf6, 0x0, 0x0, 0x8001, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x89040, 0x3, 0x0, 0x9, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002c80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000018800)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000015d40)=ANY=[@ANYBLOB="20001a00000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x20}}], 0x2, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000001880)=ANY=[@ANYBLOB="a0000000000007280001800c00028005000100840000000c00028005000100880000000c000280050001002f00000008000440000000090c0001800600034000000000000003ff0c0002800500010021000000060013400003000006000340000200000c00028005000100010000000600034000010000140001800800010000000000080002000a01010208000440fffffffd5cf03c6fba1e96bac815b838796a78636b26bde7b1b4ba1842ed1ce6"], 0xa0}, 0x1, 0x0, 0x0, 0x8810}, 0x0) r1 = getpid() epoll_create(0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x3ff, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x100, 0x2}, 0xe) sendmsg$NL80211_CMD_PROBE_CLIENT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x5c, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0x4208, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f6600006530202ab02020205ed92d2b2426282b2d5d205c202b23402b219b2e7d2d203a202f6465762f6c6f6f702d636f6e74726f6c00202662200a049a69a2c25fc047d986535a476e28d697f6a490d03c29af6c2e04a0c8ed8b1fff9cfe88dd19236b37e38df7a8563de9e593a88d3a16f8bba32c3f900557f223"], 0x94) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) 19:09:57 executing program 1: shmctl$SHM_STAT(0xffffffffffffffff, 0xd, &(0x7f0000000140)=""/213) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) unshare(0x28020600) r0 = fork() clone3(&(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[r0, r0], 0x2}, 0x58) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x4e, 0x0, 0x910094, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=ANY=[@ANYBLOB="380100001a0001000000000000000000000000000000000000587827c200000000db893cfb000000e304000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fc010000000000000000000000000000000000003c000000ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000048000200636263286165732900"/240], 0x138}}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000080)) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:09:57 executing program 2: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:09:57 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x4000004, 0x7fff, 0x3}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x2) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$IPCTNL_MSG_CT_GET_STATS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x3004a}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x14, 0x5, 0x1, 0x801, 0x0, 0x0, {0x0, 0x0, 0x9}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x20008010}, 0x24000080) quotactl(0x2, &(0x7f00000005c0)='./file0\x00', 0x0, &(0x7f0000000680)="69eb1e6f327054e098d4b672a22e70efc386eec99baaeb24bc9dc28efe8d0c838961f111b4b13283d44f886f943e749abf74baedc04a5553b47861f92ca15074048c41addccf37") ioctl$CDROMEJECT(0xffffffffffffffff, 0x5309) unshare(0x48020200) r0 = syz_io_uring_setup(0x4d4f, &(0x7f0000000240), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000000, 0x13, r0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) io_uring_enter(r0, 0x58af, 0x0, 0x2, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000040)={0x7}) unshare(0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f00000000c0)) r1 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) syz_io_uring_setup(0x7243, &(0x7f0000000600)={0x0, 0x410c, 0x20, 0x2, 0x24, 0x0, r1}, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000ff6000/0x1000)=nil, &(0x7f0000000500), &(0x7f0000000180)) r2 = syz_io_uring_setup(0x4d4f, &(0x7f0000000240), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000000, 0x13, r2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r2, 0x0) io_uring_enter(r2, 0x58af, 0x0, 0x2, 0x0, 0x0) dup2(r1, r2) 19:09:57 executing program 2: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:09:57 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r1, 0x0, 0x500000001) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x50, 0x0, 0x300, 0x70bd2a, 0x25dfdbfd, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x23b}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x4}, @NBD_ATTR_SOCKETS={0xc, 0x7, 0x0, 0x1, [{0x8}]}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x106}]}, 0x50}, 0x1, 0x0, 0x0, 0x10004000}, 0xfbfd1f3feb75c687) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:10:14 executing program 4: r0 = creat(&(0x7f00000000c0)='./file2\x00', 0x0) fcntl$setlease(r0, 0x400, 0x1) fcntl$setown(r0, 0x8, 0xffffffffffffffff) r1 = syz_mount_image$msdos(&(0x7f0000000080), &(0x7f0000000100)='./file2\x00', 0x8001, 0x0, &(0x7f0000000140), 0xcd424, &(0x7f0000000180)={[{@fat=@check_normal}, {@dots}], [{@pcr={'pcr', 0x3d, 0x1e}}]}) openat(r1, &(0x7f00000001c0)='./file2\x00', 0x105403, 0x104) creat(&(0x7f0000000040)='./file2\x00', 0x0) creat(&(0x7f0000000000)='./file2\x00', 0x0) 19:10:14 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:10:14 executing program 6: mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), r0) sendmsg$NL802154_CMD_SET_BACKOFF_EXPONENT(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="020028010000004b76fbdbdf25100000000c00060003000000f5ffffff040011003f000000050010000900b2f0a2e71000400000000500100040000001000000000000aebe4b07b550905ad87f4aefb0affb799d5af75784cbc5d8ebc1"], 0x40}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) r2 = shmget$private(0x0, 0x3000, 0x40, &(0x7f0000ffa000/0x3000)=nil) shmat(r2, &(0x7f0000ffd000/0x3000)=nil, 0x3000) 19:10:14 executing program 0: ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x94, 0x1, 0xf6, 0x0, 0x0, 0x8001, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x89040, 0x3, 0x0, 0x9, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002c80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000018800)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000015d40)=ANY=[@ANYBLOB="20001a00000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x20}}], 0x2, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000001880)=ANY=[@ANYBLOB="a0000000000007280001800c00028005000100840000000c00028005000100880000000c000280050001002f00000008000440000000090c0001800600034000000000000003ff0c0002800500010021000000060013400003000006000340000200000c00028005000100010000000600034000010000140001800800010000000000080002000a01010208000440fffffffd5cf03c6fba1e96bac815b838796a78636b26bde7b1b4ba1842ed1ce6"], 0xa0}, 0x1, 0x0, 0x0, 0x8810}, 0x0) r1 = getpid() epoll_create(0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x3ff, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x100, 0x2}, 0xe) sendmsg$NL80211_CMD_PROBE_CLIENT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x5c, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0x4208, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f6600006530202ab02020205ed92d2b2426282b2d5d205c202b23402b219b2e7d2d203a202f6465762f6c6f6f702d636f6e74726f6c00202662200a049a69a2c25fc047d986535a476e28d697f6a490d03c29af6c2e04a0c8ed8b1fff9cfe88dd19236b37e38df7a8563de9e593a88d3a16f8bba32c3f900557f223"], 0x94) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) 19:10:14 executing program 2: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:10:14 executing program 3: ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x2, "77004a6efdff0000000008002600", 0x0, 0x401}) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) r1 = syz_open_pts(0xffffffffffffffff, 0x208c02) ioctl$KDENABIO(r1, 0x4b36) mq_open(&(0x7f0000000000)='-@\x00\xb7!\xf9Z\xbb,;\x7f\xc0\xa9J\xb3\v\xfb\x84\xaa\xb5\x9a\xa4O\xa8\xb5\xd2\x13/z\v\xae\xfc\xfek*D\xeb{\t\xba>\xe8\xe2\xba\x00\x00\x00\x00\x00\x00\xd0zd\xccD\xf4a\xd8/\x90x\xb5\xd8\x04\x19u\xf9D\xb7Eq\xc1\xcee\xd9\b0\xec\v\xe3\x96\x1f\x80\xe4Nk\xa6\xe1\b\x97,\x8b/\x96\x9b\xdb&\xd1\xe3J\xd5\xaf\xe3\xfc\xde\xbe\xa0\x8b\xeb\xea%\x10eW\xf6\xa0J\xe51\xa4\xfesm\x96\x89\x0f\xea\xa6\xc02\xd4\xb8y\x83L\xc4\x93U\x15\x9b\f\x9b\xc3Z\xff\\\x9d\x83\xe6\xc7fc\xa9n\x8e\aV\xe8\xf9\xf9\xe4\xfb+~\xabu\xf9K\x1d9[\xcd\x9b;=6Q\x80', 0x3, 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000200)=""/230, 0xe6, 0x2) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000300)={'wg2\x00'}) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) r5 = syz_mount_image$nfs4(&(0x7f0000000180), &(0x7f0000000340)='./file0\x00', 0x2, 0x6, &(0x7f00000006c0)=[{&(0x7f0000000380)="9714042c2f44b67c8973eff928d57bca415fc49feadf84de253baae464c175496985221e93b50df5b1f641474c446c9700e55f4fc5e502f83976f105a1f81c2092b7e321ce48ee1a25a5d88c45263eb92e08f02d5ca8d5c7a5c7beb8", 0x5c, 0x1}, {&(0x7f0000000400)="a918a2c13f0e6c00b8c682a186831ac68a77b5f442b85bec4bf05ba4e64aeb72f4d8cd4515599dc0cdfd01c106abcc61f74a151762299df2aac5d71d0cb03a5b75211dc830bef7228c1ad97ecc00d0d3a48267da94a8e518c20dfdd42479ba243222a67e55f75d8a60a65468957c695ce49e1978d958e7edc14e499710b0a4367492f56b397a9f3d37069a57efda213c60a6f43ab539d405d0c01b5e9652c9bec2e46e3201863a68eef99f09512877500c134ee48988a14b858d80f9c78ead9098dea7da624e97125cb15cba7af36bcfe8e5533abe6b1ab74dc67ff47c9bb55c9ad002ca68d57aa3297825883d2e03", 0xef, 0x5}, {&(0x7f0000000500)="508d59e289fd60fcb1de09785c", 0xd, 0x1}, {&(0x7f0000000540)="e560c519", 0x4, 0xff}, {&(0x7f0000000580)}, {&(0x7f00000005c0)="4ca1fd2f0ba88435ce1185646994fd332f4f178778b621edd44b7bfaf4789b957d9c71808ec2351b3fe42b203d089155ca0182c445fc8206cf6a375795ceb956b6ecb6070943128cfdc35583ce6dff563a69665d7289ae2818971afdb218c857d4d5e144991532b5315947faf6ba1e49daa7a5326f661496362bc790257fbe7c15a96d52b27bb9e9415e8eac3e60f340904e1de3a73ec016983a4cef4906f8f38e76bcc9804baa6866c86fd157ea49288a3c886151cc8c55bd572cc4a0125973d76ad0af01217a7f5272af405dbce2", 0xcf, 0xffffffff}], 0x80000, &(0x7f0000000780)=ANY=[@ANYBLOB="2a2c272c776732002c2f6465762f6e65742f74756e002c76657468305f766c616e002c2f6465762f6e65742f74756e002c2d4000b721f95abb2c3b7fc0a94ab30bfb84aab59aa44fa8b5d2132f7a0baefcfe6b2a44eb7b09ba3ee8e2ba000000000000d07a64cc44f461d82f9078b5d8041975f944b74571c1ce65d90830ec0be3961f80e44e6ba6e108972c8b2f969bdb26d1e34ad5afe3fcdebea08bebea25106557f6a04ae531a4fe736d96890feaa6c032d4b879834cc49355159b0c9bc35aff5c9d83e6c76663a96e8e0756e8f9f9e4fb2b7eab75f94b1d395bcd9b3b3d3651802c776732002c6f626a5f747970653d2d4000b721f95abb2c3b7fc0a94ab30bfb84aab59aa44fa8b5d2132f7a0baefcfe6b2a44eb7b09ba3ee8e2ba010000000000d07a64cc44f461d82f9078b5d8041975f944b74571c1ce65d90830ec0be3961f80e44e6ba6e108972c8b2f969bdb26d1e34ad5afe3fcdebea08bebea25106557f6a04ae531a4fe736d96890feaa6c032d4b879834cc49355159b0c9bc35aff5c9d83e6c76663a96e8e0756e8f9f9e4fb2b7eab75f94b1d395bcd9b3b3d3651802c6f626a5f757365723d2c646f6e745f6d6561737572652c686173682c00"]) openat(r5, &(0x7f0000000980)='./file0\x00', 0x268c40, 0x108) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) ioctl$VT_GETMODE(r4, 0x5601, &(0x7f0000000100)) dup3(0xffffffffffffffff, r0, 0x80000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x840}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(r2, r0, 0x0) 19:10:14 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0xfe, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62c9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:10:14 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x28e) clone3(&(0x7f0000001200)={0x208219e00, 0x0, 0x0, 0x0, {0x37}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0xfffffffffffffff8, 0x0, 0x0, 0x80001, 0x0) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r2, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 2611.557491] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 19:10:14 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x490043, 0x0) execveat(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000300)=[&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000180)='dns_resolver\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000200)='\xa1\x00', &(0x7f00000002c0)='\x00'], &(0x7f0000000580)=[&(0x7f0000000340)='$\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='((&\x00', &(0x7f0000000400)='{\xf9\x00', &(0x7f0000000440)='-\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='\x00'], 0x1000) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:10:14 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f00000000c0)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000100)="3181", 0x2}], 0x1}}], 0x1, 0x0) pipe2(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r3 = memfd_create(&(0x7f00000000c0)='-%:\x0e', 0x0) splice(r3, &(0x7f00000007c0), r2, 0x0, 0xde, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e23, 0x4, @remote, 0xf83a}, 0x1c) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) io_pgetevents(0x0, 0x7f, 0x2, &(0x7f0000000080)=[{}, {}], &(0x7f00000001c0)={r4, r5+10000000}, &(0x7f0000000240)={&(0x7f0000000200)={[0x5]}, 0x8}) io_setup(0x80, &(0x7f0000000280)=0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58af, 0x0, 0x2, 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000700)={[0x5]}, 0x8) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r7, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) write$binfmt_elf64(r7, &(0x7f0000000800)=ANY=[@ANYBLOB="7f454c461f090009a30f00000000000002003e000700000038010000000000004000000000000000d6010000000000000600000005003800020005000002030051e57464020000000400000000000000ff3c3b20de077f000000000000050000000000000008000000000000000200000000000000fdfffffffffffffff649e68472e17f29aaa15a830e12cced6525ee22bc081a80ca3d62ada0e110945702df5237827f4e1a33b0573e1a4031abfd30cff773a9e712a52cf65f2e470c301d28899278dfecab5e2894ac47344ef0fb08a17ebeac7774733c8e1cc4c9d32857c6a7d84feffd5a44948733f36310703f6767cfb5f2a839b2903251e6134b9bfd2700bbe95db70f2368b1061d3f088a15ff42369eb1761171cec500d93c2c4190165d62c0f271977061abe4d93cee7aa935133a5cfcdd476eae9d201839b21573e4f1b18ddb3013b41afff7d2660edc87622ee9cbc34e5fda865ecd34ee42f2a5fd8b173653be2873382700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d003333e10d9c173000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e5ad0cb08c9f13398987257bde00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000394e9fba05259e3d00"/2148], 0x864) io_submit(r6, 0x4, &(0x7f00000006c0)=[&(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1, r0, &(0x7f00000002c0)="8204e231202225203287d93bf616cd406c7b44c7276efb47709d8e3f487b7d69f29755ed81af8e2747ad4b915b6c8789f7c1325cbdaa1bbf6cea2cf7bb57f5ed8868b3d727266edf6ec20f3dc3c8d60e68b9c9318a0d634017b9a21e077577c8fdf3836426c3ac2ef0a3fd030b750cc44aade88b9892acc33c1da2ec0ff368bb336bd04e1bc7066cb80dd5a1b99eece48fd2ebd076f700eddeb9e86372a940070c14ee3a0a6595e0ab3d00478e58efd5492c58815d6b3d76b05823dc58c36f83b52f570234194af36c176d", 0xcb, 0xffffffffffffff7f, 0x0, 0x0, r1}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x2, 0x7fff, r0, &(0x7f0000000440)="92b244d4fcd4d87d0bbbd5f4434ddae5f7ee0a8a59b42bc2f03f3596feb3d1ae83d978eedbdf3cae45c6ba69315477f055646323a084482915393ac9dc9df7bfb24693d573e314cdda0f27c764348e1cf3f7c532ee52f65be9a5abd228520314fab707f23fcb60336f284b5e6b570650311d0210d7ed931b6a01ee4033a9530f0a85cf679138e018408d56967a12b4cebec5cbd143f213130b", 0x99, 0xffffffffffff4943, 0x0, 0x6}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x1, 0x8000, r2, &(0x7f0000000540)="528832e13bdf455d865765bca269cf1d3fbd7d91a15ce560859b17d582330c358fceb886d5aff4c9085c86717f7a299d1db3734be1fcf73c1118176c512bd46902e0fb7dc5771f7ca563141aa5c215dce581ac3cb34946b0ba3c56dad46a7bfb1016201b5a3669800f7e03771a2656ae899e475f665517b0a19d2140c25ae31b5ed0af4c4527835d7fa5b13823289b5bb34839d429ea5076552c3434351cdc2725c6a59b2985f58bcae69cce789f194a81757cd263e67f5833caff4191b914f6af3f847274ad14df8d", 0xc9, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x6, 0x2a8f, r2, &(0x7f0000000800)="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", 0x1000, 0x8, 0x0, 0x2, r7}]) socket$inet(0x2, 0x0, 0x0) [ 2611.647555] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 19:10:14 executing program 2: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:10:14 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x5814b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:10:14 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:10:14 executing program 0: ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x94, 0x1, 0xf6, 0x0, 0x0, 0x8001, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x89040, 0x3, 0x0, 0x9, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002c80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000018800)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000015d40)=ANY=[@ANYBLOB="20001a00000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x20}}], 0x2, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000001880)=ANY=[@ANYBLOB="a0000000000007280001800c00028005000100840000000c00028005000100880000000c000280050001002f00000008000440000000090c0001800600034000000000000003ff0c0002800500010021000000060013400003000006000340000200000c00028005000100010000000600034000010000140001800800010000000000080002000a01010208000440fffffffd5cf03c6fba1e96bac815b838796a78636b26bde7b1b4ba1842ed1ce6"], 0xa0}, 0x1, 0x0, 0x0, 0x8810}, 0x0) r1 = getpid() epoll_create(0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x3ff, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x100, 0x2}, 0xe) sendmsg$NL80211_CMD_PROBE_CLIENT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x5c, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0x4208, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f6600006530202ab02020205ed92d2b2426282b2d5d205c202b23402b219b2e7d2d203a202f6465762f6c6f6f702d636f6e74726f6c00202662200a049a69a2c25fc047d986535a476e28d697f6a490d03c29af6c2e04a0c8ed8b1fff9cfe88dd19236b37e38df7a8563de9e593a88d3a16f8bba32c3f900557f223"], 0x94) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) 19:10:14 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0, 0x1890, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:10:14 executing program 3: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_usb_connect$cdc_ecm(0x0, 0x4d, 0x0, 0x0) timer_delete(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000000)={0xc92bfb053a14a5a}, 0x0) readv(0xffffffffffffffff, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) syz_open_procfs(0x0, 0x0) timer_create(0x5, &(0x7f0000000340)={0x0, 0x28, 0x3}, &(0x7f0000000380)) timer_create(0x2, &(0x7f0000000440)={0x0, 0x16}, &(0x7f0000001540)) timer_settime(0x0, 0x1, &(0x7f00000002c0)={{0x77359400}, {0x77359400}}, &(0x7f0000000300)) timer_create(0x4, &(0x7f00000003c0)={0x0, 0xf, 0x1}, &(0x7f0000000400)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x77359400}, {0x77359400}}, &(0x7f0000000240)) timer_settime(0x0, 0x0, &(0x7f00000017c0)={{0x0, 0x3938700}, {0x77359400}}, &(0x7f0000001800)) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140), 0x200800, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x2, 0x1, 0x6, 0x5, 0x0, 0x9, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xc000000, 0x2, @perf_bp={0xfffffffffffffffe, 0x8}, 0x40480, 0x5, 0xe79, 0xc, 0x40, 0xf9, 0x5, 0x0, 0x2b000000, 0x0, 0x6}, 0xffffffffffffffff, 0x400e, r0, 0x2) read(0xffffffffffffffff, &(0x7f0000000080)=""/65, 0x41) timer_create(0x5, &(0x7f0000000040)={0x0, 0x31, 0x0, @thr={&(0x7f0000001580)="71b4659167b8ee07db11fdcf283e2e106e859a3ba86a6ec19c0bd11cd2fad8f7cc1aed376a3c0ec877e2eabcfef05f42e3fbfcd658ccc752e0effcb5b1e7d6429e6a5191de0511809dc58709", &(0x7f0000001640)="43aa6b4583028bfba555ce82e11a2e66fdcddec94a3a2de037258beb768ffb8d545662d888a09fb6db1ef176592fba89ad8b4ada2271578b42038dd4107e36810101e6a79c9321a8fd0bda80a82f796818053b47fcaa99a90f6a0680d4c9b07b23f5026c6ffc34f39857036336ae97747b1c730de9e1b4180a82532d0c8580859a7b87a26c61fa1782b6fcc1fa573977772c3af8079ae27aebce364817ffd15791ee21596347fc508868ee8dc75eeb2f9dfb90f6b786a901dcb10d3874733580d90bfe3fba772eb1232746bb39a302609b417bf1fa4c3b152a6552be1c90afefb30f"}}, &(0x7f0000000280)=0x0) timer_settime(r1, 0x0, &(0x7f0000001740), &(0x7f0000001780)) clone3(&(0x7f00000014c0)={0x40182300, 0x0, 0x0, 0x0, {0x34}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2620.698783] Bluetooth: hci6: command 0x0406 tx timeout 19:10:30 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r1 = request_key(&(0x7f0000000340)='id_legacy\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)=')-{\'/{.!}!+\\%%}\x00', r0) request_key(&(0x7f0000000200)='big_key\x00', &(0x7f00000002c0)={'syz', 0x0}, &(0x7f0000000300)='&][#\xb8^\x00', r1) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = request_key(&(0x7f0000000140)='trusted\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)=')-{\'/{.!}!+\\%%}\x00', 0xfffffffffffffffa) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r3) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r2, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:10:30 executing program 2: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:10:30 executing program 4: r0 = creat(&(0x7f00000000c0)='./file2\x00', 0x0) fcntl$setlease(r0, 0x400, 0x1) fcntl$setown(r0, 0x8, 0xffffffffffffffff) openat(r0, &(0x7f0000000080)='./file2\x00', 0x20440, 0x60) r1 = creat(&(0x7f0000000040)='./file2\x00', 0x0) creat(&(0x7f0000000000)='./file2\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x8, 0xe0, 0x2, 0x58, 0xffffffffffffffe1, 0x3, 0x3, 0x10001, 0x341, 0x40, 0x36a, 0x2, 0x2, 0x38, 0x1, 0x80, 0x1000, 0x101}, [{0x4, 0x3f, 0xd6be, 0x40, 0x4dc000000000, 0x4, 0x1000, 0x167}, {0x7, 0x7, 0x7fff, 0x100000001, 0x528010da, 0x0, 0x3, 0x56}], "395ec1179f2198c94c7043d9ae279b610010", ['\x00', '\x00', '\x00', '\x00']}, 0x4c2) 19:10:30 executing program 3: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:10:30 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) (fail_nth: 1) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:10:30 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="380005e1", @ANYRES16=r1, @ANYBLOB="00012abd7000ffdbdf2501000000240004800500030000000000050003000200000005000300010000000500030005000000"], 0x38}}, 0x20000000) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:10:30 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x5814b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:10:30 executing program 0: ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x94, 0x1, 0xf6, 0x0, 0x0, 0x8001, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x89040, 0x3, 0x0, 0x9, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002c80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000018800)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000015d40)=ANY=[@ANYBLOB="20001a00000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x20}}], 0x2, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000001880)=ANY=[@ANYBLOB="a0000000000007280001800c00028005000100840000000c00028005000100880000000c000280050001002f00000008000440000000090c0001800600034000000000000003ff0c0002800500010021000000060013400003000006000340000200000c00028005000100010000000600034000010000140001800800010000000000080002000a01010208000440fffffffd5cf03c6fba1e96bac815b838796a78636b26bde7b1b4ba1842ed1ce6"], 0xa0}, 0x1, 0x0, 0x0, 0x8810}, 0x0) r1 = getpid() epoll_create(0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x3ff, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x100, 0x2}, 0xe) sendmsg$NL80211_CMD_PROBE_CLIENT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x5c, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0x4208, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f6600006530202ab02020205ed92d2b2426282b2d5d205c202b23402b219b2e7d2d203a202f6465762f6c6f6f702d636f6e74726f6c00202662200a049a69a2c25fc047d986535a476e28d697f6a490d03c29af6c2e04a0c8ed8b1fff9cfe88dd19236b37e38df7a8563de9e593a88d3a16f8bba32c3f900557f22320d46d9fae7fd67af6"], 0x94) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) 19:10:30 executing program 1: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x622a02, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x80000001}) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:10:30 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:10:31 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x5814b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:10:31 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000340)={0x88318d00, 0x0, 0x0, 0x0, {0x800000}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000200)=@secondary) add_key$fscrypt_v1(&(0x7f0000001380), &(0x7f00000013c0)={'fscrypt:', @desc4}, &(0x7f0000001400)={0x0, "bd8defb1704e87ab7098cb03b1be8a4bd32289149f71be2939f542d38d729fb6be9bd9afc6914aa5f95182b032aefece49757d62bb07d711b0aa28cf07a58ba7"}, 0x48, r0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000080)={r0, 0xce, 0x4d}, 0x0, &(0x7f0000000140)="ece4929e4ae2bb013ff607da8ed8e8c6454bf2244506b240e837ce1bacf047646c822dd5974687fe5ebb18dac9325796dbe4e69f4791d65a138c744b8914d6f83b8de7fc12b7e5e69fae753615ea5f1783208b630cf2277c90f1a6b275babb96a8505c4a77a543e01ceb8e76167d8a109ad05af9e3ada02670ac137a6ce852552d534852d232391bf552f94c00c03291e8871d5c161669525c3557ff9bbcbdc708bef193fee07a949bd25a965e5fb6e1208edf7e0e859e0e0da3d0aff9cc7eff7c9db1886c9f798645a173a22707", &(0x7f00000002c0)=""/77) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r1, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:10:31 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@nr_inodes={'nr_inodes', 0x3d, [0x6b]}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000240)=""/249, 0xf9) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x8420, &(0x7f0000000140)={[{@nr_inodes={'nr_inodes', 0x3d, [0x31]}}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x80001, 0xeb0bd951d2aa9cc5) 19:10:31 executing program 0: ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x94, 0x1, 0xf6, 0x0, 0x0, 0x8001, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x89040, 0x3, 0x0, 0x9, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002c80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000018800)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000015d40)=ANY=[@ANYBLOB="20001a00000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x20}}], 0x2, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000001880)=ANY=[@ANYBLOB="a0000000000007280001800c00028005000100840000000c00028005000100880000000c000280050001002f00000008000440000000090c0001800600034000000000000003ff0c0002800500010021000000060013400003000006000340000200000c00028005000100010000000600034000010000140001800800010000000000080002000a01010208000440fffffffd5cf03c6fba1e96bac815b838796a78636b26bde7b1b4ba1842ed1ce6"], 0xa0}, 0x1, 0x0, 0x0, 0x8810}, 0x0) r1 = getpid() epoll_create(0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x3ff, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x100, 0x2}, 0xe) sendmsg$NL80211_CMD_PROBE_CLIENT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x5c, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0x4208, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f6600006530202ab02020205ed92d2b2426282b2d5d205c202b23402b219b2e7d2d203a202f6465762f6c6f6f702d636f6e74726f6c00202662200a049a69a2c25fc047d986535a476e28d697f6a490d03c29af6c2e04a0c8ed8b1fff9cfe88dd19236b37e38df7a8563de9e593a88d3a16f8bba32c3f900557f22320d46d9fae7fd67af6"], 0x94) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) 19:10:31 executing program 2: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 2628.059695] tmpfs: Cannot retroactively limit inodes [ 2628.084019] tmpfs: Cannot retroactively limit inodes [ 2632.921049] Bluetooth: hci6: command 0x0409 tx timeout [ 2634.961162] Bluetooth: hci6: command 0x041b tx timeout [ 2637.008390] Bluetooth: hci6: command 0x040f tx timeout [ 2638.055421] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2638.056624] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2638.059067] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 2638.086801] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2638.088092] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2638.089980] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2639.057417] Bluetooth: hci6: command 0x0419 tx timeout [ 2645.265501] Bluetooth: hci2: command 0x0406 tx timeout 19:10:55 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:10:55 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x5814b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:10:55 executing program 4: r0 = creat(&(0x7f00000000c0)='./file2\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x140000000000}}, './file2\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000140)=ANY=[@ANYBLOB="01000000010000001800000087d043db6b7e3184", @ANYBLOB="8a6e7e095c65b0b8d169c8bfe88518f672af67db8330403401a00fa2d9daab09ac20064418d3e2d4e463bc8d2461f507b6243fd8318e0fedd76fa6f022ee98e8a992a4f43a0f7477e7b54b074130b1c07c39d8dd461e249762c51cea1b5dd51620fa3c", @ANYBLOB="01000000000000002e2f66696c653200"]) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) fcntl$setown(r0, 0x8, 0xffffffffffffffff) creat(&(0x7f0000000040)='./file2\x00', 0x0) creat(&(0x7f0000000000)='./file2\x00', 0x0) 19:10:55 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:10:55 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000200)=@secondary) add_key$fscrypt_v1(&(0x7f0000001380), &(0x7f00000013c0)={'fscrypt:', @desc4}, &(0x7f0000001400)={0x0, "bd8defb1704e87ab7098cb03b1be8a4bd32289149f71be2939f542d38d729fb6be9bd9afc6914aa5f95182b032aefece49757d62bb07d711b0aa28cf07a58ba7"}, 0x48, r0) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:10:55 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REQ_SET_REG(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="000400bb168a78ce900dcd3896ae81ea801966420990eb0ff6c27ab6b6220d8d213ebb4a5c04e33531372d2f34db66fc0700"/61, @ANYRES16, @ANYBLOB="0100000000008f4f96000000001b0000000400cc00243419a100"], 0x20}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0xfc, 0x0, 0x58, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_emit_ethernet(0x3a, &(0x7f0000000300)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0008004600002c0000000000069078ac1e0001ac1414bb4404da0100000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="50000000907800008a9bad6d7e6a0e64115ba06b9809234940a806e9447c1a8afa2d5b0fd4afdc330771069ccb00bafd61ce37d7980d63c0e9b2ad2419b08c0bdb3f8e9599f2cf7814bee67316a8ee"], 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:10:55 executing program 0: ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x94, 0x1, 0xf6, 0x0, 0x0, 0x8001, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x89040, 0x3, 0x0, 0x9, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002c80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000018800)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000015d40)=ANY=[@ANYBLOB="20001a00000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x20}}], 0x2, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000001880)=ANY=[@ANYBLOB="a0000000000007280001800c00028005000100840000000c00028005000100880000000c000280050001002f00000008000440000000090c0001800600034000000000000003ff0c0002800500010021000000060013400003000006000340000200000c00028005000100010000000600034000010000140001800800010000000000080002000a01010208000440fffffffd5cf03c6fba1e96bac815b838796a78636b26bde7b1b4ba1842ed1ce6"], 0xa0}, 0x1, 0x0, 0x0, 0x8810}, 0x0) r1 = getpid() epoll_create(0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x3ff, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x100, 0x2}, 0xe) sendmsg$NL80211_CMD_PROBE_CLIENT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x5c, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0x4208, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f6600006530202ab02020205ed92d2b2426282b2d5d205c202b23402b219b2e7d2d203a202f6465762f6c6f6f702d636f6e74726f6c00202662200a049a69a2c25fc047d986535a476e28d697f6a490d03c29af6c2e04a0c8ed8b1fff9cfe88dd19236b37e38df7a8563de9e593a88d3a16f8bba32c3f900557f22320d46d9fae7fd67af6"], 0x94) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) 19:10:55 executing program 2: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:10:55 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) syz_io_uring_setup(0x7243, &(0x7f0000000600)={0x0, 0xff69, 0x20, 0x2, 0x24, 0x0, r0}, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000ff6000/0x1000)=nil, &(0x7f0000000500), &(0x7f0000000540)) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:10:55 executing program 4: r0 = creat(&(0x7f00000000c0)='./file2\x00', 0x0) ioctl$int_out(r0, 0x5462, &(0x7f0000000080)) fcntl$setlease(r0, 0x400, 0x1) fcntl$setown(r0, 0x8, 0xffffffffffffffff) r1 = openat(r0, &(0x7f0000000100)='./file2\x00', 0x44c0, 0x50) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1, {r0}}, '\x00'}) creat(&(0x7f0000000040)='./file2\x00', 0x0) creat(&(0x7f0000000000)='./file2\x00', 0x0) 19:10:55 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:10:55 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40080}, 0x0, 0x10000000000, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x40000) r1 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000880)=@IORING_OP_WRITE_FIXED={0x5, 0x5, 0x2000, @fd_index, 0x2, 0x80000000, 0x1f, 0x18, 0x1, {0x0, r1}}, 0x2) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x58002, 0x0) fcntl$setstatus(r0, 0x4, 0x400) ioctl$DVD_READ_STRUCT(r2, 0x5390, &(0x7f0000000040)=@manufact={0x4, 0x0, 0x800, "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"}) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) 19:10:55 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RREADLINK(r1, &(0x7f00000000c0)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:10:55 executing program 0: ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x94, 0x1, 0xf6, 0x0, 0x0, 0x8001, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x89040, 0x3, 0x0, 0x9, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002c80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000018800)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000015d40)=ANY=[@ANYBLOB="20001a00000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x20}}], 0x2, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000001880)=ANY=[@ANYBLOB="a0000000000007280001800c00028005000100840000000c00028005000100880000000c000280050001002f00000008000440000000090c0001800600034000000000000003ff0c0002800500010021000000060013400003000006000340000200000c00028005000100010000000600034000010000140001800800010000000000080002000a01010208000440fffffffd5cf03c6fba1e96bac815b838796a78636b26bde7b1b4ba1842ed1ce6"], 0xa0}, 0x1, 0x0, 0x0, 0x8810}, 0x0) r1 = getpid() epoll_create(0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x3ff, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x100, 0x2}, 0xe) sendmsg$NL80211_CMD_PROBE_CLIENT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x5c, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0x4208, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f6600006530202ab02020205ed92d2b2426282b2d5d205c202b23402b219b2e7d2d203a202f6465762f6c6f6f702d636f6e74726f6c00202662200a049a69a2c25fc047d986535a476e28d697f6a490d03c29af6c2e04a0c8ed8b1fff9cfe88dd19236b37e38df7a8563de9e593a88d3a16f8bba32c3f900557f22320d46d9fae7fd67af6dae69de139"], 0x94) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) 19:10:55 executing program 3: getitimer(0x3, &(0x7f0000000000)) eventfd(0x0) sendmsg$NLBL_UNLABEL_C_STATICLIST(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$nbd(0x0, 0xffffffffffffffff) ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000800), 0x80100, 0x0) 19:10:55 executing program 2: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(0x0, &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:10:55 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x2, 0x6, 0x9, 0x40000000000000, 0xe34}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:10:55 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x106) socket$netlink(0x10, 0x3, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000080)=0x1000) socket$inet6_udplite(0xa, 0x2, 0x88) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = syz_open_procfs(0xffffffffffffffff, 0x0) r4 = fsopen(&(0x7f00000006c0)='autofs\x00', 0x0) fsconfig$FSCONFIG_SET_FD(r4, 0x6, 0x0, 0x0, 0xffffffffffffffff) openat$cgroup_ro(r3, &(0x7f0000000180)='cpuset.effective_cpus\x00', 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x20000, &(0x7f00000001c0)=ANY=[@ANYRESHEX=r1]) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/vlan/vlan0\x00') sendmsg$MPTCP_PM_CMD_SET_LIMITS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, 0x0}, 0x20000090) getsockopt$SO_TIMESTAMPING(r5, 0x1, 0x25, &(0x7f00000003c0), &(0x7f0000000400)=0x4) sendmsg$ETHTOOL_MSG_STRSET_GET(r5, &(0x7f0000002380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000002340)={&(0x7f0000002240)={0xd4, 0x0, 0x1, 0x70bd25, 0x25dfdbff, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x50, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}]}]}, @ETHTOOL_A_STRSET_HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6erspan0\x00'}]}, @ETHTOOL_A_STRSET_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_STRSET_STRINGSETS={0x18, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0xd}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xd4}, 0x1, 0x0, 0x0, 0x4008054}, 0x40000) r6 = creat(&(0x7f0000000140)='./file0\x00', 0x84) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r2, 0x80286722, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x66}) fallocate(0xffffffffffffffff, 0x45, 0x6, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syncfs(r6) 19:11:10 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x3}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:11:10 executing program 0: ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x94, 0x1, 0xf6, 0x0, 0x0, 0x8001, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x89040, 0x3, 0x0, 0x9, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002c80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000018800)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000015d40)=ANY=[@ANYBLOB="20001a00000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x20}}], 0x2, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000001880)=ANY=[@ANYBLOB="a0000000000007280001800c00028005000100840000000c00028005000100880000000c000280050001002f00000008000440000000090c0001800600034000000000000003ff0c0002800500010021000000060013400003000006000340000200000c00028005000100010000000600034000010000140001800800010000000000080002000a01010208000440fffffffd5cf03c6fba1e96bac815b838796a78636b26bde7b1b4ba1842ed1ce6"], 0xa0}, 0x1, 0x0, 0x0, 0x8810}, 0x0) r1 = getpid() epoll_create(0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x3ff, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x100, 0x2}, 0xe) sendmsg$NL80211_CMD_PROBE_CLIENT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x5c, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0x4208, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f6600006530202ab02020205ed92d2b2426282b2d5d205c202b23402b219b2e7d2d203a202f6465762f6c6f6f702d636f6e74726f6c00202662200a049a69a2c25fc047d986535a476e28d697f6a490d03c29af6c2e04a0c8ed8b1fff9cfe88dd19236b37e38df7a8563de9e593a88d3a16f8bba32c3f900557f22320d46d9fae7fd67af6dae69de139"], 0x94) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) 19:11:10 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x15851f942cbd8067, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:11:10 executing program 7: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3f}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f00000031c0)=0x6, 0x4) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f0000000140)=0x80, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @rand_addr=0x64010102}, 0x10, 0x0}, 0x404c008) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r2 = fcntl$dupfd(r0, 0x0, r0) socketpair(0x27, 0x4, 0x3, &(0x7f0000000040)={0xffffffffffffffff}) bind(r3, &(0x7f0000000180)=@l2tp6={0xa, 0x0, 0x10001, @local, 0x1ff800, 0x4}, 0x80) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 19:11:10 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="3400c8230e5dfd1dfaedf13e09c7560900a351713cb40ca71b4aae26f7e4a892b648b59804c99ba4830d24f0f143c5c5101b0ffcc1c1346f443673398dffc79139e1b504cecb9d0210bf02d6e4a9c6fd75e88f7099cc9f53d91fbc3560bab6ec87c1c09bf3219524be5eb1efc0ff8296cb8f29defdf0000003e76069cdf462d793f4ec7d867f8923fd6133a468eb33518c097e6a8e2d27b69af50c473e3b7300000400"/172, @ANYRES16=r1, @ANYBLOB="010000000000000000002100000009001f00706879310000000005002000010000000c000500000000000000f481"], 0x34}}, 0x0) sendmsg$IEEE802154_LLSEC_LIST_SECLEVEL(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, r1, 0x100, 0x70bd26, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x810) 19:11:10 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600), 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() setpriority(0x0, r0, 0x0) getpgrp(0x0) pidfd_open(r0, 0x0) prlimit64(0x0, 0x4, &(0x7f0000000640)={0x7f, 0x1}, &(0x7f0000000680)) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$nl_generic(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="380000001000010006000000000000000000000005000000000000001b0000806773c103604de149f8000008000000135f802de300000000"], 0x38}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x4, 0x0, 0x0, 0x5}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000000), 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x4800) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @loopback}, 0x1c) r2 = syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000005c0), 0xc, &(0x7f0000000240)={&(0x7f0000000700)=ANY=[@ANYRES16=r2, @ANYBLOB="010029bd7000fcdbdf25040000004404004e24000014000300000000000000000000000000000000000c0007003000000004000000080005000400000008000b0e73697020060002005a00000038000280060002004e2100000800090000000000080006f54f00000014000100e000000200000000000000000000000008000900090000001c00038008000300000000000800010001000000080001000200000008000400200000004c000280080006000300000005000d00010000000800050005001c283171ff89dee001000800070086000000080009007c000000080004000900000006000f0002000078e00006000b000a00"], 0x100}, 0x1, 0x0, 0x0, 0x4804}, 0x44) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5c0000008c668fe110bd36d113bf0b6a0c2ed6b66a8c553a2cdad40699571390a4129469f418ec7759ed86f7805495fc83866e63334f94d450c723ad2065e6258b88a38f67d1957440620ecc0e01c5edb7eba78c5553947934af9366d845e7b3674eb2449728872c4ca83856dc49b35d85a24ebeeafea4efb930dbf387e96dd1931361f735732d6e0ca3aff008101e204f46c22c1f825b10f7ce69b2ca306e", @ANYRES16=r2, @ANYBLOB="000100080000fc05000dffff00000020000180140003000000000000f700000000000000000000672c02002f000000080006000200000400000000000800d6000600cd000000000080000000000001000000000000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x800}, 0x4000) unshare(0x48020200) fchmodat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) flock(0xffffffffffffffff, 0xb) 19:11:10 executing program 2: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(0x0, &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:11:10 executing program 4: r0 = creat(&(0x7f00000000c0)='./file2\x00', 0x0) fcntl$setlease(r0, 0x400, 0x1) fcntl$setown(r0, 0x8, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r1, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000800)={{0x7f, 0x45, 0x4c, 0x46, 0x1f, 0x9, 0x0, 0x9, 0xfa3, 0x2, 0x3e, 0x7, 0x138, 0x40, 0x1d6, 0x6, 0x5, 0x38, 0x2, 0x5, 0x200, 0x3}, [{0x6474e551, 0x2, 0x4, 0x7fff, 0x5, 0x8, 0x2, 0xfffffffffffffffd}], "f649e68472e17f29aaa15a830e12cced6525ee22bc081a80ca3d62ada0e110945702df5237827f4e1a33b0573e1a4031abfd30cff773a9e712a52cf65f2e470c301d28899278dfecab5e2894ac47344ef0fb08a17ebeac7774733c8e1cc4c9d32857c6a7d84feffd5a44948733f36310703f6767cfb5f2a839b2903251e6134b9bfd2700bbe95db70f2368b1061d3f088a15ff42369eb1761171cec500d93c2c4190165d62c0f271977061abe4d93cee7aa935133a5cfcdd476eae9d201839b21573e4f1b18ddb3013b41afff7d2660edc87622ee9cbc34e5fda865ecd34ee42f2a5fd8b173653be28733827", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x864) r2 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000080), 0x80040, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x4}}, './file2\x00'}) creat(&(0x7f0000000040)='./file2\x00', 0x0) creat(&(0x7f0000000000)='./file2\x00', 0x0) [ 2667.936964] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=18183 comm=syz-executor.3 19:11:11 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x8ba2, 0x2, &(0x7f0000000200)=[{&(0x7f0000001280)="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", 0x1000, 0x4}, {&(0x7f0000000140)="8200abce1ef75ddad2f3b86d27b124fd1f57a63d077a4dc906d61bbbfa7b3e8c91e6fa9db733dd7771a96df16642d90b1bb555a587387c2b18b42187e5929061aacec199f63e2b7fcb91a5fdd58541b7b2f5329e4d182ffc3f07b0d37002b651787fd5bd15289f0c1cf625b390bbb6078d515452dde0bcfbc10ce1078df15b83d6c74af8e6a1c928f31b3ce76e1a45a8a46cafca7b581f3c0522175e09787a1d3d3c1aed8f52", 0xa6, 0x7fffffff}], 0xab0800, &(0x7f00000002c0)={[{@test_dummy_encryption}, {@auto_da_alloc}, {@jqfmt_vfsv0}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x1da}}, {@i_version}, {@norecovery}], [{@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fowner_eq}, {@smackfshat={'smackfshat', 0x3d, 'dns_resolver\x00'}}]}) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:11:11 executing program 2: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(0x0, &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:11:11 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x4}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:11:11 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0xc8318d00, 0x0, 0x0, 0x0, {0x39}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="380100001a0001000000000000000000ffffffff000000000000000000000000000c00000000000000000000000000000000000000000000000000000000000013fea1b118f8dcfdbf18aa343cfd6a", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fc010000000000000000000000000000000000003c000000ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000048000200636263286165732900"/240], 0x138}}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x1c000, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00'}) 19:11:11 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(0x0, &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:11:11 executing program 0: ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x94, 0x1, 0xf6, 0x0, 0x0, 0x8001, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x89040, 0x3, 0x0, 0x9, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002c80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000018800)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000015d40)=ANY=[@ANYBLOB="20001a00000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x20}}], 0x2, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000001880)=ANY=[@ANYBLOB="a0000000000007280001800c00028005000100840000000c00028005000100880000000c000280050001002f00000008000440000000090c0001800600034000000000000003ff0c0002800500010021000000060013400003000006000340000200000c00028005000100010000000600034000010000140001800800010000000000080002000a01010208000440fffffffd5cf03c6fba1e96bac815b838796a78636b26bde7b1b4ba1842ed1ce6"], 0xa0}, 0x1, 0x0, 0x0, 0x8810}, 0x0) r1 = getpid() epoll_create(0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x3ff, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x100, 0x2}, 0xe) sendmsg$NL80211_CMD_PROBE_CLIENT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x5c, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0x4208, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f6600006530202ab02020205ed92d2b2426282b2d5d205c202b23402b219b2e7d2d203a202f6465762f6c6f6f702d636f6e74726f6c00202662200a049a69a2c25fc047d986535a476e28d697f6a490d03c29af6c2e04a0c8ed8b1fff9cfe88dd19236b37e38df7a8563de9e593a88d3a16f8bba32c3f900557f22320d46d9fae7fd67af6dae69de139"], 0x94) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) [ 2668.190924] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=18183 comm=syz-executor.3 [ 2668.228669] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.5'. 19:11:26 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x44, 0x0, 0x400, 0x70bd27, 0x25dfdbfc, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x28, 0xc, 0x0, 0x1, [{0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xfc54}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5e97f41e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x5d5c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x626c6925}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}]}, 0x44}, 0x1, 0x0, 0x0, 0x4800}, 0x4) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:11:26 executing program 4: r0 = creat(&(0x7f00000000c0)='./file2\x00', 0x0) fcntl$setlease(r0, 0x400, 0x1) fcntl$setown(r0, 0x8, 0xffffffffffffffff) creat(&(0x7f0000000040)='./file0\x00', 0x14) creat(&(0x7f0000000000)='./file2\x00', 0x0) 19:11:26 executing program 5: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) dup2(r2, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)=ANY=[@ANYRESOCT=r1, @ANYRES32=r0, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="c8ae73a7c058239bdcbce5d26eb3951c20e319a21ea50de7c89727e0b5040000007cac96487bfc708116c09b10db6945a83e85d544e1b9c0210e6d42464fbfff55f9c9523fe04ee019f1414616048e9eefb2036671747172879b7249a4e7c5926d96d11f9ea41fa2bb041caa1eaa3287669cda0f46aebeb011fa1b5d8715af89ae1e276a52bd80fd2f55918566cc65bf0795f4694c9d35c2b787a76ebfaa9e87ec192ac7996f864d1d66ef724c9f7138a12886203b04d403bf47115f5362a7ffbef8288f5c7ee15c45dc1d9a09d7dfe31965d6edc56824bf479e"]) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x5000, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) keyctl$set_reqkey_keyring(0xe, 0x3) sendfile(0xffffffffffffffff, r3, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:11:26 executing program 2: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), 0x0, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:11:26 executing program 3: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x3, 0x0, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) 19:11:26 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x5}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:11:26 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(0x0, &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:11:26 executing program 0: ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x94, 0x1, 0xf6, 0x0, 0x0, 0x8001, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x89040, 0x3, 0x0, 0x9, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002c80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000018800)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000015d40)=ANY=[@ANYBLOB="20001a00000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x20}}], 0x2, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000001880)=ANY=[@ANYBLOB="a0000000000007280001800c00028005000100840000000c00028005000100880000000c000280050001002f00000008000440000000090c0001800600034000000000000003ff0c0002800500010021000000060013400003000006000340000200000c00028005000100010000000600034000010000140001800800010000000000080002000a01010208000440fffffffd5cf03c6fba1e96bac815b838796a78636b26bde7b1b4ba1842ed1ce6"], 0xa0}, 0x1, 0x0, 0x0, 0x8810}, 0x0) r1 = getpid() epoll_create(0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x3ff, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x100, 0x2}, 0xe) sendmsg$NL80211_CMD_PROBE_CLIENT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x5c, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0x4208, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f6600006530202ab02020205ed92d2b2426282b2d5d205c202b23402b219b2e7d2d203a202f6465762f6c6f6f702d636f6e74726f6c00202662200a049a69a2c25fc047d986535a476e28d697f6a490d03c29af6c2e04a0c8ed8b1fff9cfe88dd19236b37e38df7a8563de9e593a88d3a16f8bba32c3f900557f22320d46d9fae7fd67af6dae69de139fc65"], 0x94) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) 19:11:26 executing program 3: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0xc8318d00, 0x0, 0x0, 0x0, {0x39}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="380100001a0001000000000000000000ffffffff000000000000000000000000000c00000000000000000000000000000000000000000000000000000000000013fea1b118f8dcfdbf18aa343cfd6a", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fc010000000000000000000000000000000000003c000000ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000048000200636263286165732900"/240], 0x138}}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x1c000, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00'}) 19:11:26 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(0x0, &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:11:26 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) flock(r0, 0x1) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:11:26 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x6}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:11:26 executing program 2: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), 0x0, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:11:26 executing program 5: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='id_resolver\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) clone3(&(0x7f0000000380)={0x80010400, &(0x7f0000000140)=0xffffffffffffffff, &(0x7f0000000180), &(0x7f00000001c0), {}, &(0x7f0000000200)=""/14, 0xe, &(0x7f00000002c0)=""/86, &(0x7f0000000340)=[r1, r1, r1, r1, r1, r1], 0x6}, 0x58) dup2(r2, r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) r3 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000400)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r4, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$AUTOFS_DEV_IOCTL_READY(r4, 0xc0189376, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r5, 0xc018937c, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r4, {0x4}}, './file0\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 2683.253137] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.3'. 19:11:26 executing program 0: ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x94, 0x1, 0xf6, 0x0, 0x0, 0x8001, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x89040, 0x3, 0x0, 0x9, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002c80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000018800)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000015d40)=ANY=[@ANYBLOB="20001a00000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x20}}], 0x2, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000001880)=ANY=[@ANYBLOB="a0000000000007280001800c00028005000100840000000c00028005000100880000000c000280050001002f00000008000440000000090c0001800600034000000000000003ff0c0002800500010021000000060013400003000006000340000200000c00028005000100010000000600034000010000140001800800010000000000080002000a01010208000440fffffffd5cf03c6fba1e96bac815b838796a78636b26bde7b1b4ba1842ed1ce6"], 0xa0}, 0x1, 0x0, 0x0, 0x8810}, 0x0) r1 = getpid() epoll_create(0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x3ff, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x100, 0x2}, 0xe) sendmsg$NL80211_CMD_PROBE_CLIENT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x5c, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0x4208, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f6600006530202ab02020205ed92d2b2426282b2d5d205c202b23402b219b2e7d2d203a202f6465762f6c6f6f702d636f6e74726f6c00202662200a049a69a2c25fc047d986535a476e28d697f6a490d03c29af6c2e04a0c8ed8b1fff9cfe88dd19236b37e38df7a8563de9e593a88d3a16f8bba32c3f900557f22320d46d9fae7fd67af6dae69de139fc65"], 0x94) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) 19:11:41 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x40, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:11:41 executing program 4: r0 = creat(&(0x7f0000001100)='./file2\x00', 0x12) openat(0xffffffffffffffff, &(0x7f0000001140)='./file2\x00', 0x480, 0x90) fcntl$setlease(r0, 0x400, 0x1) fcntl$setown(r0, 0x8, 0xffffffffffffffff) creat(&(0x7f0000000040)='./file2\x00', 0x0) r1 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) r2 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/asound/seq/timer\x00', 0x0, 0x0) syz_io_uring_setup(0x7243, &(0x7f0000000600)={0x0, 0xff69, 0x20, 0x2, 0x24, 0x0, r2}, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000ff6000/0x1000)=nil, &(0x7f0000000500), &(0x7f0000000540)) syz_io_uring_setup(0x7242, &(0x7f0000000600)={0x0, 0xff69, 0x10, 0x2, 0x24, 0x0, r2}, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000ff6000/0x1000)=nil, &(0x7f0000000080), &(0x7f0000000540)) ioctl$BTRFS_IOC_INO_LOOKUP(r1, 0xd0009412, &(0x7f0000000100)={0x0, 0x3}) creat(&(0x7f0000000000)='./file2\x00', 0x0) 19:11:41 executing program 0: ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x94, 0x1, 0xf6, 0x0, 0x0, 0x8001, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x89040, 0x3, 0x0, 0x9, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002c80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000018800)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000015d40)=ANY=[@ANYBLOB="20001a00000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x20}}], 0x2, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000001880)=ANY=[@ANYBLOB="a0000000000007280001800c00028005000100840000000c00028005000100880000000c000280050001002f00000008000440000000090c0001800600034000000000000003ff0c0002800500010021000000060013400003000006000340000200000c00028005000100010000000600034000010000140001800800010000000000080002000a01010208000440fffffffd5cf03c6fba1e96bac815b838796a78636b26bde7b1b4ba1842ed1ce6"], 0xa0}, 0x1, 0x0, 0x0, 0x8810}, 0x0) r1 = getpid() epoll_create(0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x3ff, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x100, 0x2}, 0xe) sendmsg$NL80211_CMD_PROBE_CLIENT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x5c, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0x4208, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f6600006530202ab02020205ed92d2b2426282b2d5d205c202b23402b219b2e7d2d203a202f6465762f6c6f6f702d636f6e74726f6c00202662200a049a69a2c25fc047d986535a476e28d697f6a490d03c29af6c2e04a0c8ed8b1fff9cfe88dd19236b37e38df7a8563de9e593a88d3a16f8bba32c3f900557f22320d46d9fae7fd67af6dae69de139fc65"], 0x94) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) 19:11:41 executing program 2: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), 0x0, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:11:41 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x7}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:11:41 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x6}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:11:41 executing program 3: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), 0x0, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:11:41 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000800)={{0x7f, 0x45, 0x4c, 0x46, 0x1f, 0x9, 0x0, 0x9, 0xfa3, 0x2, 0x3e, 0x7, 0x138, 0x40, 0x1d6, 0x6, 0x5, 0x38, 0x2, 0x5, 0x200, 0x3}, [{0x6474e551, 0x2, 0x4, 0x7fff, 0x5, 0x8, 0x2, 0xfffffffffffffffd}], "f649e68472e17f29aaa15a830e12cced6525ee22bc081a80ca3d62ada0e110945702df5237827f4e1a33b0573e1a4031abfd30cff773a9e712a52cf65f2e470c301d28899278dfecab5e2894ac47344ef0fb08a17ebeac7774733c8e1cc4c9d32857c6a7d84feffd5a44948733f36310703f6767cfb5f2a839b2903251e6134b9bfd2700bbe95db70f2368b1061d3f088a15ff42369eb1761171cec500d93c2c4190165d62c0f271977061abe4d93cee7aa935133a5cfcdd476eae9d201839b21573e4f1b18ddb3013b41afff7d2660edc87622ee9cbc34e5fda865ecd34ee42f2a5fd8b173653be28733827", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x864) openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x488000, 0x8) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x7fffffff, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000140)="7c32118cf7d3ff3e03ebbc209bd2be5dfbf37a8d64def39f3290c0adfc128cc6d82e6ec2a86efac3a42d2863661e14f136994912bd", 0x35}, {&(0x7f0000000180)="e7550a4e1982d8c3959698a805fb5524b723e6ebf46441890e98c9", 0x1b, 0x1}, {&(0x7f00000002c0)="bc3322297c417334554ba4818e55f60596188f45d283aaeffc3547b9ff3c646b2661aa7ae923c6f191afc80a93bc6b05d5fcecd6755efe262113e432bee47d3a537c7fce48b54f6892b058f8b9836eebb1a3f033371da442a8858b3e1d17e3b9eb53e119846a1d4a207876f8c35eddd3fa4e1421176bdbdfb9d5ef9adda25d114e98ec3f060fa7a52ba6f2252609e77a941866aae84b5166f5d2a2d611f8f785de1fa48a695a9563f0463b9d12184af30860fa0e9fa85d1771a45ea5a6c13d46f16890825a17677325a15ee3a2bac85a9aa27562dd8ce912c0b744a15c7df5ec84", 0xe1, 0x76357b9b}, {&(0x7f00000001c0)="92afc35515b5eca16ff1ed5c30072e5219bc132970855d2d066a0f2fd3ce480015a7e578341eda22e875690290d32d00c66a73910f6df7735f385a97b5645906009e46fe0674d1303c4ac69e0c27781940c551a703c5443715758448c26cb8c1b7e8a4d6558b62c451e6b843587061", 0x6f, 0x1}], 0x10400, &(0x7f0000000500)={[{@journal_dev}], [{@dont_hash}, {@smackfsfloor={'smackfsfloor', 0x3d, '&-'}}, {@appraise}]}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:11:41 executing program 2: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, 0x0, 0x0, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:11:41 executing program 1: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x7, 0x1, 0x7, 0x40, 0x0, 0x0, 0x5810, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_bp={&(0x7f0000000080), 0x5}, 0x8000, 0x8, 0x8, 0x2, 0xb81, 0x200, 0xfff9, 0x0, 0x1, 0x0, 0xffff}, r1, 0x3, r0, 0x3) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:11:41 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x9}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:11:41 executing program 3: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), 0x0, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:11:41 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f00000002c0)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xceVTQ194%\x8fh\xaf\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x95\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cH\xbf$\x9a-\x96\xca\x1cA6\xdf\xf4\xff\xf1\xcc_+\xee\xc8\x9ae\x06k\x8b.aZ\x83\xfb\x104\x99^g\xa2\xce\xd9\x89\xdc\x92\x1e\xfa/', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x30) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:11:41 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000080)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:11:41 executing program 2: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, 0x0, 0x0, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:11:41 executing program 0: ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x94, 0x1, 0xf6, 0x0, 0x0, 0x8001, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x89040, 0x3, 0x0, 0x9, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002c80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000018800)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000015d40)=ANY=[@ANYBLOB="20001a00000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x20}}], 0x2, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000001880)=ANY=[@ANYBLOB="a0000000000007280001800c00028005000100840000000c00028005000100880000000c000280050001002f00000008000440000000090c0001800600034000000000000003ff0c0002800500010021000000060013400003000006000340000200000c00028005000100010000000600034000010000140001800800010000000000080002000a01010208000440fffffffd5cf03c6fba1e96bac815b838796a78636b26bde7b1b4ba1842ed1ce6"], 0xa0}, 0x1, 0x0, 0x0, 0x8810}, 0x0) r1 = getpid() epoll_create(0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x3ff, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x100, 0x2}, 0xe) sendmsg$NL80211_CMD_PROBE_CLIENT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x5c, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0x4208, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f6600006530202ab02020205ed92d2b2426282b2d5d205c202b23402b219b2e7d2d203a202f6465762f6c6f6f702d636f6e74726f6c00202662200a049a69a2c25fc047d986535a476e28d697f6a490d03c29af6c2e04a0c8ed8b1fff9cfe88dd19236b37e38df7a8563de9e593a88d3a16f8bba32c3f900557f22320d46d9fae7fd67af6dae69de139fc65ce"], 0x94) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) 19:11:41 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x6}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:11:56 executing program 3: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), 0x0, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:11:56 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x40, 0xfffffffffffffffd, 0x0, 0x0, 0x2, 0x5}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(r0, &(0x7f00000001c0)='net/ip_mr_vif\x00') openat$cgroup_int(r1, &(0x7f0000000200)='cgroup.clone_children\x00', 0x2, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) syz_io_uring_submit(0x0, 0x0, &(0x7f00000000c0)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x1, 0x1}, 0x1) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:11:56 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0xa}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:11:56 executing program 4: r0 = creat(&(0x7f00000000c0)='./file2\x00', 0x0) fcntl$setlease(r0, 0x400, 0x1) fcntl$setown(r0, 0x8, 0xffffffffffffffff) r1 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) syz_io_uring_setup(0x7243, &(0x7f0000000600)={0x0, 0xff69, 0x20, 0x2, 0x24, 0x0, r1}, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000ff6000/0x1000)=nil, &(0x7f0000000500), &(0x7f0000000540)) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000080)={0x80000000, 0x3f, 0x8}) creat(&(0x7f0000000040)='./file2\x00', 0x0) creat(&(0x7f0000000000)='./file2\x00', 0x0) 19:11:56 executing program 0: ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x94, 0x1, 0xf6, 0x0, 0x0, 0x8001, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x89040, 0x3, 0x0, 0x9, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002c80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000018800)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000015d40)=ANY=[@ANYBLOB="20001a00000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x20}}], 0x2, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000001880)=ANY=[@ANYBLOB="a0000000000007280001800c00028005000100840000000c00028005000100880000000c000280050001002f00000008000440000000090c0001800600034000000000000003ff0c0002800500010021000000060013400003000006000340000200000c00028005000100010000000600034000010000140001800800010000000000080002000a01010208000440fffffffd5cf03c6fba1e96bac815b838796a78636b26bde7b1b4ba1842ed1ce6"], 0xa0}, 0x1, 0x0, 0x0, 0x8810}, 0x0) r1 = getpid() epoll_create(0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x3ff, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x100, 0x2}, 0xe) sendmsg$NL80211_CMD_PROBE_CLIENT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x5c, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0x4208, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f6600006530202ab02020205ed92d2b2426282b2d5d205c202b23402b219b2e7d2d203a202f6465762f6c6f6f702d636f6e74726f6c00202662200a049a69a2c25fc047d986535a476e28d697f6a490d03c29af6c2e04a0c8ed8b1fff9cfe88dd19236b37e38df7a8563de9e593a88d3a16f8bba32c3f900557f22320d46d9fae7fd67af6dae69de139fc65ce"], 0x94) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) 19:11:56 executing program 5: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x40, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x27d}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) r1 = inotify_init1(0x800) splice(r1, &(0x7f00000000c0)=0x4, r0, &(0x7f0000000140), 0x3, 0x1) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000180), r2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r3, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0xa) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:11:56 executing program 2: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, 0x0, 0x0, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:11:56 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x6}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:11:56 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0xf}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:11:56 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:11:56 executing program 3: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0xa}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:11:56 executing program 7: keyctl$chown(0x4, 0x0, 0xee01, 0xee00) r0 = add_key$keyring(0x0, &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000500)={'fscrypt:', @desc4}, &(0x7f0000000680)={0x0, "51bab78fbede0eb5fae9c09d1193a258a2e3125ffdcd424c2f8cf56e277a15201fa83a9d96dbd58e991ffb9e07a1638e07a037807e7786eb446cd80e9a5867be"}, 0x48, r0) r2 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) r3 = add_key$fscrypt_v1(&(0x7f0000000300), &(0x7f0000000380)={'fscrypt:', @desc2}, &(0x7f0000000480)={0x0, "e776948c30407f746b4bce4fe1dfd22cfc491372bfef696cb8114417300486c7dc67510f255163554a8b1c56f99015cff18dde6bfd24cab6fc6fe129421a032a", 0x10032}, 0x48, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, 0x0, &(0x7f0000000400)=@chain={'key_or_keyring:', r3}) add_key$keyring(0x0, &(0x7f0000000800)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r1) openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x2800, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='wchan\x00') preadv(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000640), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="44588d76aa533d17b17e5f466c8d0a72f45c9a0dc85ab9c0259e0a7e3439a2075b6d38aa9c63"], 0x29, 0xfffffffffffffff9) r4 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r4) keyctl$describe(0x6, 0x0, &(0x7f0000000580)=""/190, 0xbe) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540)}, 0x3040, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412e500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:11:56 executing program 2: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c"}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:11:56 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) stat(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000380)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000180)=""/21, 0x15}, {&(0x7f0000000400)=""/163, 0xa3}], 0x2, &(0x7f0000000500)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}], 0x20}, 0x40024000) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000580)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r1, r2}}, './file0\x00'}) syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f00000000c0)='./file0\x00', 0x80, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000140)="548a4165", 0x4, 0x9}, {&(0x7f0000000180)="5bb649dc9217ae5705c3a3a7c95f8388718bf38e9247aa34171ff4e9b64698c7d7e3885fe686b215fa3b1a34841a", 0x2e, 0x62a1}, {&(0x7f00000001c0)="f5ccefcfc8ddace455ab6ef0e08962e97799878cd955b35fc3d358af4d38003f743543153434284dd2f9f3020ff5401edd099394f0", 0x35, 0x7}], 0x2805000, &(0x7f0000000200)={[{@jqfmt_vfsv0}], [{@subj_type={'subj_type', 0x3d, '*-^/'}}, {@euid_lt={'euid<', r1}}]}) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:11:56 executing program 0: ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x94, 0x1, 0xf6, 0x0, 0x0, 0x8001, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x89040, 0x3, 0x0, 0x9, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002c80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000018800)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000015d40)=ANY=[@ANYBLOB="20001a00000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x20}}], 0x2, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000001880)=ANY=[@ANYBLOB="a0000000000007280001800c00028005000100840000000c00028005000100880000000c000280050001002f00000008000440000000090c0001800600034000000000000003ff0c0002800500010021000000060013400003000006000340000200000c00028005000100010000000600034000010000140001800800010000000000080002000a01010208000440fffffffd5cf03c6fba1e96bac815b838796a78636b26bde7b1b4ba1842ed1ce6"], 0xa0}, 0x1, 0x0, 0x0, 0x8810}, 0x0) r1 = getpid() epoll_create(0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x3ff, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x100, 0x2}, 0xe) sendmsg$NL80211_CMD_PROBE_CLIENT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x5c, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0x4208, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f6600006530202ab02020205ed92d2b2426282b2d5d205c202b23402b219b2e7d2d203a202f6465762f6c6f6f702d636f6e74726f6c00202662200a049a69a2c25fc047d986535a476e28d697f6a490d03c29af6c2e04a0c8ed8b1fff9cfe88dd19236b37e38df7a8563de9e593a88d3a16f8bba32c3f900557f22320d46d9fae7fd67af6dae69de139fc65ce"], 0x94) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) 19:11:56 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000080)="38fdd9c7bf69888852108f891d580596", 0x10) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:11:56 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x48}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:11:56 executing program 1: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) add_key$keyring(&(0x7f0000000200), &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) sendmsg$NLBL_CIPSOV4_C_ADD(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)={0xe0, 0x0, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_MLSLVLLST={0xb4, 0x8, 0x0, 0x1, [{0x44, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4600825a}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x21f8861d}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x5}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe7}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x7f}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x392471ab}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x84}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4daf06a8}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x299adc1f}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xff}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3c2e9329}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x7a}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe4}]}, {0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x11}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8c}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x22d1ac20}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x77f3d2ca}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x501677ce}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x41c6524e}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}]}, 0xe0}, 0x1, 0x0, 0x0, 0x18}, 0x1) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r2, 0xc0189378, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {r2}}, './file0\x00'}) getsockopt$packet_buf(r3, 0x107, 0x5, &(0x7f00000000c0), &(0x7f0000000140)) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:11:56 executing program 2: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c"}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:12:12 executing program 3: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0xa}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:12:12 executing program 4: r0 = creat(&(0x7f00000000c0)='./file2\x00', 0x0) fcntl$setlease(r0, 0x400, 0x1) fcntl$setown(r0, 0x8, 0xffffffffffffffff) openat(r0, &(0x7f0000000180)='./file2\x00', 0x800000, 0xe0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) dup2(r1, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000e62d2f66696c653200"]) creat(&(0x7f0000000040)='./file2\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x3}}, './file1\x00'}) getsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000240), &(0x7f0000000280)=0x4) lsetxattr$security_selinux(&(0x7f0000000080)='./file2\x00', &(0x7f0000000100), &(0x7f0000000140)='system_u:object_r:tmpreaper_exec_t:s0\x00', 0x26, 0x0) creat(&(0x7f0000000000)='./file2\x00', 0x10) 19:12:12 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x4c}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:12:12 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000000, 0x13, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58af, 0x0, 0x2, 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000080)={0x2, 0xffffffff, 0x500, 0x3, 0x6, 0x6}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:12:12 executing program 0: ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x94, 0x1, 0xf6, 0x0, 0x0, 0x8001, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x89040, 0x3, 0x0, 0x9, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002c80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000018800)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000015d40)=ANY=[@ANYBLOB="20001a00000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x20}}], 0x2, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000001880)=ANY=[@ANYBLOB="a0000000000007280001800c00028005000100840000000c00028005000100880000000c000280050001002f00000008000440000000090c0001800600034000000000000003ff0c0002800500010021000000060013400003000006000340000200000c00028005000100010000000600034000010000140001800800010000000000080002000a01010208000440fffffffd5cf03c6fba1e96bac815b838796a78636b26bde7b1b4ba1842ed1ce6"], 0xa0}, 0x1, 0x0, 0x0, 0x8810}, 0x0) r1 = getpid() epoll_create(0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x3ff, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x100, 0x2}, 0xe) sendmsg$NL80211_CMD_PROBE_CLIENT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x5c, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0x4208, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f6600006530202ab02020205ed92d2b2426282b2d5d205c202b23402b219b2e7d2d203a202f6465762f6c6f6f702d636f6e74726f6c00202662200a049a69a2c25fc047d986535a476e28d697f6a490d03c29af6c2e04a0c8ed8b1fff9cfe88dd19236b37e38df7a8563de9e593a88d3a16f8bba32c3f900557f22320d46d9fae7fd67af6dae69de139fc65ce21"], 0x94) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) 19:12:12 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) preadv(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000800)={{0x7f, 0x45, 0x4c, 0x46, 0x1f, 0x9, 0x0, 0x9, 0xfa3, 0x2, 0x3e, 0x7, 0x138, 0x40, 0x1d6, 0x6, 0x5, 0x38, 0x2, 0x5, 0x200, 0x3}, [{0x6474e551, 0x2, 0x4, 0x7fff, 0x5, 0x8, 0x2, 0xfffffffffffffffd}], "f649e68472e17f29aaa15a830e12cced6525ee22bc081a80ca3d62ada0e110945702df5237827f4e1a33b0573e1a4031abfd30cff773a9e712a52cf65f2e470c301d28899278dfecab5e2894ac47344ef0fb08a17ebeac7774733c8e1cc4c9d32857c6a7d84feffd5a44948733f36310703f6767cfb5f2a839b2903251e6134b9bfd2700bbe95db70f2368b1061d3f088a15ff42369eb1761171cec500d93c2c4190165d62c0f271977061abe4d93cee7aa935133a5cfcdd476eae9d201839b21573e4f1b18ddb3013b41afff7d2660edc87622ee9cbc34e5fda865ecd34ee42f2a5fd8b173653be28733827", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x864) r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) syz_io_uring_setup(0x7243, &(0x7f0000000600)={0x0, 0xff69, 0x20, 0x2, 0x24, 0x0, r0}, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000ff6000/0x1000)=nil, &(0x7f0000000500), &(0x7f0000000540)) r1 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000680)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r1, @ANYBLOB="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"]) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:12:12 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0xf}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:12:12 executing program 2: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c"}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:12:12 executing program 3: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0xa}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:12:12 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x2000, 0x40) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:12:12 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x40, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x27d}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) r1 = inotify_init1(0x800) splice(r1, &(0x7f00000000c0)=0x4, r0, &(0x7f0000000140), 0x3, 0x1) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000180), r2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r3, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0xa) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:12:12 executing program 0: ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x94, 0x1, 0xf6, 0x0, 0x0, 0x8001, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x89040, 0x3, 0x0, 0x9, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002c80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000018800)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000015d40)=ANY=[@ANYBLOB="20001a00000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x20}}], 0x2, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000001880)=ANY=[@ANYBLOB="a0000000000007280001800c00028005000100840000000c00028005000100880000000c000280050001002f00000008000440000000090c0001800600034000000000000003ff0c0002800500010021000000060013400003000006000340000200000c00028005000100010000000600034000010000140001800800010000000000080002000a01010208000440fffffffd5cf03c6fba1e96bac815b838796a78636b26bde7b1b4ba1842ed1ce6"], 0xa0}, 0x1, 0x0, 0x0, 0x8810}, 0x0) r1 = getpid() epoll_create(0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x3ff, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x100, 0x2}, 0xe) sendmsg$NL80211_CMD_PROBE_CLIENT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x5c, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0x4208, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f6600006530202ab02020205ed92d2b2426282b2d5d205c202b23402b219b2e7d2d203a202f6465762f6c6f6f702d636f6e74726f6c00202662200a049a69a2c25fc047d986535a476e28d697f6a490d03c29af6c2e04a0c8ed8b1fff9cfe88dd19236b37e38df7a8563de9e593a88d3a16f8bba32c3f900557f22320d46d9fae7fd67af6dae69de139fc65ce21"], 0x94) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) 19:12:12 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x65}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 2734.096743] Bluetooth: hci2: command 0x0409 tx timeout [ 2736.144741] Bluetooth: hci2: command 0x041b tx timeout [ 2738.192334] Bluetooth: hci2: command 0x040f tx timeout [ 2739.425997] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2739.427121] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2739.429204] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 2739.469353] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2739.470640] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2739.472619] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2740.240371] Bluetooth: hci2: command 0x0419 tx timeout 19:12:36 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000080)={[0x7]}, 0x8, 0x80800) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000140)={0x0, 0x80, 0x3, 0x5e, 0x3, 0x5b, 0x0, 0x9, 0x49888, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x1, 0x71}, 0x1d011, 0xe000000000000, 0x28, 0x4, 0xa28, 0x2, 0x20, 0x0, 0xffff0000, 0x0, 0xfffffffffffffc01}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:12:36 executing program 4: r0 = creat(&(0x7f00000000c0)='./file2\x00', 0x0) fcntl$setlease(r0, 0x400, 0x1) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x3690c0) fcntl$setown(r1, 0x8, 0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) creat(&(0x7f0000000040)='./file2\x00', 0x0) creat(&(0x7f0000000000)='./file2\x00', 0x0) 19:12:36 executing program 2: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(0x0, &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:12:36 executing program 1: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, &(0x7f00000007c0), 0xffffffffffffffff, 0x0, 0xde, 0x0) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10040, 0x50) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@loopback, 0x18}) r3 = signalfd(r2, &(0x7f0000000200)={[0x2]}, 0x8) perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x0, 0x2, 0x7f, 0x2, 0x0, 0x73, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x1, @perf_bp={&(0x7f0000000140), 0x8}, 0x48b4d, 0xfffffffffffffffb, 0xffffff16, 0x4, 0xc4, 0x7fffffff, 0x7b7, 0x0, 0x100, 0x0, 0x1}, r1, 0xa, r3, 0xa) sendfile(r0, r0, &(0x7f0000000080)=0x5, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:12:36 executing program 0: ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x94, 0x1, 0xf6, 0x0, 0x0, 0x8001, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x89040, 0x3, 0x0, 0x9, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002c80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000018800)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000015d40)=ANY=[@ANYBLOB="20001a00000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x20}}], 0x2, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000001880)=ANY=[@ANYBLOB="a0000000000007280001800c00028005000100840000000c00028005000100880000000c000280050001002f00000008000440000000090c0001800600034000000000000003ff0c0002800500010021000000060013400003000006000340000200000c00028005000100010000000600034000010000140001800800010000000000080002000a01010208000440fffffffd5cf03c6fba1e96bac815b838796a78636b26bde7b1b4ba1842ed1ce6"], 0xa0}, 0x1, 0x0, 0x0, 0x8810}, 0x0) r1 = getpid() epoll_create(0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x3ff, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x100, 0x2}, 0xe) sendmsg$NL80211_CMD_PROBE_CLIENT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x5c, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0x4208, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f6600006530202ab02020205ed92d2b2426282b2d5d205c202b23402b219b2e7d2d203a202f6465762f6c6f6f702d636f6e74726f6c00202662200a049a69a2c25fc047d986535a476e28d697f6a490d03c29af6c2e04a0c8ed8b1fff9cfe88dd19236b37e38df7a8563de9e593a88d3a16f8bba32c3f900557f22320d46d9fae7fd67af6dae69de139fc65ce21"], 0x94) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) 19:12:36 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x90, 0x4) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) setsockopt$sock_timeval(r0, 0x1, 0x43, &(0x7f0000000040)={0x0, 0xea60}, 0x10) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty, 0x4}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000180)=0x3, 0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x31, &(0x7f0000000540)=[{&(0x7f0000000100)=':\x00', 0xfffffdef}], 0x1}, 0x10044001) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000080)={@empty, 0x16}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000001c0)={@remote}) syz_io_uring_setup(0x4d4f, &(0x7f0000000240), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000080)=@IORING_OP_ASYNC_CANCEL, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index}, 0x8) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000800)={{0x7f, 0x45, 0x4c, 0x46, 0x1f, 0x9, 0x0, 0x9, 0xfa3, 0x2, 0x3e, 0x7, 0x138, 0x40, 0x1d6, 0x6, 0x5, 0x38, 0x2, 0x5, 0x200, 0x3}, [{0x6474e551, 0x2, 0x4, 0x7fff, 0x5, 0x8, 0x2, 0xfffffffffffffffd}], "f649e68472e17f29aaa15a830e12cced6525ee22bc081a80ca3d62ada0e110945702df5237827f4e1a33b0573e1a4031abfd30cff773a9e712a52cf65f2e470c301d28899278dfecab5e2894ac47344ef0fb08a17ebeac7774733c8e1cc4c9d32857c6a7d84feffd5a44948733f36310703f6767cfb5f2a839b2903251e6134b9bfd2700bbe95db70f2368b1061d3f088a15ff42369eb1761171cec500d93c2c4190165d62c0f271977061abe4d93cee7aa935133a5cfcdd476eae9d201839b21573e4f1b18ddb3013b41afff7d2660edc87622ee9cbc34e5fda865ecd34ee42f2a5fd8b173653be28733827", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x864) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f00000000c0)=@IORING_OP_OPENAT={0x12, 0x5, 0x0, r3, 0x0, 0x0, 0x1, 0x1110c3, 0x12345, {0x0, r4}}, 0x7fff) 19:12:36 executing program 3: ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x5, "f55e5a770495c8599700"}) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) r1 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x8, 0x6) sendfile(r1, r0, &(0x7f0000000040)=0x6, 0xfffffffffffffff9) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x1cf}) r3 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r4, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000000800)={{0x7f, 0x45, 0x4c, 0x46, 0x1f, 0x9, 0x0, 0x9, 0xfa3, 0x2, 0x3e, 0x7, 0x138, 0x40, 0x1d6, 0x6, 0x5, 0x38, 0x2, 0x5, 0x200, 0x3}, [{0x6474e551, 0x2, 0x4, 0x7fff, 0x5, 0x8, 0x2, 0xfffffffffffffffd}], "f649e68472e17f29aaa15a830e12cced6525ee22bc081a80ca3d62ada0e110945702df5237827f4e1a33b0573e1a4031abfd30cff773a9e712a52cf65f2e470c301d28899278dfecab5e2894ac47344ef0fb08a17ebeac7774733c8e1cc4c9d32857c6a7d84feffd5a44948733f36310703f6767cfb5f2a839b2903251e6134b9bfd2700bbe95db70f2368b1061d3f088a15ff42369eb1761171cec500d93c2c4190165d62c0f271977061abe4d93cee7aa935133a5cfcdd476eae9d201839b21573e4f1b18ddb3013b41afff7d2660edc87622ee9cbc34e5fda865ecd34ee42f2a5fd8b173653be28733827", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x864) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) dup3(r3, r0, 0x0) 19:12:36 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x68}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:12:37 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = eventfd2(0xad8, 0x80001) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000080)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:12:37 executing program 0: ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x94, 0x1, 0xf6, 0x0, 0x0, 0x8001, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x89040, 0x3, 0x0, 0x9, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002c80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000018800)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000015d40)=ANY=[@ANYBLOB="20001a00000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x20}}], 0x2, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000001880)=ANY=[@ANYBLOB="a0000000000007280001800c00028005000100840000000c00028005000100880000000c000280050001002f00000008000440000000090c0001800600034000000000000003ff0c0002800500010021000000060013400003000006000340000200000c00028005000100010000000600034000010000140001800800010000000000080002000a01010208000440fffffffd5cf03c6fba1e96bac815b838796a78636b26bde7b1b4ba1842ed1ce6"], 0xa0}, 0x1, 0x0, 0x0, 0x8810}, 0x0) r1 = getpid() epoll_create(0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x3ff, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x100, 0x2}, 0xe) sendmsg$NL80211_CMD_PROBE_CLIENT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x5c, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0x4208, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f6600006530202ab02020205ed92d2b2426282b2d5d205c202b23402b219b2e7d2d203a202f6465762f6c6f6f702d636f6e74726f6c00202662200a049a69a2c25fc047d986535a476e28d697f6a490d03c29af6c2e04a0c8ed8b1fff9cfe88dd19236b37e38df7a8563de9e593a88d3a16f8bba32c3f900557f22320d46d9fae7fd67af6dae69de139fc65ce21"], 0x94) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r3) 19:12:37 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x6c}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:12:37 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:12:37 executing program 2: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(0x0, &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 2754.002965] device veth0_vlan entered promiscuous mode 19:12:37 executing program 1: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0xe8305d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup(r0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:12:37 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c"}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:12:37 executing program 0: ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x94, 0x1, 0xf6, 0x0, 0x0, 0x8001, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x89040, 0x3, 0x0, 0x9, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002c80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000018800)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000015d40)=ANY=[@ANYBLOB="20001a00000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x20}}], 0x2, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000001880)=ANY=[@ANYBLOB="a0000000000007280001800c00028005000100840000000c00028005000100880000000c000280050001002f00000008000440000000090c0001800600034000000000000003ff0c0002800500010021000000060013400003000006000340000200000c00028005000100010000000600034000010000140001800800010000000000080002000a01010208000440fffffffd5cf03c6fba1e96bac815b838796a78636b26bde7b1b4ba1842ed1ce6"], 0xa0}, 0x1, 0x0, 0x0, 0x8810}, 0x0) r1 = getpid() epoll_create(0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x3ff, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x100, 0x2}, 0xe) sendmsg$NL80211_CMD_PROBE_CLIENT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x5c, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0x4208, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f6600006530202ab02020205ed92d2b2426282b2d5d205c202b23402b219b2e7d2d203a202f6465762f6c6f6f702d636f6e74726f6c00202662200a049a69a2c25fc047d986535a476e28d697f6a490d03c29af6c2e04a0c8ed8b1fff9cfe88dd19236b37e38df7a8563de9e593a88d3a16f8bba32c3f900557f22320d46d9fae7fd67af6dae69de139fc65ce21"], 0x94) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r3) 19:12:37 executing program 2: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(0x0, &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 2754.225504] device veth0_vlan entered promiscuous mode [ 2755.856342] Bluetooth: hci6: command 0x0406 tx timeout 19:12:51 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x74}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:12:51 executing program 0: ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x94, 0x1, 0xf6, 0x0, 0x0, 0x8001, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x89040, 0x3, 0x0, 0x9, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002c80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000018800)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000015d40)=ANY=[@ANYBLOB="20001a00000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x20}}], 0x2, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000001880)=ANY=[@ANYBLOB="a0000000000007280001800c00028005000100840000000c00028005000100880000000c000280050001002f00000008000440000000090c0001800600034000000000000003ff0c0002800500010021000000060013400003000006000340000200000c00028005000100010000000600034000010000140001800800010000000000080002000a01010208000440fffffffd5cf03c6fba1e96bac815b838796a78636b26bde7b1b4ba1842ed1ce6"], 0xa0}, 0x1, 0x0, 0x0, 0x8810}, 0x0) r1 = getpid() epoll_create(0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x3ff, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x100, 0x2}, 0xe) sendmsg$NL80211_CMD_PROBE_CLIENT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x5c, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0x4208, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f6600006530202ab02020205ed92d2b2426282b2d5d205c202b23402b219b2e7d2d203a202f6465762f6c6f6f702d636f6e74726f6c00202662200a049a69a2c25fc047d986535a476e28d697f6a490d03c29af6c2e04a0c8ed8b1fff9cfe88dd19236b37e38df7a8563de9e593a88d3a16f8bba32c3f900557f22320d46d9fae7fd67af6dae69de139fc65ce21"], 0x94) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r3) 19:12:51 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0x4) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendfile(0xffffffffffffffff, r1, 0x0, 0x500000001) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000200)=@secondary) add_key$fscrypt_v1(&(0x7f0000001380), &(0x7f00000013c0)={'fscrypt:', @desc4}, &(0x7f0000001400)={0x0, "bd8defb1704e87ab7098cb03b1be8a4bd32289149f71be2939f542d38d729fb6be9bd9afc6914aa5f95182b032aefece49757d62bb07d711b0aa28cf07a58ba7"}, 0x48, r2) keyctl$revoke(0x3, r2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:12:51 executing program 4: r0 = creat(&(0x7f00000000c0)='./file2\x00', 0x0) stat(&(0x7f0000000380)='./file2\x00', &(0x7f00000003c0)) fcntl$setlease(r0, 0x400, 0x1) fcntl$setown(r0, 0x8, 0xffffffffffffffff) creat(&(0x7f0000000040)='./file2\x00', 0x0) creat(&(0x7f0000000000)='./file2\x00', 0x44) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x206000, 0x0) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r2, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0xb8, 0x2, 0x7, 0x101, 0x0, 0x0, {0x1}, [@NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0xfffffffffffffff8}, @NFACCT_FILTER={0x1c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x9}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x400}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x3d37}]}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x603}, @NFACCT_FILTER={0x14, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x5}, @NFACCT_FILTER_MASK={0x8}]}, @NFACCT_FILTER={0x2c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0xfffff001}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x80000000}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x4ec}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x8000}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0xffff}]}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0xd4b7}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x6e}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0xfffffffffffffff7}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x63cc8354}]}, 0xb8}, 0x1, 0x0, 0x0, 0x1}, 0x20000000) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f0000000100)={"5c2c487095fc14638190a3c4d3e86e33", 0x0, 0x0, {0xd62, 0x3}, {0x26b, 0x6}, 0xffff, [0x328, 0x2, 0x7fffffff, 0x1, 0x3, 0x8, 0x1, 0x2, 0x2, 0x9, 0x81, 0x2207, 0x7f, 0x4, 0x2, 0x20]}) 19:12:51 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r1, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="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"/2148], 0x864) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@isofs_parent={0x14, 0x2, {0x1, 0x2, 0x4, 0x338, 0xd61b, 0xd05b}}, &(0x7f0000000200), 0x1000) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0xb) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x5, 0x3}}, './file1\x00'}) pwrite64(r2, &(0x7f0000000100)="9f6f141508d87703041494e944c8df0e4ea66ea856f167326b252e93ed52449e6f997b5ba9b29dd3d6566da93f24fe24755ca8aaf5ce8ac0301123ee5f127c5ada90cff0e18038961416bd8796f1de52e60062798a28e0a3fa690e11cfc5e09429ff", 0x62, 0x7) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r0, 0x0) io_setup(0x5, &(0x7f0000000040)) creat(&(0x7f0000000080)='./file1\x00', 0x120) splice(r1, &(0x7f0000000240)=0x2, r1, &(0x7f0000000280)=0x1010000000000000, 0x4, 0x0) 19:12:51 executing program 1: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0xff, 0x4, 0x0, 0x0, 0x0, 0x0, 0x284c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x5, 0x0, 0x7, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r1 = request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000300)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xb8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX\xf6\x88\x19\x8e\xa8k\xcd\xdf\xc9\x15\xd1\x8fM\x0e\xe9\x11:\xab\xb2V\xce\xd7.\x90x\x1e\x96\xa2\x8a\xa1\x8f\xdf\xa2\xcc\xbf\x8e\x87\x86<\xf2\x88K[W~\xdfP\x1e\xbd\x8f\xf8U\";`y+&\x86\xa0\xf2R\xf8\x90\xe7\xfd\xa3\x12', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x4, 0x4, 0x3f, 0x3, 0x0, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x400000000000000, 0x1a8000000000000}, 0x2408, 0x8, 0x1, 0x12, 0x28000, 0x7, 0x1ff, 0x0, 0x5, 0x0, 0x81}, 0x0, 0xf, r0, 0x9eb253de82c43abc) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) request_key(&(0x7f0000000180)='cifs.spnego\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f00000003c0)='syz', r1) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) keyctl$KEYCTL_MOVE(0x1e, r1, r1, r1, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000200)=@secondary) add_key$fscrypt_v1(&(0x7f0000001380), &(0x7f00000013c0)={'fscrypt:', @desc4}, &(0x7f0000001400)={0x0, "bd8defb1704e87ab7098cb03b1be8a4bd32289149f71be2939f542d38d729fb6be9bd9afc6914aa5f95182b032aefece49757d62bb07d711b0aa28cf07a58ba7"}, 0x48, r2) request_key(&(0x7f0000000080)='trusted\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000140)='/\x00', r2) 19:12:51 executing program 2: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', 0x0, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:12:51 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c"}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:12:52 executing program 3: write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfdef) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x80816, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000340)=""/33, 0x21, 0x41, &(0x7f0000000380)=@abs={0x1, 0x0, 0x4e23}, 0x6e) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='fdinfo/4\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000005c0)=ANY=[@ANYBLOB="27000000001f210c0000000100000000020018e26899d192b6fdb99185f2ea246a0f995b9c14213b91faa6b4ef2590d42988a48a7893ca69f4a7e5f4ffc64e713ce15a1f879254d370cd535339bdda21618ec00e4af5a58eb74af19a63111ad0c2b9402610464e2c2acfe35a15f796b38ed6bc6b2befca1b95953e06e37164f190f83cbedd86bd546ce091602be1ab955afbddb1cf6c2604b16f454ffcb372ec84f3849a46c51dd01e111585c8f252e6bc1229fa28cba2003c6cc04cbba1c9e2151d"], 0x14}}, 0x0) r2 = syz_io_uring_setup(0x21, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) eventfd(0x0) syz_io_uring_setup(0xabb, &(0x7f0000000200)={0x0, 0xb3fc, 0x20, 0x1, 0x29d, 0x0, r2}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000140), &(0x7f0000000300)) syz_io_uring_submit(r3, r4, &(0x7f0000000040)=@IORING_OP_ASYNC_CANCEL={0xe, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x4) io_uring_enter(r2, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = mq_open(&(0x7f0000005c00)='-@\x00', 0x42, 0x0, 0x0) mq_timedsend(r5, 0x0, 0xff7f, 0x0, 0x0) r6 = getpid() syz_open_procfs(r6, &(0x7f0000000100)='net/vlan/vlan1\x00') ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @in_args={0x4}}, './file1\x00'}) fcntl$setstatus(r1, 0x4, 0x6400) write(r1, &(0x7f0000001200), 0xffffff45) lseek(r0, 0x9df5, 0x2) 19:12:52 executing program 0: ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x94, 0x1, 0xf6, 0x0, 0x0, 0x8001, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x89040, 0x3, 0x0, 0x9, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002c80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000018800)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000015d40)=ANY=[@ANYBLOB="20001a00000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x20}}], 0x2, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000001880)=ANY=[@ANYBLOB="a0000000000007280001800c00028005000100840000000c00028005000100880000000c000280050001002f00000008000440000000090c0001800600034000000000000003ff0c0002800500010021000000060013400003000006000340000200000c00028005000100010000000600034000010000140001800800010000000000080002000a01010208000440fffffffd5cf03c6fba1e96bac815b838796a78636b26bde7b1b4ba1842ed1ce6"], 0xa0}, 0x1, 0x0, 0x0, 0x8810}, 0x0) r1 = getpid() epoll_create(0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x3ff, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x100, 0x2}, 0xe) sendmsg$NL80211_CMD_PROBE_CLIENT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x5c, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0x4208, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f6600006530202ab02020205ed92d2b2426282b2d5d205c202b23402b219b2e7d2d203a202f6465762f6c6f6f702d636f6e74726f6c00202662200a049a69a2c25fc047d986535a476e28d697f6a490d03c29af6c2e04a0c8ed8b1fff9cfe88dd19236b37e38df7a8563de9e593a88d3a16f8bba32c3f900557f22320d46d9fae7fd67af6dae69de139fc65ce21"], 0x94) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) 19:12:52 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c"}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:12:52 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = memfd_create(&(0x7f00000000c0)='-%:\x0e', 0x0) splice(r1, &(0x7f00000007c0), r0, 0x0, 0xde, 0x0) openat(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x89) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:12:52 executing program 2: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', 0x0, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:12:52 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x7a}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:12:52 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f0000000700)=ANY=[@ANYBLOB="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", @ANYRES16=r1, @ANYBLOB="72cd000444a77000fedba0620a599934e6f1e4f73d15150000"], 0x14}, 0x1, 0x0, 0x0, 0x20008000}, 0xa3c19ca8f0097d6e) r4 = request_key(&(0x7f00000002c0)='big_key\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f0000000340)='syz', r0) add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, r4) sendfile(0xffffffffffffffff, r2, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:12:52 executing program 1: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @out_args}, './file0\x00'}) sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x800, 0x70bd2c, 0x25dfdbfe, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0xc0800}, 0x48004) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r1 = request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000380)='ext4\x00', &(0x7f00000003c0)='./file0\x00', 0x9, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="6d789e0447dc83bed8d168d7ecbd2ee9354283eb3ffbcff666f740175a86907093ed34617cbcd06b1ddf2b4d9749d5757b62de11785fb4e6bd3b5fa39b2d58eeb84a39f67f75bb1577b2218d9f155112a3211ce2ab29d51ac2a31ea85c8e2dfe99b3b996a36d36b89b731dfbc292c40362e8f6f38c77dc01be208bc544be1ab90c48f12b05ce618eff091d3dea8cb79e67aaa7fec6b94943628a7856ee34ff0c6a1d8be471b237871b0d7020b3", 0xad, 0xbd7e}], 0x2000, &(0x7f00000005c0)={[{@oldalloc}, {@lazytime}, {@data_err_ignore}, {@auto_da_alloc}], [{@smackfsroot={'smackfsroot', 0x3d, ':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX'}}, {@uid_gt={'uid>', 0xffffffffffffffff}}, {@smackfsfloor={'smackfsfloor', 0x3d, '['}}, {@pcr={'pcr', 0x3d, 0x24}}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) request_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', r1) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:12:52 executing program 3: ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x90101, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1800810, 0x0) utimes(0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000280)=ANY=[@ANYRESHEX, @ANYRES32=r1, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00./file0\x00']) openat(r2, &(0x7f0000000200)='./file0\x00', 0x40000, 0x188) mount$cgroup(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)={[{@subsystem='freezer'}]}) umount2(&(0x7f00000000c0)='./file0\x00', 0x2) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f00000002c0)=ANY=[@ANYBLOB="0100"/12, @ANYRES32, @ANYBLOB]) fsmount(r0, 0x1, 0x71) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000240)={'wlan1\x00'}) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000240)={0xf800, 0x0, 0x0, 0x0, 0x1}, 0xc) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @link_local}, 0x28, {0x2, 0x0, @empty}}) socket$inet(0x2, 0x1, 0x0) fsmount(0xffffffffffffffff, 0x1, 0x4) stat(&(0x7f0000000180)='./file0\x00', 0x0) 19:13:07 executing program 0: ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x94, 0x1, 0xf6, 0x0, 0x0, 0x8001, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x89040, 0x3, 0x0, 0x9, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002c80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000018800)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000015d40)=ANY=[@ANYBLOB="20001a00000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x20}}], 0x2, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000001880)=ANY=[@ANYBLOB="a0000000000007280001800c00028005000100840000000c00028005000100880000000c000280050001002f00000008000440000000090c0001800600034000000000000003ff0c0002800500010021000000060013400003000006000340000200000c00028005000100010000000600034000010000140001800800010000000000080002000a01010208000440fffffffd5cf03c6fba1e96bac815b838796a78636b26bde7b1b4ba1842ed1ce6"], 0xa0}, 0x1, 0x0, 0x0, 0x8810}, 0x0) r1 = getpid() epoll_create(0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x3ff, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x100, 0x2}, 0xe) sendmsg$NL80211_CMD_PROBE_CLIENT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x5c, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0x4208, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f6600006530202ab02020205ed92d2b2426282b2d5d205c202b23402b219b2e7d2d203a202f6465762f6c6f6f702d636f6e74726f6c00202662200a049a69a2c25fc047d986535a476e28d697f6a490d03c29af6c2e04a0c8ed8b1fff9cfe88dd19236b37e38df7a8563de9e593a88d3a16f8bba32c3f900557f22320d46d9fae7fd67af6dae69de139fc65ce21"], 0x94) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) 19:13:07 executing program 4: r0 = creat(&(0x7f00000000c0)='./file2\x00', 0x0) fcntl$setlease(r0, 0x400, 0x1) fcntl$setown(r0, 0x8, 0xffffffffffffffff) creat(&(0x7f0000000040)='./file2\x00', 0x0) creat(&(0x7f0000000000)='./file2\x00', 0x1e) 19:13:07 executing program 3: getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000300)}], 0x1, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x40010060, 0x0, {0x3}}, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = accept(r0, &(0x7f0000000040)=@pppoe={0x18, 0x0, {0x0, @remote}}, &(0x7f0000000140)=0x80) vmsplice(r3, &(0x7f0000000500)=[{&(0x7f00000001c0)="4fce1e40ab976fb37ae10b06f13513f9ab8df9c51447cc1de31012f80249a1ba5c116f92939d455907c872b1c559b1f04bcf89591faf", 0x36}, {&(0x7f0000000200)="c476a4a8afec8326c0baa3577c9290249e95d0442780c24fa47388b644c287643f", 0x21}, {&(0x7f0000000240)="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", 0xff}, {&(0x7f0000001e00)="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", 0x1000}, {&(0x7f0000000400)="c7ba923f3cf85e0f14364f1a98bfd77f60b1462dede47af70d61938bdd7079ec44dc41e718aaadd8317dbbb14fb1ab73f88f7572cac6725b61438f2c6a991c21090be313e2e63a8cdda4662af40cd5a5181ca2a9a9297316c3d5ac5acabe749b438ab546bb08b148b241005c300f5a203813475fec8ad9c688fe54d9febbe180f27970b4a72046d9d000b183914e9d7074ccc5a9d1a83fa9a9173a69d430a9da6e6423a2d98770a27f6f20a5c6520317c5b428906512263321902fee20acc8aba5c5e44f2e9df739e06bc4e86944b4f027af1d254aa555f721c7ae3df2a515234c6619bb9bb395a6adae71475d3ef2b8d79d17c43a5a897d2e6a3373b2fc95", 0xff}, {&(0x7f0000000340)="e5530cb17b85c60e2c73235da605aea8cdd0b3bad43b274fce063dad6322", 0x1e}], 0x6, 0x8) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000001080)={0x3, &(0x7f0000000000)=[{0x401, 0x7, 0x9, 0xffffffff}, {0xb638}, {0x1e3, 0x0, 0x4, 0xcd89}]}) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) getitimer(0x1, &(0x7f0000000180)={{0x0, 0x0}}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000d40)=ANY=[@ANYRES16=r4], 0x662) 19:13:07 executing program 2: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', 0x0, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:13:07 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x02U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:13:07 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0/file0\x00', 0x911802, 0x140) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) openat$hpet(0xffffffffffffff9c, 0x0, 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000009640)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f000000aa40)={0x0, 0x0, "c009b39830e4109622d7a29d0bd42e6d365c8384f665a2104b6faaa5427626b93311e77f0de4211e1217bc355a5246327eb7ba126bf7e4adb45535a4d9757c77f555e42c9254e9f9089be590271f821f5f6b632da2dabf1d6e618629da57a34a33f5e913338e628f32d84f60dbb9f94b70f1828e7d652bb2443c02901738d15cd72d14288f0d47dfe96e49988d0402f96628f97be361723e018daf71ab695fa4726664c00ec9aa53b8c092760da4cd088f03fad6504eceb8949dc35abc6c9f51916777bc38aa3669fb220546dbd1024eb87da205b46ec35180a8fcb898160855b5044023da75f2b1f285c1462a8afa95492a14be3f42052ff535612d226506a0", "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"}) r7 = mq_open(&(0x7f0000001200)='G\x9d\xbb\x8a\\\x18\xd1\x04\x80\xd6\xea\xb0D\x83\xe8By\xb0\x1b4P\x1c^\x11\x01\x04\x00\x00\x97l', 0x42, 0x15a, 0x0) flistxattr(r7, &(0x7f0000001140)=""/76, 0x4c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002e00)={0x7, [{}, {}, {0x0, r4}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2, 0x0}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {0x0, r4}, {0x0, r5}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {0x0}, {}, {}, {0x0, r5}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {r3}], 0x4, "9755154351ac9a"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000013c0)={0x0, ""/256, 0x0}) syz_io_uring_setup(0x7243, &(0x7f0000000600)={0x0, 0xff69, 0x20, 0x2, 0x24}, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000ff6000/0x1000)=nil, &(0x7f0000000500), &(0x7f0000000540)) dup3(r1, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000000140)={0x0, [{}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r19}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {0x0, r17}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r16}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {r23}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r21}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r22}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r13}, {}, {}, {}, {}, {}, {}, {0x0, r18}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r20}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}], 0x7f, "9656c75f04ba4d"}) lseek(r1, 0x0, 0x2) r24 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r24, 0x0, r1, 0x0, 0x200f5ef, 0x0) 19:13:07 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x1, 0x8802) write$evdev(r0, &(0x7f0000000080)=[{{0x77359400}, 0x1, 0x9, 0x2}], 0x18) 19:13:07 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x0, 0x3f000000) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000140)=""/114, 0x72}, {&(0x7f00000002c0)=""/216, 0xd8}, {&(0x7f0000000500)=""/251, 0xfb}, {&(0x7f00000001c0)=""/73, 0x49}], 0x4, 0x2, 0x80000001) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000003c0)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000080)) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r1, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:13:07 executing program 1: ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x94, 0x1, 0xf6, 0x0, 0x0, 0x8001, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x89040, 0x3, 0x0, 0x9, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002c80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000018800)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000015d40)=ANY=[@ANYBLOB="20001a00000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x20}}], 0x2, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000001880)=ANY=[@ANYBLOB="a0000000000007280001800c00028005000100840000000c00028005000100880000000c000280050001002f00000008000440000000090c0001800600034000000000000003ff0c0002800500010021000000060013400003000006000340000200000c00028005000100010000000600034000010000140001800800010000000000080002000a01010208000440fffffffd5cf03c6fba1e96bac815b838796a78636b26bde7b1b4ba1842ed1ce6"], 0xa0}, 0x1, 0x0, 0x0, 0x8810}, 0x0) r1 = getpid() epoll_create(0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x3ff, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x100, 0x2}, 0xe) sendmsg$NL80211_CMD_PROBE_CLIENT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x5c, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0x4208, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f6600006530202ab02020205ed92d2b2426282b2d5d205c202b23402b219b2e7d2d203a202f6465762f6c6f6f702d636f6e74726f6c00202662200a049a69a2c25fc047d986535a476e28d697f6a490d03c29af6c2e04a0c8ed8b1fff9cfe88dd19236b37e38df7a8563de9e593a88d3a16f8bba32c3f900557f22320d46d9fae7fd67af6dae69de139fc65ce21"], 0x94) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) 19:13:07 executing program 2: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, 0x0, r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:13:07 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x03U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:13:07 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:13:07 executing program 0: ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x94, 0x1, 0xf6, 0x0, 0x0, 0x8001, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x89040, 0x3, 0x0, 0x9, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002c80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000018800)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000015d40)=ANY=[@ANYBLOB="20001a00000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x20}}], 0x2, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000001880)=ANY=[@ANYBLOB="a0000000000007280001800c00028005000100840000000c00028005000100880000000c000280050001002f00000008000440000000090c0001800600034000000000000003ff0c0002800500010021000000060013400003000006000340000200000c00028005000100010000000600034000010000140001800800010000000000080002000a01010208000440fffffffd5cf03c6fba1e96bac815b838796a78636b26bde7b1b4ba1842ed1ce6"], 0xa0}, 0x1, 0x0, 0x0, 0x8810}, 0x0) r1 = getpid() epoll_create(0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x3ff, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x100, 0x2}, 0xe) sendmsg$NL80211_CMD_PROBE_CLIENT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x5c, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0x4208, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f6600006530202ab02020205ed92d2b2426282b2d5d205c202b23402b219b2e7d2d203a202f6465762f6c6f6f702d636f6e74726f6c00202662200a049a69a2c25fc047d986535a476e28d697f6a490d03c29af6c2e04a0c8ed8b1fff9cfe88dd19236b37e38df7a8563de9e593a88d3a16f8bba32c3f900557f22320d46d9fae7fd67af6dae69de139fc65ce21"], 0x94) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) 19:13:22 executing program 1: ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x94, 0x1, 0xf6, 0x0, 0x0, 0x8001, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x89040, 0x3, 0x0, 0x9, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002c80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000018800)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000015d40)=ANY=[@ANYBLOB="20001a00000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x20}}], 0x2, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000001880)=ANY=[@ANYBLOB="a0000000000007280001800c00028005000100840000000c00028005000100880000000c000280050001002f00000008000440000000090c0001800600034000000000000003ff0c0002800500010021000000060013400003000006000340000200000c00028005000100010000000600034000010000140001800800010000000000080002000a01010208000440fffffffd5cf03c6fba1e96bac815b838796a78636b26bde7b1b4ba1842ed1ce6"], 0xa0}, 0x1, 0x0, 0x0, 0x8810}, 0x0) r1 = getpid() epoll_create(0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x3ff, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x100, 0x2}, 0xe) sendmsg$NL80211_CMD_PROBE_CLIENT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x5c, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0x4208, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f6600006530202ab02020205ed92d2b2426282b2d5d205c202b23402b219b2e7d2d203a202f6465762f6c6f6f702d636f6e74726f6c00202662200a049a69a2c25fc047d986535a476e28d697f6a490d03c29af6c2e04a0c8ed8b1fff9cfe88dd19236b37e38df7a8563de9e593a88d3a16f8bba32c3f900557f22320d46d9fae7fd67af6dae69de139fc65ce21"], 0x94) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) 19:13:22 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x04U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:13:22 executing program 3: syz_io_uring_setup(0x6c75, &(0x7f00000002c0)={0x0, 0x0, 0x2}, &(0x7f0000fef000/0x11000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x20, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) syz_emit_ethernet(0x3e, &(0x7f00000003c0)=ANY=[@ANYBLOB="0180c2000000aaaa3f62d9aaaaa20086dd6096153f00082c0020010000190000000000000000000000ff0200000000000000000000000000019000b07800"], 0x0) syz_emit_ethernet(0xb2, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa8f2d3e29805a8100010008050c54f38494e8fa0e9bdb6df9c57387585c1a01d9fd031469b927216f82c6ad5678bc309f2451dbaedcec166fa0e76656043b5caf0fecb6f250cfc73863e5f6d77c25c2ff0300005cdcd2d01c544f3a484f9da4a7ac8a6525c12ceedeb27ba32abe2b328e42e96068e5412d51108defb640cc448e56e933c4b6a3a408f10800000000000000a08368c155638edeb1ad977d0a87c0c7c1fba086c442dc49042faa"], &(0x7f0000000000)={0x0, 0x3, [0x239, 0xbb6, 0xdfa, 0x22e]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000000, 0x13, 0xffffffffffffffff, 0x0) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x100010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(r0, 0x0, &(0x7f0000000180)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x0, 0x0, @fd, 0xcf, 0x0, 0x8, 0x0, 0x1}, 0x7fffffff) r2 = fork() r3 = fork() ptrace(0x4207, r3) ptrace$setopts(0x4206, r2, 0x10001, 0x0) syz_emit_ethernet(0x57, &(0x7f0000000240)=ANY=[@ANYBLOB="0000080000000180c20000038100310088480000000000004000f4025b8198013ae035d62ced80ff034c9dd4b0a7ac5e898935b90e387bbfb992e98e24858a9590ac037bcf5ffc06"], 0x0) fork() ptrace(0x10, r2) r4 = fork() ptrace(0x10, r4) waitid(0x1, r4, &(0x7f00000001c0), 0x8, &(0x7f00000002c0)) 19:13:22 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000080)={0x88318d00, 0x0, 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r2, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f00000001c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000940)=ANY=[@ANYBLOB="a4030000", @ANYRES16=0x0, @ANYBLOB="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"], 0x3a4}, 0x1, 0x0, 0x0, 0x8054}, 0x4001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000200), r1) 19:13:22 executing program 7: fstat(0xffffffffffffffff, &(0x7f0000000000)) r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x2, 0x18500) sendfile(r0, 0xffffffffffffffff, &(0x7f00000000c0)=0x10000, 0x1) r1 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x3, 0x2007, @fd_index=0x9, 0x1, 0x0, 0x0, 0x2, 0x0, {0x0, r1}}, 0x8) r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4, 0x100010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r2, 0x0, &(0x7f0000000480)=@IORING_OP_WRITEV={0x2, 0x1, 0x4004, @fd_index=0x9, 0x9, &(0x7f0000000440)=[{&(0x7f0000000140)="c9c983acccbf0a5e8288e51e03a07166cb259604ca8fcf4ecaa0390b892ad9de52f7c957bfba225b94bf44e0ab306ce5c3", 0x31}, {&(0x7f0000000180)="24fb477c91b51e9482b04d8db5a4c8b8957c671001074cf7170a23b4223e1fc6392958bbd7286bb0ed429523b72ec6a7e56275474dccfa4096fc57eb764e0ae3078f76beb640ba8772528355c61470a2ac156d22b6c34db3f65592e0b1d8a0272770761af0379dfb9f7e95a8dfd5ab9df3b23525ee511fe4c0dad9d49ad74dc254668cddcae9ca54eb95ff95807ad604b99891d134d568269178388808835e805efb5adc7a2f45395f438f3f6cb95d165a5311809a869d09f2763dae242ab1a4f932e5ef037113e6b8fc2d7efdbdad54bbc431ad64880042dd754f31bbb1a8d93c", 0xe1}, {&(0x7f0000000280)="c0ee50327ab32006c6ecbb08822d57ede47bd463623761e9c01ee2d4b21d0b0e6dbf310fc5e17fed1054178caf84bde79b86a7ad9a44bb9c360f36f50c5ee63fb43f0313c4e7a2bb43dfedf07e5a77d4176a271baa213fce367c841ffe43d5b810da2154238eea2ca9964ea04b9cfcd72d7071ec0dfaef5d759b30df3c1fab96893514725caa8a9de00ea234b1bf012279ad1b89079805f1428d7453e4a892001decb13ede883a3fd0f9922960b9161ba8042f3893cc37e20fa0408379fae62b170cd3", 0xc3}, {&(0x7f0000000380)="f461b3a0653f2d22fe2fdd6d02efacd86e941d548794291de2c029c78d7cffde0a92b6c89e46d839c30a886389d6f71e2596394ee8cee664e750f03d2767b0b4da738d71c0d0e47cc618cd3e81c677c6155f8c1a02ea0954853fb958bf18adf952546d36656a106e7da18c7d326fee486056531e37c0f6c10764c22986312abb768566b9bb03b516bc68", 0x8a}], 0x4, 0x10, 0x0, {0x1}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000004c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) close_range(r3, r0, 0x2) ioctl$BTRFS_IOC_BALANCE_V2(r0, 0xc4009420, &(0x7f0000000500)={0x11, 0x7, {0xff, @struct={0x1, 0x1}, 0x0, 0xf7, 0x81, 0xf5c, 0x5e, 0x1, 0x4, @usage=0x5, 0x8, 0x100000, [0x3, 0x9697, 0x80000000, 0xab, 0x105, 0x81]}, {0x100000000, @usage=0x8ea3, 0x0, 0x0, 0x2, 0x3, 0x7, 0x8, 0x44, @struct={0x10000, 0x8000}, 0x2, 0x4, [0x4, 0xffffffffffffffe0, 0x3d, 0x0, 0x3, 0x101]}, {0x3f, @usage=0x18, 0x0, 0x8, 0x1f, 0x400, 0x20, 0x6, 0x10, @struct={0x40, 0x4}, 0x800, 0x19, [0x521, 0x6, 0x25862573, 0xe8, 0x20, 0x4]}, {0xc9, 0x3, 0xa7}}) r4 = syz_open_dev$hiddev(&(0x7f0000000900), 0x7fff, 0x0) pread64(r4, &(0x7f0000000940)=""/131, 0x83, 0x401) r5 = syz_io_uring_setup(0x6e56, &(0x7f0000000a00)={0x0, 0xa213, 0x8, 0x2, 0x390, 0x0, r3}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000a80), &(0x7f0000000ac0)=0x0) syz_io_uring_submit(r2, r6, &(0x7f0000000b40)=@IORING_OP_LINK_TIMEOUT={0xf, 0x7, 0x0, 0x0, 0x0, &(0x7f0000000b00)={0x0, 0x989680}, 0x1, 0x1, 0x0, {0x0, r1}}, 0xff) r7 = syz_io_uring_setup(0x5c84, &(0x7f0000000b80)={0x0, 0xcdf0, 0x0, 0x1, 0x97, 0x0, r5}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000c00), &(0x7f0000000c40)) io_uring_enter(r7, 0x2ab5, 0x840e, 0x0, &(0x7f0000000c80)={[0x2]}, 0x8) r8 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000cc0), 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2000002, 0x1010, r8, 0x8000000) io_uring_enter(r5, 0x5de5, 0x51fc, 0x1, &(0x7f0000000d00)={[0x6]}, 0x8) ioctl$KDFONTOP_COPY(r8, 0x4b72, &(0x7f0000001140)={0x3, 0x0, 0x12, 0x17, 0x166, &(0x7f0000000d40)}) 19:13:22 executing program 2: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, 0x0, r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:13:22 executing program 0: ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x94, 0x1, 0xf6, 0x0, 0x0, 0x8001, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x89040, 0x3, 0x0, 0x9, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002c80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000018800)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000015d40)=ANY=[@ANYBLOB="20001a00000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x20}}], 0x2, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000001880)=ANY=[@ANYBLOB="a0000000000007280001800c00028005000100840000000c00028005000100880000000c000280050001002f00000008000440000000090c0001800600034000000000000003ff0c0002800500010021000000060013400003000006000340000200000c00028005000100010000000600034000010000140001800800010000000000080002000a01010208000440fffffffd5cf03c6fba1e96bac815b838796a78636b26bde7b1b4ba1842ed1ce6"], 0xa0}, 0x1, 0x0, 0x0, 0x8810}, 0x0) r1 = getpid() epoll_create(0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x3ff, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x100, 0x2}, 0xe) sendmsg$NL80211_CMD_PROBE_CLIENT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x5c, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0x4208, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f6600006530202ab02020205ed92d2b2426282b2d5d205c202b23402b219b2e7d2d203a202f6465762f6c6f6f702d636f6e74726f6c00202662200a049a69a2c25fc047d986535a476e28d697f6a490d03c29af6c2e04a0c8ed8b1fff9cfe88dd19236b37e38df7a8563de9e593a88d3a16f8bba32c3f900557f22320d46d9fae7fd67af6dae69de139fc65ce21"], 0x94) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) (fail_nth: 1) [ 2799.026230] FAULT_INJECTION: forcing a failure. [ 2799.026230] name failslab, interval 1, probability 0, space 0, times 1 [ 2799.029088] CPU: 1 PID: 19097 Comm: syz-executor.0 Not tainted 5.10.230 #1 [ 2799.030741] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2799.033189] Call Trace: [ 2799.033825] dump_stack+0x107/0x167 [ 2799.034709] should_fail.cold+0x5/0xa [ 2799.035793] ? kobject_uevent_env+0x22b/0xfd0 [ 2799.036861] ? dev_uevent_filter+0xd0/0xd0 [ 2799.037866] should_failslab+0x5/0x20 [ 2799.038766] kmem_cache_alloc_trace+0x55/0x320 [ 2799.040085] ? dev_uevent_filter+0xd0/0xd0 [ 2799.041111] kobject_uevent_env+0x22b/0xfd0 [ 2799.042215] ? software_node_notify+0xf8/0x2f0 [ 2799.043438] device_del+0xa8f/0x1180 [ 2799.044324] ? clone_private_mount+0x370/0x370 [ 2799.045409] ? uevent_show+0x390/0x390 [ 2799.046346] device_unregister+0x11/0x30 [ 2799.047130] bdi_unregister+0x2e4/0x470 [ 2799.047621] del_gendisk+0x7c8/0x990 [ 2799.048084] ? disk_events_poll_msecs_store+0x1f0/0x1f0 [ 2799.048739] ? lo_fallocate.isra.0+0x180/0x180 [ 2799.049302] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2799.049900] loop_control_ioctl+0x3b5/0x480 [ 2799.050427] ? loop_lookup+0x1d0/0x1d0 [ 2799.050945] ? selinux_file_ioctl+0xb6/0x270 [ 2799.052212] ? loop_lookup+0x1d0/0x1d0 [ 2799.053140] __x64_sys_ioctl+0x19a/0x210 [ 2799.054108] do_syscall_64+0x33/0x40 19:13:22 executing program 4: r0 = creat(&(0x7f0000000080)='./file2/file0\x00', 0x158) fcntl$setlease(r0, 0x400, 0x1) fcntl$setown(r0, 0x8, 0xffffffffffffffff) creat(&(0x7f0000000040)='./file2\x00', 0x0) creat(&(0x7f0000000000)='./file2\x00', 0x0) r1 = syz_io_uring_setup(0x4d4f, &(0x7f0000000240), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000000, 0x13, r1, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) io_uring_enter(r1, 0x58af, 0x0, 0x2, 0x0, 0x0) ioctl$BTRFS_IOC_FS_INFO(r1, 0x8400941f, &(0x7f0000000100)) [ 2799.055067] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2799.056436] RIP: 0033:0x7f0ba3f92b19 [ 2799.057341] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2799.062525] RSP: 002b:00007f0ba1508188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2799.064669] RAX: ffffffffffffffda RBX: 00007f0ba40a5f60 RCX: 00007f0ba3f92b19 [ 2799.066421] RDX: 0000000000000000 RSI: 0000000000004c81 RDI: 0000000000000007 [ 2799.068420] RBP: 00007f0ba15081d0 R08: 0000000000000000 R09: 0000000000000000 [ 2799.070137] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2799.072072] R13: 00007fff9053360f R14: 00007f0ba1508300 R15: 0000000000022000 19:13:22 executing program 3: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_delete(0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000009c0)={0x0, 0x0}) setpgid(0x0, r1) r2 = signalfd(r0, &(0x7f0000000100)={[0x2]}, 0x8) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x3, 0xd, 0x0, 0x0, 0x2, 0xc2200, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x20, 0x0, @perf_config_ext={0x2, 0x100}, 0x0, 0x3598b8b3, 0x9, 0x0, 0x0, 0x4, 0x1, 0x0, 0x55c, 0x0, 0x5}, r1, 0x4, r2, 0x8) capset(&(0x7f0000000000)={0xc92bfb053a14a5a}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) fcntl$setlease(r2, 0x400, 0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0xe, 0x1, @tid=r3}, &(0x7f0000000340)=0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='setgroups\x00') pread64(r5, &(0x7f00000001c0)=""/133, 0x85, 0x57f) read(r5, &(0x7f00000002c0)=""/122, 0x7a) timer_create(0x0, &(0x7f0000000000)={0x0, 0x1c, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000480)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) socket$netlink(0x10, 0x3, 0x0) timer_create(0x4, &(0x7f0000000400)={0x0, 0x3d, 0x0, @tid=r1}, &(0x7f0000000440)) timer_gettime(r4, &(0x7f00000000c0)) clone3(&(0x7f00000001c0)={0x40182300, 0x0, 0x0, 0x0, {0x34}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:13:22 executing program 2: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, 0x0, r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:13:22 executing program 1: ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x94, 0x1, 0xf6, 0x0, 0x0, 0x8001, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x89040, 0x3, 0x0, 0x9, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002c80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000018800)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000015d40)=ANY=[@ANYBLOB="20001a00000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x20}}], 0x2, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000001880)=ANY=[@ANYBLOB="a0000000000007280001800c00028005000100840000000c00028005000100880000000c000280050001002f00000008000440000000090c0001800600034000000000000003ff0c0002800500010021000000060013400003000006000340000200000c00028005000100010000000600034000010000140001800800010000000000080002000a01010208000440fffffffd5cf03c6fba1e96bac815b838796a78636b26bde7b1b4ba1842ed1ce6"], 0xa0}, 0x1, 0x0, 0x0, 0x8810}, 0x0) r1 = getpid() epoll_create(0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x3ff, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x100, 0x2}, 0xe) sendmsg$NL80211_CMD_PROBE_CLIENT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x5c, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0x4208, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f6600006530202ab02020205ed92d2b2426282b2d5d205c202b23402b219b2e7d2d203a202f6465762f6c6f6f702d636f6e74726f6c00202662200a049a69a2c25fc047d986535a476e28d697f6a490d03c29af6c2e04a0c8ed8b1fff9cfe88dd19236b37e38df7a8563de9e593a88d3a16f8bba32c3f900557f22320d46d9fae7fd67af6dae69de139fc65ce21"], 0x94) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) 19:13:22 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x204047c, &(0x7f0000000200)={[{@commit}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) dup2(r0, 0xffffffffffffffff) openat(r0, &(0x7f0000000040)='./file0\x00', 0x81, 0x10c) 19:13:22 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x05U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:13:22 executing program 4: r0 = creat(&(0x7f00000000c0)='./file2\x00', 0x0) fcntl$setlease(r0, 0x400, 0x1) fcntl$setown(r0, 0x8, 0xffffffffffffffff) creat(&(0x7f0000000040)='./file2\x00', 0x0) creat(&(0x7f0000000000)='./file2\x00', 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x20000, 0x0) [ 2799.242739] EXT4-fs (sda): re-mounted. Opts: commit=0x0000000000000000,,errors=continue 19:13:22 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8120}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x5) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000002000000483600002094d84900"/28], 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x1, 0x3, 0x0, 0x6c, 0x0, 0xe18a, 0x8100, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x62}, 0x2310, 0x0, 0x3, 0x8, 0x1f, 0x0, 0x4, 0x0, 0x87}, 0xffffffffffffffff, 0x0, r1, 0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) fallocate(r2, 0x0, 0x0, 0x5) openat(r2, &(0x7f0000000000)='./file1\x00', 0x40c140, 0x10) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$RTC_VL_CLR(r3, 0x7014) ioctl$BTRFS_IOC_ADD_DEV(r0, 0x5000940a, &(0x7f0000000500)={{}, "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"}) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x80) sendfile(0xffffffffffffffff, r4, 0x0, 0x100000001) [ 2799.262239] EXT4-fs (sda): re-mounted. Opts: commit=0x0000000000000000,,errors=continue 19:13:22 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x06U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:13:22 executing program 2: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:13:37 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8120}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x5) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000002000000483600002094d84900"/28], 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x1, 0x3, 0x0, 0x6c, 0x0, 0xe18a, 0x8100, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x62}, 0x2310, 0x0, 0x3, 0x8, 0x1f, 0x0, 0x4, 0x0, 0x87}, 0xffffffffffffffff, 0x0, r1, 0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) fallocate(r2, 0x0, 0x0, 0x5) openat(r2, &(0x7f0000000000)='./file1\x00', 0x40c140, 0x10) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$RTC_VL_CLR(r3, 0x7014) ioctl$BTRFS_IOC_ADD_DEV(r0, 0x5000940a, &(0x7f0000000500)={{}, "9db5875a53f57534a4c9fdeb65522ff52b36df6902ff2e74a1ff17130d4d2b87ae34264908d5648e3497c3c2383dfec5314c517af30bdb313232948ea80b5d361b8e9b4727d97ad3e52e52ba89863c3f398c42bf8622f5168ee31be2fd245173d7a13374069c68ce6cd0d70b8152916528c4d4174bf00580cdee6e3e299ad0dd55ad997957bd426f08cf8a1e76f2c0f69176a5bd93eceef25bc5d39055030be0a2eeb7c17cc4112c9f3ee47f7b368bbb6871fc139744bc2b675eaafdd7d78790cb1a27ab139f8c9f64a6fa9968d8310e7e4f36dee5d1a8a1b6936f4fd167d2e3d7a360e6e2c9fc7b78645530b238ce38f2614323e6ae0c75207d6712b516eb5428742d3d9b7a9fc25e23505d78d4f9b583ce1cf8536649c31d2ea206181b83cf6a1556b13ee15efed799118e843dae585499590a7b65533fb938f04d5fba185b5793d5186405750593679656ad8ae43416d597364a1493a03ff02fa366409349cd6b63108d1e5d97f0872d8696d9699d4642b225061caa4e4d1397045223b3bf367a5a6e909785ba625576858b73b8f8949a0c9f64d5898d05367a6f75939d6dd5aacf90e198f3819e5e9e197fa33bd37a672d5c3aaaeb8d8a723d0185d274ae0c0ab651c2d347ef3ba34684e5d3eaf901dcda014b95b77639e11a640b60dbb832e331cc1af8474dd125b0d3cba913ac373240c9ac1b2010107c5087239ccaad0429a0a0e492a7a56071f627da797a5a47da1747e62adcb2c25d166c12ed492fb5fca07fc04d7aeddcf0b191d181e54813fc530ab7c92ea0c944460a2801433e61664199e1ba81cf37ec10ed93c01ebb2aa895dfe3cdcf5dbafc290241795082ea9d2feb2bc04937693ddb95f69536be80add4650fbb92fe97089b3ad3c26117d26d8cbbfb6aabdfe511d5cf4151e9e50c87f54d7a6bc9b7edf7e41f91e9aad4872fe23478dea96ebc57f103f5b2d2d7f9176a56b3d6af8165ba409b3dd1161374addc33f9a278575e617ebe5417379d72e1220241c85415dda9e26f1eb5b13fa79a5631be8e05bf46c3ff9056cc566c2ed7a0c5b809eaa213a5b505d7d689b59beef4bc8ebe47bf4ef4fbccbdaf57331f013c37e4a1be0f030a6ecdfe610a45756f852be772ca4058bcf67e4544fcc87febdb865168ee31814b3f82f8a365bceb73e235d3b345a7051f75f843f63935a0a4892847ed2fa14d9effc5037e15462f58e53159828f2e800a5aa1d73a2ed45006968351758367660b43f4b07964a0d4d75e12466eba6a98a8961f77811ab5b12b7708214eaa6418d65e358959ac4078e2a05953ef715d1e844d91a9761dc0a91f652d480c7ee95febfa574488fca0425c27f774116d9f099240d775a66e5d5627d3e250a4f0c66bf565d0e207d66d17cc4fb29ac782b66a542f6de3d6ae45dab33aba06471c0bf6c0327524f4392b17fe68815dab8b8801b1be34a813aa031cc84b2e66794cd1328bf6819e325d633ed652fe0b2c90f9b2498f54a1e85a0b224f70d0c19ee80322722002df20fc2fabb0b7f67e98b6c056321e0a2c0b509cef2b3d8f51f4c3552356a699940ea43e5e40456dbaef928f1243c6d93f7ed95c2046a0cc5c3535518b96776c8f206ae3d0f18557d0cc626057189c147695c1789c27e115dc750f83aedeb2be21bac07c1cf3c458c2a21ee15028c3f2f6a814d7e80ec18427224c2b5947868e0afaf8075ed90a91ed9244e7263b81f0ec7a477c4d17c137b3071004a8a5cd1399d7be40cae2e3ce4dfb83d6d740c5a721cbece3f50d19ca1e637e6fad4e73c1568dab3675bde7b299b0b6d862e7c42828f6cc324281541c580d2df042424dfb05bf271fb1f9fc45d1dfd1aa33b14a4a99d6cfd04461d894c75f416ea395b9ad0a522802a679802e5fc65e2fc6210377ce358c2b064c756fff693bca650c37f6e1b6c1ec8be3e8cb4d99b4124a1f236348eb41c33f9a782a0e78fe969a8111c43a49c34fcca571873e26768e0e8215bcb08ce9e9ceac77d7c0bffde4ab979b94b8db52adec7f5db4c9211c14a324d6f6b55bef6021a51b0c45f1436b8050edc7710bee442fce3f1a07b650cd36b3e95dc939cf480ef55c5b0671f9aaf3692f316a511a1b53ab2908a56d71a8ac3fc44495b48d706c42eb041cf75f9bac36764f00ce0c65c595676dba90c09cf3fbe01d37744d5455dbeb30bf179916c35d3e08b124960f8e6a78c92dc5ad37838219c3a2741d7d4784db4ceac1a53da098812c527044e79c9413725b4916acc3d3029d84b99802b5e03487767bd154f0f997276c0861a3296fced31b8af23c7b2341e0098cbadeb4d7124f45996ae69e40a1c196a64f8099929984569f71b1e029d6b2ad9555e69f3c763225272998002f85f4ddadbb949986a2f66f777f5416caa2c7a0097742d9290eafa88d773f6b49bd6b0459994ea16613d5fbd88156af46292d454b680e8ad09a9b503c08dc64ad20797e331d9f39944c2c2869d250c3907ea6c72ccab74334c0057db4f120865ffee6ff5630a963319aada63bd9b0c470286cf715a6f47386198e8f07bb1ae4798aea182f7cac2e5f6cd9c203ffbf51454e2b83f9a0e32650a12cd03dc955dd5096b39a61b5e8602a5229486e987c7d653fa3f83e5339f4b65e32d5dab8c4fb3694592a2fef0dc09d93cd372d53343bb422bf1e393aa3257e8b26e0497b357fc91f47a030ab6bd7b01de32e17449e97e88b3a98667694e1722760e3970e15469ad7e105d597fb60206bd5f98356f0ba04a7542a6ad8c1e10ff6a25fab41e4614ec0837e61f50326c2f55c485c9fc15f8ead0557461dd9e91991224efa6f1bd8c10b6476099a34b4fc57d9c2c7ca165e796ad005671dec4cb16b0dec264d7de85e2537811ad9b636a1e98a279ac994445d56b341efb7514f7e3ee09eeaa75a01b2389a78e659d6c3b2a12044e0d4f2ceced75324e7788aa18abb734bbbaef3298176b87c9d14f48f5058469a42e67694a1952c6828d1212a4b2f6f20a70a44b2f4b5407204a319cf5b2318c29677acbfdb54cbcd788445e8abcd52e5d043169179bdd4e4b448c90e9e47b9eb8d81ffb8998cc2bbbdaef3efb3fd07a5d454e4361914ddaadc4d1328f4e483aafa44d1e848375b9a9dd84ddc94a7e151cbd746ea522c145c8b0e0231afe2122d51e8bd08a22eca0f3840aada38113bf6b3433d02005043aca7c6b76b829de7c2c0ab4f45ae74b8f9cbf039712b2f7d01ec5fcb46e36e487ec0fcb672efa7db846b7a64488a26c541f85cb3e0455092179eda34de02c95a0dda3d58b8625439b91f4056a12adf7ee5e1f5e4a65e4ef25d4dbc39a0ee4756874187b21eeeb7e4dc1d0c7183a8273ee4475558295055d6fb8c636cd69388948399d13553c5f9d6aaf958ceb5db60ad5519f917a0e9eab3207eb15b2649c56cfb4924b2a555859056e590945bdfa440cd85986e19afca18f6b5e35e504e4c272371a50f1e42dc45753e51d24a76bd0c1cfe1642c98727ba5d63be3f087ca1618b8aab98ea7062df0ea4ff13fb0d124a4d972f3381bdd6c35ba986678627e9cefabba3175bf71c40523a51db268e3ae8a9223ba72993e3817fd0d5f1e91c90798e91c7505adc01280157dc1acfed3799b25682dec668910686c650dbb2080ea42736fb8275d6a198efb76039c38b0821a02ab326714984a234283b1918ac8f56887f15a9e0fe3711b927631ab30abe4dbda42dd3638afba30a2a9bf4d0a8dfa858befd8bf913da7d71c420a8ca2c46c9833aeb21b391a697c051545980ed75d993afefbcc9410a2f93f4707f29fd9de95374d4c53d60c8d04c05d8ba15d29721dee27927bf72f6645bdc2c7800e57bb550f593d05b4db1fced7f8304c6ffb73010c017e69eeda0e951d40f7e1a5c486fd90fcf9344b8c347b052bb908db9e1f6fe95603dd1c976c150dda83e0013eaa58ba8ae93ca58ffc214a71f88f53a6ce5c5f635649c0e178d7bc3a2bd3a20782a1766dea4e502be52f3d89ec76cfb019424c059b38da87bbf576e83587ee0d21edc67e1d6bb8711984b32f4633914ceb4c867e21fa90f314663df7780c88c65892178b987d50f7b38fd19f2aafe21523d0dba5b9fc20a65800f848ee37ff66e21a1b571ddd149a5f11c4bf9ffaa948654a3c093a38308cb5fb701a8f584606c5bba8893961a1834677c4f2d106d7154242bda26f3b3f445a4ed58775b623d117c68333aa3771449f1f0bf49020b887aff4e222ae69654235cf6464e38df27ad0d4909d7b7cf88a0c067023035c7dfc944b9fdc274e8ca48192c41e6177032faaf7b97047aec9be16d77343bf98d4c3a0d1631b8ccd5a79d7400667969feb24788e4dc39ffecc4c874f13a02ab39dc8203b5c2ffc81447e1cdf6f3ec9ad47e464f2c54f3da70636bd668ded5098068afcdd9807f3ccdd8c764d29c0d1af274fd77d7040f0bb38d90b01738d1619d5806f31ae9c91364d6387c90d934c29736ba0493909821085411eb465f6041eb8d9b96589d37e7b373e294a87d85bd8ab2b5277f57e705ed08abff88f21bc0a213b6f4dad03274945229ee8fdf6ae01b2cbe11c958ae8a7daf984fcf884d470442e56a3a66bf33b65192bab51168142f5251fd393943de783cebe4ad4a9fce26550140bc39c6a1f9dab733b5d7815a3365c91cb88dc3ffd5b19a951f04fbfce90853d891f5bec3ede3003d4aa3ac3cde09028a03a902131a86a38af4836a4069b6e35849fbc2d7ec8cad1a4900b81c08824b5c1384564481d78e921fb2847953b67545e48d91c4a3e725bcb4111cd51c6a0d3b7688134a94cc9adc0bf12403555e5ac36e0d68ac1aca1b0c74baf50b8216821d5af88dae1522292c552fa1a0be99cbdfc5ed4325c983136959cab8df22beac77fe3973f36ec50b2dc79de0bfd159677e8f617790141e4f0edf0073e34d079cd86d94570783108a2608828a69026d69cccb24f87195e230a7d45d6bcc3e7364871fab44907c5b43ae06ae1113a8b5a6f5beccddc6e7439ca2e65640242f92b0bbc850cfe1b92e423383e3e8eecc888af5f7df8077f41a5588ed96605e3afb84bc0ccb9936d836d4f1fd94a6b8c4590850ac2e9098673ee39ad142bc496816c32c6220b392608d4d151c7a3680fcd1c6045ad5f93f0ecaf1bad306c9f4ab4e65f0dce9077e6085549df0f00aaa225778246d2e55e8f132419b43855b23b59ce63e9fa80c5470e33f0c4677652fe7041938e059c1a2f5f7f0201f42c9751f04e8f733b8c8b489355a7c472fd43947d18c86f87d7541cb3629ddcad5b8d234ced13e829f6d2a1ea5cf6646b061113b53fbb7c137a7bbdebc8d1b003c45229fbd72fd5c634601c5a6ce7607359f575ad909bc245792f7035ff0eb2b8b6b9bc65edd254da6d1cace924324950117e238e5878b8bfac46433e31dd113edc4031a8a99534da569fe268c6924113bdd65a12065be22ccff4f886af1890365a8d50a16574289ef0d08d5522290e57011e29f6956806628c2ad6d17c102ed9ed46ae5c6ed7f921dd4cef0a85f11bfcf03b2fcff26f6e69badf56161c39e419d2ce8b324e27cce6f416f6f95bd361fadc6c4da98f52f3a6280f9e11efd880dff936db133602cbc379d437a848910d2a4bb1d2b944acd84c47c6b9caff10e8d6405f0a3550d020e0bc80a0e661335cfefd80d308e91404beb4b87f539b244203cbbe327be7155b04fe6bdde07e8e34aa1dd04bb6b9c37eaa0891085d9102841bf14c216065007f5984a00bd0f8cb7890c4b3d"}) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x80) sendfile(0xffffffffffffffff, r4, 0x0, 0x100000001) 19:13:37 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\aU\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:13:37 executing program 0: ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x94, 0x1, 0xf6, 0x0, 0x0, 0x8001, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x89040, 0x3, 0x0, 0x9, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002c80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000018800)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000015d40)=ANY=[@ANYBLOB="20001a00000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x20}}], 0x2, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000001880)=ANY=[@ANYBLOB="a0000000000007280001800c00028005000100840000000c00028005000100880000000c000280050001002f00000008000440000000090c0001800600034000000000000003ff0c0002800500010021000000060013400003000006000340000200000c00028005000100010000000600034000010000140001800800010000000000080002000a01010208000440fffffffd5cf03c6fba1e96bac815b838796a78636b26bde7b1b4ba1842ed1ce6"], 0xa0}, 0x1, 0x0, 0x0, 0x8810}, 0x0) r1 = getpid() epoll_create(0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x3ff, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x100, 0x2}, 0xe) sendmsg$NL80211_CMD_PROBE_CLIENT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x5c, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0x4208, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f6600006530202ab02020205ed92d2b2426282b2d5d205c202b23402b219b2e7d2d203a202f6465762f6c6f6f702d636f6e74726f6c00202662200a049a69a2c25fc047d986535a476e28d697f6a490d03c29af6c2e04a0c8ed8b1fff9cfe88dd19236b37e38df7a8563de9e593a88d3a16f8bba32c3f900557f22320d46d9fae7fd67af6dae69de139fc65ce21"], 0x94) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) (fail_nth: 2) 19:13:37 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x1202, 0x0) r1 = syz_open_pts(r0, 0x200) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f0000000040)=""/107) r2 = socket$netlink(0x10, 0x3, 0x13) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x820, 0x70bd28, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x40000}, 0x820) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, @in_args={0x2}}, './file0\x00'}) ioctl$VT_GETMODE(r3, 0x5601, &(0x7f0000000200)) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r3, 0xc018937b, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0xee01, 0xee01}}, './file0/file0\x00'}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r3, 0x5000943f, &(0x7f0000000280)={{r4}, 0x0, 0x6, @unused=[0x80, 0x200, 0x6681, 0x4a33bd6c], @devid}) sendmsg$SMC_PNETID_DEL(r4, &(0x7f00000013c0)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000001380)={&(0x7f00000012c0)={0x94, 0x0, 0x100, 0x70bd29, 0x25dfdbfc, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gretap0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6erspan0\x00'}]}, 0x94}, 0x1, 0x0, 0x0, 0x4000000}, 0x4041) r5 = syz_open_dev$vcsa(&(0x7f0000001440), 0x80000000, 0x10000) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001400), r5) r7 = fcntl$dupfd(r4, 0x406, r4) sendmsg$NL80211_CMD_LEAVE_MESH(r7, &(0x7f0000001540)={&(0x7f0000001480)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000001500)={&(0x7f00000014c0)={0x14, r6, 0x20, 0x70bd27, 0x25dfdbfe, {{}, {@void, @void}}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20004084}, 0x443832e8fb9e23c1) write$binfmt_misc(r1, &(0x7f0000001580)={'syz1', "de8557b2bdce66f845e86313551fe0d1a7488be095fee1b91af02035073a1303b3b740110ac1ab4ee1e2fdcdce337fd4670be489c5a5"}, 0x3a) r8 = gettid() perf_event_open(&(0x7f00000015c0)={0x0, 0x80, 0x3, 0x4, 0x9, 0x1, 0x0, 0x1, 0x154, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8, 0x0, @perf_config_ext={0x5, 0xb28}, 0x84, 0x5, 0x7, 0x2, 0xffffffff, 0x5, 0xfff, 0x0, 0x0, 0x0, 0x1}, r8, 0x6, r7, 0x1) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0xa, 0x1010, r4, 0x1c79d000) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000001640)={{0x1, 0x1, 0x18, r4, {0x1d9c156a}}, './file0\x00'}) sendmsg$SEG6_CMD_GET_TUNSRC(r9, &(0x7f0000001740)={&(0x7f0000001680)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000001700)={&(0x7f00000016c0)={0x1c, 0x0, 0x8, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_HMACKEYID={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x45}, 0x8044845) 19:13:37 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x20, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x0, 0xcf, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000001c0)=0x27f980000000) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = gettid() pidfd_open(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x7, 0x80, 0x0, 0x40, 0x0, 0x8, 0x0, 0x200, 0x48010, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x3d13, 0x6, 0x2, 0x8, 0x45e, 0x8, 0x0, 0x8, 0x0, 0x8001}, r0, 0xe, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:13:37 executing program 4: r0 = creat(&(0x7f00000000c0)='./file2\x00', 0x0) fcntl$setlease(r0, 0x400, 0x1) fcntl$setown(r0, 0x8, 0xffffffffffffffff) r1 = accept4$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14, 0x80800) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000140)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000400)={{r1}, r2, 0xa, @inherit={0x90, &(0x7f0000000340)=ANY=[@ANYBLOB="000000000000000009000000000000000200000000000000cb2800000000000028000000000000000000000000000000050000000000000600000000000000000700000000000000200000000000000001f0decb5f28726bca4b007b000000004000000000000000722f000000000000000000000000000001040000000000001f00"/144]}, @devid}) open(&(0x7f0000001400)='./file2\x00', 0x200002, 0x40) creat(&(0x7f0000000040)='./file2\x00', 0x0) creat(&(0x7f0000000000)='./file2\x00', 0x0) 19:13:37 executing program 2: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:13:37 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:13:37 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\tU\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:13:37 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x400, 0x0, 0x0, 0x812800, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x61) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) syz_open_dev$vcsu(&(0x7f0000000080), 0xfffffffffffffffa, 0x42) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:13:37 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:13:37 executing program 2: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:13:37 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\aU\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:13:37 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x595, 0x8, 0x2, 0x5}]}) renameat(0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) [ 2814.488725] FAULT_INJECTION: forcing a failure. [ 2814.488725] name failslab, interval 1, probability 0, space 0, times 0 [ 2814.490797] CPU: 0 PID: 19176 Comm: syz-executor.0 Not tainted 5.10.230 #1 [ 2814.491847] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2814.493002] Call Trace: [ 2814.493502] dump_stack+0x107/0x167 [ 2814.493985] should_fail.cold+0x5/0xa [ 2814.494560] ? create_object.isra.0+0x3a/0xa20 [ 2814.495155] should_failslab+0x5/0x20 [ 2814.495794] kmem_cache_alloc+0x5b/0x310 [ 2814.496504] create_object.isra.0+0x3a/0xa20 [ 2814.497089] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2814.497925] kmem_cache_alloc+0x159/0x310 [ 2814.498544] ? bdev_free_inode+0x20/0x20 [ 2814.499071] ? I_BDEV+0x20/0x20 [ 2814.499603] bdev_alloc_inode+0x18/0x40 [ 2814.500125] ? bdev_free_inode+0x20/0x20 [ 2814.500730] alloc_inode+0x63/0x240 [ 2814.501206] iget5_locked+0x148/0x230 [ 2814.501861] ? bdev_test+0x90/0x90 [ 2814.502388] bdget+0x8e/0x360 [ 2814.502832] ? bdgrab+0x50/0x50 [ 2814.503276] invalidate_partition+0x33/0xf0 [ 2814.503939] del_gendisk+0x27f/0x990 [ 2814.504510] ? disk_events_poll_msecs_store+0x1f0/0x1f0 [ 2814.505221] ? lo_fallocate.isra.0+0x180/0x180 [ 2814.505991] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2814.506679] loop_control_ioctl+0x3b5/0x480 [ 2814.507241] ? loop_lookup+0x1d0/0x1d0 [ 2814.507859] ? selinux_file_ioctl+0xb6/0x270 [ 2814.508495] ? loop_lookup+0x1d0/0x1d0 [ 2814.509009] __x64_sys_ioctl+0x19a/0x210 [ 2814.509678] do_syscall_64+0x33/0x40 [ 2814.510172] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2814.510889] RIP: 0033:0x7f0ba3f92b19 [ 2814.511547] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2814.514152] RSP: 002b:00007f0ba14e7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2814.515304] RAX: ffffffffffffffda RBX: 00007f0ba40a6020 RCX: 00007f0ba3f92b19 [ 2814.516368] RDX: 0000000000000000 RSI: 0000000000004c81 RDI: 0000000000000007 [ 2814.517306] RBP: 00007f0ba14e71d0 R08: 0000000000000000 R09: 0000000000000000 [ 2814.518291] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2814.519440] R13: 00007fff9053360f R14: 00007f0ba14e7300 R15: 0000000000022000 19:13:37 executing program 0: ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x94, 0x1, 0xf6, 0x0, 0x0, 0x8001, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x89040, 0x3, 0x0, 0x9, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002c80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000018800)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000015d40)=ANY=[@ANYBLOB="20001a00000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x20}}], 0x2, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000001880)=ANY=[@ANYBLOB="a0000000000007280001800c00028005000100840000000c00028005000100880000000c000280050001002f00000008000440000000090c0001800600034000000000000003ff0c0002800500010021000000060013400003000006000340000200000c00028005000100010000000600034000010000140001800800010000000000080002000a01010208000440fffffffd5cf03c6fba1e96bac815b838796a78636b26bde7b1b4ba1842ed1ce6"], 0xa0}, 0x1, 0x0, 0x0, 0x8810}, 0x0) r1 = getpid() epoll_create(0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x3ff, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x100, 0x2}, 0xe) sendmsg$NL80211_CMD_PROBE_CLIENT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x5c, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0x4208, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f6600006530202ab02020205ed92d2b2426282b2d5d205c202b23402b219b2e7d2d203a202f6465762f6c6f6f702d636f6e74726f6c00202662200a049a69a2c25fc047d986535a476e28d697f6a490d03c29af6c2e04a0c8ed8b1fff9cfe88dd19236b37e38df7a8563de9e593a88d3a16f8bba32c3f900557f22320d46d9fae7fd67af6dae69de139fc65ce21"], 0x94) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) (fail_nth: 3) 19:13:38 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\nU\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:13:53 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:13:53 executing program 3: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x4, &(0x7f0000000040), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x400000, 0x0) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x8010, r4, 0x0) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/meminfo\x00', 0x0, 0x0) r7 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r8 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r7, r2, &(0x7f0000000100)=@IORING_OP_POLL_ADD={0x6, 0x2, 0x0, @fd_index}, 0x8001) syz_io_uring_submit(r5, r2, &(0x7f0000000180)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x3, 0x0, r6, 0x0, r8}, 0x922a) io_uring_enter(r0, 0x58ab, 0xff30, 0x3, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000009, 0x40010, r3, 0x0) socket$packet(0x11, 0x2, 0x300) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$nl80211(&(0x7f00000013c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r9, 0x8933, &(0x7f0000001440)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_MESH(r9, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000000540)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r10, @ANYBLOB="0100000000000000000044006b8832617aeef44628793c59000008000300", @ANYRES32=r11, @ANYBLOB="1c00238008001500a000000005000600040000000500050000000000"], 0x38}}, 0x0) 19:13:53 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x0fU\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:13:53 executing program 0: ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x94, 0x1, 0xf6, 0x0, 0x0, 0x8001, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x89040, 0x3, 0x0, 0x9, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002c80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000018800)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000015d40)=ANY=[@ANYBLOB="20001a00000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x20}}], 0x2, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000001880)=ANY=[@ANYBLOB="a0000000000007280001800c00028005000100840000000c00028005000100880000000c000280050001002f00000008000440000000090c0001800600034000000000000003ff0c0002800500010021000000060013400003000006000340000200000c00028005000100010000000600034000010000140001800800010000000000080002000a01010208000440fffffffd5cf03c6fba1e96bac815b838796a78636b26bde7b1b4ba1842ed1ce6"], 0xa0}, 0x1, 0x0, 0x0, 0x8810}, 0x0) r1 = getpid() epoll_create(0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x3ff, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x100, 0x2}, 0xe) sendmsg$NL80211_CMD_PROBE_CLIENT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x5c, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0x4208, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f6600006530202ab02020205ed92d2b2426282b2d5d205c202b23402b219b2e7d2d203a202f6465762f6c6f6f702d636f6e74726f6c00202662200a049a69a2c25fc047d986535a476e28d697f6a490d03c29af6c2e04a0c8ed8b1fff9cfe88dd19236b37e38df7a8563de9e593a88d3a16f8bba32c3f900557f22320d46d9fae7fd67af6dae69de139fc65ce21"], 0x94) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) 19:13:53 executing program 2: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(0x0, 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:13:53 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file1\x00', 0x80000) pread64(0xffffffffffffffff, 0x0, 0xfffffffffffffdda, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000100)={0x38, 0x22, 0x0, 0x0, 0x8, 0xc, 0x2, 0x95, 0x1}) r1 = openat(r0, &(0x7f0000000000)='./file1\x00', 0x301000, 0x140) mq_open(&(0x7f0000000600)='\x01*+\x0e\xaa\xdc\x84\x97\xa72\xb9v\x93\b5\x84\x83\x86\xce\x9c\x00\xcb\x0f\x87f\x90\x06\xf9{\xa6\xa6VK\xe9\x1c\xdb?*>/\x04\xe9C\xd6\xbd\x1e\x11\v%\xdbB\xaf\xc7\x81\xb8\xa2\x00p\\\x9c\xe5\x9a>\x8d\x9c\xc7\xee\x9c\xe6\x9f\xe3<\xa6\xfb\xbe\x914\xe0\x99\xfa\xef\xea\xbf\x1aH>\x83\xe3\x88G\xc7\xfe\x16\xe9!w\xfa\xc4\x1e\xfaN\xfdc[\xc7\xaf_\xc1\xba\xc0\xf8\xf7\xe4\xbf\xd7\x18\t\xec\xa2C\xd9\r\x83\x19\xb9\x85\xa7\r\xd0\r\xa3v\x97\x910\xdc\v%n\x97.g=\xd0oYF\xfa\x0e\x0f\xf7\xfe\xa2', 0x80, 0x24, &(0x7f0000000340)={0x2, 0x1000000, 0x0, 0xffff}) mmap(&(0x7f0000003000/0x1000)=nil, 0x1000, 0x3, 0x80010, r1, 0xb6cad000) r2 = signalfd4(r1, &(0x7f0000000040)={[0x401]}, 0x8, 0x80000) openat(r2, &(0x7f00000000c0)='./file1\x00', 0x115001, 0x1) mq_timedsend(r1, &(0x7f0000000140)="6dd9697615418b", 0x7, 0xd0fe, &(0x7f00000002c0)={0x0, 0x3938700}) futex(&(0x7f0000000480)=0xfff, 0x9, 0x2, &(0x7f00000004c0)={0x77359400}, &(0x7f0000000500)=0x1, 0x0) ioctl$TIOCMIWAIT(0xffffffffffffffff, 0x545c, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2b, &(0x7f0000000180)={0x1000, {{0x2, 0x4e22, @multicast2}}, {{0x2, 0x4e23, @multicast1}}}, 0x108) ioctl$sock_bt_hci(0xffffffffffffffff, 0x800448f0, &(0x7f0000000380)="0a2d2da2ef9ee479574e35e3ba64f870fe3898f364eddd8079caf5ae0616dffb698891ce445201982337c5a5bfa42703a314a7f82c9295b30351c6a696d1a7e173ab9cc9af1c5006e0044025e8868a8d1a199d7ed9857476d24dd0f9aa64d4fd35d60e125a3fe8970087fa53f87140bc6771deee3d032144161692536e78de9d5e7ea9018b4c8a352844ade27c0b847b013a69fb35e31382d99427d343e6b914ae7bca84796baedf2aa518fd74886f04d6f48ec7fdc5a1dcb9f193b46a2095f9b8c382aad5ae8afebdc22c157d85110db667e0c10dc6eabec03312") r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_IO(r3, 0x127f, &(0x7f00000003c0)={0xe00, 0x0, 0x0, 0xfe, @buffer={0x300, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0}) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0xffffffff, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r4) setsockopt$inet6_icmp_ICMP_FILTER(r3, 0x1, 0x1, &(0x7f0000000300)={0x80}, 0x4) 19:13:53 executing program 4: fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) creat(&(0x7f0000000040)='./file2\x00', 0x0) creat(&(0x7f0000000000)='./file2\x00', 0x0) 19:13:53 executing program 5: r0 = syz_io_uring_setup(0x1d, &(0x7f0000000080), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000280)) r2 = syz_io_uring_setup(0x4d4f, &(0x7f0000000240), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000080)=@IORING_OP_ASYNC_CANCEL, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000000, 0x13, r2, 0x0) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r2, 0x0) syz_io_uring_submit(r5, r4, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(r1, r4, &(0x7f0000000000)=@IORING_OP_NOP={0x0, 0xfc292a8c574ae91a}, 0x0) io_uring_enter(r0, 0x5037, 0x0, 0x0, 0x0, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) ptrace(0xffffffffffffffff, 0x0) [ 2830.408039] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.3'. 19:13:53 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x7, 0x101, 0x0, 0x3}) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) sendmsg$nl_generic(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000100)={0x20, 0x12, 0x69844ea0a6ddcd11, 0x0, 0x0, {0xa}, [@typed={0x9, 0x0, 0x0, 0x0, @binary="5ef6a6516b"}]}, 0x20}}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_NEW_INTERFACE(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000100)={0x24, 0x0, 0x201, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x9}, @val={0x8, 0x3, r3}, @void}}}, 0x24}}, 0x0) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000340)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x2, 0x70bd25, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x7fffffff}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x1}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x2b}]}, 0x2c}, 0x1, 0x0, 0x0, 0x810}, 0x20000800) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000001c0)={&(0x7f0000000380)={0x20c, 0x0, 0x0, 0x70bd2b, 0x25dfdbfe, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x5}, {0x6, 0x11, 0x4}, {0x8, 0x15, 0x2b4}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x10000}, {0x6, 0x11, 0x6}, {0x8, 0x15, 0x1ff}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x8001}, {0x6, 0x11, 0x5}, {0x8, 0x15, 0x5}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x80000001}, {0x6, 0x11, 0xff}, {0x8, 0x15, 0x4}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0x4}, {0x6, 0x11, 0x8}, {0x8, 0x15, 0x7}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x9}, {0x6, 0x11, 0x401}, {0x8, 0x15, 0x8}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0x3}, {0x6, 0x11, 0x3}, {0x8, 0x15, 0x6}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0x2}, {0x6, 0x11, 0xfff}, {0x8, 0x15, 0x1}}]}, 0x20c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) fallocate(0xffffffffffffffff, 0x0, 0x101, 0x1) fadvise64(r4, 0x0, 0x0, 0x4) 19:13:53 executing program 4: r0 = creat(&(0x7f00000000c0)='./file2\x00', 0x0) fcntl$setlease(r0, 0x400, 0x1) fcntl$setown(r0, 0x8, 0xffffffffffffffff) creat(&(0x7f0000000040)='./file2\x00', 0x0) creat(&(0x7f0000000000)='./file2\x00', 0x0) r1 = syz_io_uring_setup(0x6d94, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) r2 = syz_io_uring_setup(0x4d4f, &(0x7f0000000240), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000000, 0x13, r2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r2, 0x0) io_uring_enter(r2, 0x58af, 0x0, 0x2, 0x0, 0x0) ioctl$INCFS_IOC_CREATE_FILE(r2, 0xc058671e, &(0x7f00000003c0)={{'\x00', 0x2}, {0x742}, 0x2e, 0x0, 0x0, &(0x7f0000000080)='./file2\x00', &(0x7f0000000100)='./file2\x00', &(0x7f0000000240)="97de8e3ed26b028d00940afa9c6b5a9e57014c9f58c80843cd641b630bae56e20bd9d3ea564fe1f4b190389692247aa9d5217e29be931f5f6083b40aa37d5bf8f72e049b156bd41afe21917cda8997b00f1a9ffe9ae85f43292a1bb36e206e4c5d6e6591716a9d6f45fd2d5ba9a5f6986eefc6841a77e3ccb039ae6f234704c1cb00d348932bc382ee931496f13f4f102ce4752eefbc8822147527e34e14880343bd70e532d021f696eab7dd400508ec029b34a141bf3751021ba8e8b419b2f00ae385190c5da98f9dda84a6889d656b74fe4a5a94df58f9cf94dba315fb2912330e1f22c1c13d933210fefc181e9330cd12c2dc39c06e8ec2bb1162aa2257ba617586d3d1ed5587031d66988c5ea230fda4282c749d82eefcdb94620f7e53e5faa2966b2beadf295331237369251f053da4ed4213650251cb7535ba1caf94e570f0c75fd3641c8be685c965adc740", 0x14f, 0x0, &(0x7f0000000680)={0x2, 0x12d, {0x1, 0xc, 0xb2, "c8b1e4a6974ef76687113fb6130d6894c6a35a61d00e1c15af8bda7ffbce6f9b6e35a14e80d3ec8ba3ae9a5248953c4a92c35b4bfb36c165527b9718b854879d3e2e3ac56a709a339f422703d2c5ad0b93e016ef8f8b46221d341a1385469f7f49987f044e1d09e1e895f2947ac75be9048a694216b72b8e974f6eef28f1df8919f33da883288f235c113f4d9f7d19b8f082848c5dd0b517ee5a10e38eb3e155e7144c4598316172d92187946d90a6754584", 0x6e, "1244c4724da4d87e9fcab064d064676583d9f0c3ec6eb4fddad359914e3bd7c69ea7de1099b5c9b246276f2d9bab2d3b0885dba330b6c4ee98a5ffab9ae96558d1897b0010663d4d83aa633e1371c9bda82eb36153d7b9d76031d78d40c846efa133ba5204df128b556bd671d794"}, 0x76, "c5dbbc72f8bb65ad6a511e518f1fc6dae512f7673578d0187c06295baaf3470f559fb31d5e4aa99cb4cdc05bb83c4fcc4144fa31e4ae5dc6026cae0c4ebc0b31a2fdacb56f7aa280a5f7b03cee8f95ad5ff8c2007a5685b818953f3fb6b4c418b239ff2f50634f4137bb1da20c0886523f7467df3489"}, 0x1af}) syz_io_uring_setup(0x7243, &(0x7f0000000600)={0x0, 0xff69, 0x20, 0x2, 0x24, 0x0, r1}, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000ff6000/0x1000)=nil, &(0x7f0000000500), &(0x7f0000000540)) ioctl$BTRFS_IOC_SYNC(r1, 0x9408, 0x0) 19:13:53 executing program 2: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(0x0, 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:13:53 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15HU\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:13:53 executing program 0: ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x94, 0x1, 0xf6, 0x0, 0x0, 0x8001, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x89040, 0x3, 0x0, 0x9, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002c80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000018800)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000015d40)=ANY=[@ANYBLOB="20001a00000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x20}}], 0x2, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000001880)=ANY=[@ANYBLOB="a0000000000007280001800c00028005000100840000000c00028005000100880000000c000280050001002f00000008000440000000090c0001800600034000000000000003ff0c0002800500010021000000060013400003000006000340000200000c00028005000100010000000600034000010000140001800800010000000000080002000a01010208000440fffffffd5cf03c6fba1e96bac815b838796a78636b26bde7b1b4ba1842ed1ce6"], 0xa0}, 0x1, 0x0, 0x0, 0x8810}, 0x0) r1 = getpid() epoll_create(0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x3ff, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x100, 0x2}, 0xe) sendmsg$NL80211_CMD_PROBE_CLIENT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x5c, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0x4208, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f6600006530202ab02020205ed92d2b2426282b2d5d205c202b23402b219b2e7d2d203a202f6465762f6c6f6f702d636f6e74726f6c00202662200a049a69a2c25fc047d986535a476e28d697f6a490d03c29af6c2e04a0c8ed8b1fff9cfe88dd19236b37e38df7a8563de9e593a88d3a16f8bba32c3f900557f22320d46d9fae7fd67af6dae69de139fc65ce21"], 0x94) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x2, r3) 19:13:53 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000440)={{}, 0x2, 0x401, 0x10003}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f00000002c0)=@updsa={0x148, 0x10, 0x1, 0x0, 0x0, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x32}, @in6=@private0, {}, {}, {}, 0x0, 0x0, 0xa, 0x4}, [@algo_crypt={0x58, 0x2, {{'cbc(aes)\x00'}, 0x80, "0f24aa6b13c2e62f3556b1cbcfeac2a0"}}]}, 0x148}}, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$BTRFS_IOC_QGROUP_CREATE(r3, 0x4010942a, &(0x7f0000000240)={0x1, 0x22}) r4 = dup2(r1, r2) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) syz_io_uring_setup(0x7243, &(0x7f0000000600)={0x0, 0xff69, 0x20, 0x2, 0x24, 0x0, r6}, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000ff6000/0x1000)=nil, &(0x7f0000000500), &(0x7f0000000540)) kcmp(0xffffffffffffffff, 0x0, 0x0, r6, r1) r7 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x30, 0x0, 0x200, 0x70bd2d, 0x25dfdbfe, {{}, {@val={0x8, 0x1, 0x28}, @val={0x8}, @val={0xc, 0x99, {0x163, 0x9}}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0xd0}, 0x4) ioctl$EVIOCGEFFECTS(r7, 0x80044584, &(0x7f0000000380)=""/229) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r7, 0x406, r8) setresuid(0xee00, r5, 0x0) setreuid(0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000080)={'wlan0\x00'}) 19:13:53 executing program 5: r0 = syz_io_uring_setup(0xc8d, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000000040)=0x0) eventfd2(0x0, 0x800) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80, 0x0) r3 = syz_io_uring_setup(0x4d4f, &(0x7f0000000240), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000080)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd, 0x0, 0x0, 0x0, 0x1}, 0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000000, 0x13, r3, 0x0) r6 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r3, 0x0) syz_io_uring_submit(r6, r5, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_open_pts(r2, 0x40000) r7 = syz_io_uring_setup(0x3ca0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x4}, &(0x7f0000400000/0xc00000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000280)=0x0) r10 = io_uring_register$IORING_REGISTER_PERSONALITY(r7, 0x9, 0x0, 0x0) syz_io_uring_submit(r8, r9, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x0, 0x0, @fd_index, 0x8, 0x0, 0x0, 0x0, 0x0, {0x0, r10}}, 0x10000) r11 = syz_io_uring_setup(0x4d4f, &(0x7f0000000240), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r12, r13, &(0x7f0000000080)=@IORING_OP_ASYNC_CANCEL, 0x0) syz_io_uring_submit(r12, r13, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000000, 0x13, r11, 0x0) r14 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r11, 0x0) syz_io_uring_submit(r14, r5, &(0x7f00000000c0)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index=0x3, 0xc146, 0x0, 0x0, 0x2, 0x0, {0x0, r10}}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) [ 2830.568832] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.3'. 19:13:53 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x950060, &(0x7f0000000900)=ANY=[]) setfsgid(0xee01) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb052) syz_io_uring_submit(0x0, 0x0, 0x0, 0x4) mkdirat(r1, &(0x7f0000000040)='./file0\x00', 0x0) r2 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) syz_io_uring_setup(0x7243, &(0x7f0000000600)={0x0, 0xff69, 0x20, 0x2, 0x24, 0x0, r2}, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000ff6000/0x1000)=nil, &(0x7f0000000500), &(0x7f0000000540)) sendfile(r2, r0, &(0x7f0000000080)=0x7ff, 0x0) r3 = syz_io_uring_setup(0x52dd, &(0x7f00000003c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x10, r3, 0x0) syz_io_uring_submit(0x0, r5, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r3, 0x58ab, 0x0, 0x0, 0x0, 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) [ 2831.155523] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19243 comm=syz-executor.1 [ 2831.168973] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19248 comm=syz-executor.1 19:13:54 executing program 1: ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/tcp\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0xc, &(0x7f0000000480)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0000001d00210c00000000000000000400020008000c00000000003a57d18ebc5680b476cf2f371b7f1f5875b91f26c2275440a62c13c5f2bc294e3696e31bdf79776641b29ab45b6b2ceb21720142fbaf9312f67da2b9616abd159903e0d3f0e375b9c0a5ec0e86bfeeb637fe8695aea34095810af7ef0ea5f3c543698154d1829d9b2b87086a4fd1fc61a7ccafe9128f578a417c1935bc3f6e90d3557e41d354ce146bc1b03e9c8496a682cb1bcdfbf137f889e200f41bdac717a51b52bcdcc77093c17b7009331bfd"], 0x1c}}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_TID_CONFIG(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={0x34, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_TID_CONFIG={0x18}]}, 0x34}}, 0x0) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x78, 0x0, 0x1, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r4}, @val={0xc, 0x99, {0x2, 0x68}}}}, [@NL80211_ATTR_DURATION={0x8, 0x57, 0x4}, @NL80211_ATTR_DURATION={0x8, 0x57, 0x2}, @NL80211_ATTR_DURATION={0x8, 0x57, 0x101}, @NL80211_ATTR_DURATION={0x8, 0x57, 0x6}, @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0xa}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x8}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x304}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x8}], @NL80211_ATTR_DURATION={0x8, 0x57, 0x2}]}, 0x78}, 0x1, 0x0, 0x0, 0x408c}, 0x20000000) 19:13:54 executing program 5: syz_open_dev$tty20(0xc, 0x4, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x61, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x8}, 0x0, 0x310, 0x0, 0x3, 0x1, 0xff}, 0x0, 0x3, r0, 0xd) r2 = openat$sndseq(0xffffffffffffff9c, 0x0, 0x220400) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue0\x00', 0x2}) preadv(r2, &(0x7f0000000a80)=[{&(0x7f0000000380)=""/199, 0xc7}, {&(0x7f0000000480)=""/88, 0x58}, {&(0x7f0000000580)=""/159, 0x9f}, {&(0x7f0000000640)=""/152, 0x98}, {&(0x7f0000000700)=""/186, 0xba}, {&(0x7f00000001c0)=""/55, 0x37}, {&(0x7f0000000240)=""/34, 0x22}, {&(0x7f0000000840)=""/40, 0x28}, {&(0x7f00000007c0)=""/26, 0x1a}, {&(0x7f0000000c00)=""/164, 0xa4}, {&(0x7f0000000980)=""/44, 0x2c}, {&(0x7f00000009c0)=""/148, 0x94}], 0xc, 0x8, 0x400) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) r4 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_bp={0x0, 0x8}, 0x3110, 0x2, 0x800005, 0x8, 0xfffffffffffffffd, 0x0, 0xfffe, 0x0, 0x0, 0x0, 0x8004}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) readv(r4, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/213, 0xd5}], 0x1) dup2(r4, r3) readv(0xffffffffffffffff, 0x0, 0x0) r5 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_IO(r5, 0x2285, &(0x7f00000011c0)={0x53, 0xfffffffffffffffd, 0x0, 0x0, @buffer={0x0, 0x1031, &(0x7f0000001240)=""/4108}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x104}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x13, 0xffffffffffffffff, 0x8000000) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(0xffffffffffffffff, 0x8010671f, &(0x7f0000000340)={&(0x7f0000000500)=""/126, 0x7e}) readahead(r1, 0x7, 0x81) fork() ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000b40)={0x4, 0x0, 0x0, 'queue1\x00', 0x6}) 19:13:54 executing program 0: ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x94, 0x1, 0xf6, 0x0, 0x0, 0x8001, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x89040, 0x3, 0x0, 0x9, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002c80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000018800)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000015d40)=ANY=[@ANYBLOB="20001a00000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x20}}], 0x2, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000001880)=ANY=[@ANYBLOB="a0000000000007280001800c00028005000100840000000c00028005000100880000000c000280050001002f00000008000440000000090c0001800600034000000000000003ff0c0002800500010021000000060013400003000006000340000200000c00028005000100010000000600034000010000140001800800010000000000080002000a01010208000440fffffffd5cf03c6fba1e96bac815b838796a78636b26bde7b1b4ba1842ed1ce6"], 0xa0}, 0x1, 0x0, 0x0, 0x8810}, 0x0) r1 = getpid() epoll_create(0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x3ff, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x100, 0x2}, 0xe) sendmsg$NL80211_CMD_PROBE_CLIENT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x5c, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0x4208, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f6600006530202ab02020205ed92d2b2426282b2d5d205c202b23402b219b2e7d2d203a202f6465762f6c6f6f702d636f6e74726f6c00202662200a049a69a2c25fc047d986535a476e28d697f6a490d03c29af6c2e04a0c8ed8b1fff9cfe88dd19236b37e38df7a8563de9e593a88d3a16f8bba32c3f900557f22320d46d9fae7fd67af6dae69de139fc65ce21"], 0x94) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4b47, r3) 19:13:54 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15LU\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:14:11 executing program 4: r0 = creat(&(0x7f00000000c0)='./file2\x00', 0x0) fcntl$setlease(r0, 0x400, 0x1) fcntl$setown(r0, 0x8, 0xffffffffffffffff) r1 = creat(&(0x7f0000000100)='./file2\x00', 0x0) r2 = signalfd(r1, &(0x7f0000000080)={[0x4]}, 0x8) syz_open_dev$loop(&(0x7f0000000d00), 0x0, 0x101900) close(r2) creat(&(0x7f0000000000)='./file2\x00', 0x0) 19:14:11 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = gettid() pidfd_open(r2, 0x0) r3 = syz_io_uring_setup(0x4d4f, &(0x7f0000000240), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000000, 0x13, r3, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r3, 0x0) io_uring_enter(r3, 0x58af, 0x0, 0x2, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000480)={&(0x7f0000001e00)=ANY=[@ANYBLOB="34040000140000042cbd7000fcdbdf250800000008004200", @ANYRES32=0xee01, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="08008b00", @ANYRES32=r2, @ANYBLOB="383f050fb2bebafbe376265bf65db2d3017757e7985248f938aea6d9187164421b21cac9c6e6e187dbe69edc70a94896eb2e78d4a09db6f3ce0cd52971a1493b1570010a9c4e5008233ebbbf0437dc1039206477afcfd4dcc303eba6343e9192bb2aaac8e37caf68819a1f0cf8e73c70df43bc67c09d3e7d8a14703e983579d9c6407d32e3e1db35b6a5cb6a5a3ddc0cca48552da59d2e1708cded1372e3a055dd2a958d2a5634bcb6f2605d7b443ebfc5c4c904d84ce40d65a6183552f7b2389640d31fe65048735e67dd4314002900fc0200eb00000000000000000000000008000f", @ANYRES32=r3, @ANYBLOB="0101cba38de26dcd"], 0x434}, 0x1, 0x0, 0x0, 0x80}, 0x40000) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x33}}, 0x10) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x121402) pwritev2(r4, &(0x7f0000000280)=[{&(0x7f0000000380)="b8f54b0ed847923bd2006b94fe69ffcf5e1f117dc9f11697f36af02054676dbca24c9a7800963afb730f613d40cdc26ce6bccff1b575f0384e6c634eb06efe476395170fbe3694fa442bc0a8e634f3320084e575e013d9ac918f576d6f97800c70fb9cbb66575f309b51b4e27e70a222785ec39b28da468d4b03dea0a3a0ceef4928fbe5bb63e7c3647b4424222d9793eb9c8bde4ebfc642758b03973d772de8c81fb05ba12048f85da3c146aeb22f9399fe69e0ef541309a27369b0faea3e49b840ea64f08399bb87295fc9442db405f1eb0b6a871342b422d75552a2757c63d37620a871899cff1d5662b1e17825b496005d68cd", 0xf5}, {&(0x7f0000000740)="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", 0x1000}, {&(0x7f0000000500)="fb2e8f908ffb178025bd2612fc79be2aba6b27f27c87690e8450fee2505155265317220de52cf693cc1da8bfbde339958daf75491f8c8b79d10fcef20b1f2e08fed7b1e00c239a844e14ecf75921514cc3195207bc9f143d1fa840cd0c148857bd3cfd9723617d70701b89252801379823c10f0c991e3acfbce957c02b24583f677a3be269653d63c48ac3dd8c407ab1f12c450f32b826a35f0b65250204a9930909864cccc463d17fa20bfc17cb6309daf04bd9d43f2422247585618d6d5ea7d9a792f660925a878fbea4a1baac27fef03e6cc3ad157c", 0xd7}], 0x3, 0x9, 0x7f, 0xc) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="ff02000000000000000006000059298c87ab10ec90b3e2d700080003003d56085eb43c7878bbe3c6629f244ad6d15014dee71ea617699967c233c5bc07c8582bb9d450ec451bdb2589afee30e071eba2ea263008e6252611947d2440edacb87bc9f7e6657357c49d76cfc37f3ab7b2a5f2cb675736fb5e2632", @ANYRES32=r7, @ANYBLOB="0800050002000000"], 0x24}}, 0x0) syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000140)) sendmmsg$inet6(r1, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 19:14:11 executing program 1: ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/tcp\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0xc, &(0x7f0000000480)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0000001d00210c00000000000000000400020008000c00000000003a57d18ebc5680b476cf2f371b7f1f5875b91f26c2275440a62c13c5f2bc294e3696e31bdf79776641b29ab45b6b2ceb21720142fbaf9312f67da2b9616abd159903e0d3f0e375b9c0a5ec0e86bfeeb637fe8695aea34095810af7ef0ea5f3c543698154d1829d9b2b87086a4fd1fc61a7ccafe9128f578a417c1935bc3f6e90d3557e41d354ce146bc1b03e9c8496a682cb1bcdfbf137f889e200f41bdac717a51b52bcdcc77093c17b7009331bfd"], 0x1c}}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_TID_CONFIG(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={0x34, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_TID_CONFIG={0x18}]}, 0x34}}, 0x0) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x78, 0x0, 0x1, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r4}, @val={0xc, 0x99, {0x2, 0x68}}}}, [@NL80211_ATTR_DURATION={0x8, 0x57, 0x4}, @NL80211_ATTR_DURATION={0x8, 0x57, 0x2}, @NL80211_ATTR_DURATION={0x8, 0x57, 0x101}, @NL80211_ATTR_DURATION={0x8, 0x57, 0x6}, @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0xa}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x8}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x304}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x8}], @NL80211_ATTR_DURATION={0x8, 0x57, 0x2}]}, 0x78}, 0x1, 0x0, 0x0, 0x408c}, 0x20000000) 19:14:11 executing program 7: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@migrate={0x50, 0x21, 0x301, 0x0, 0x0, {{@in6=@local, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}}}, 0x50}}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r1, 0x1000003) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1f}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8d0) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1d, 0xc21, 0x0, 0x0, {}, [@typed={0x5, 0x3ffc, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x9}}, './file0\x00'}) r5 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x14, r5, 0x10, 0x70bd29, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) sendmsg$DEVLINK_CMD_RATE_GET(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f0000000600)={0x1d0, r5, 0x10, 0x70bd2c, 0x25dfdbfd, {}, [@DEVLINK_ATTR_PORT_INDEX={0x8, 0x3, 0x2}, @DEVLINK_ATTR_PORT_INDEX={0x8}, @handle=@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_RATE_NODE_NAME={0xfa, 0xa8, @random="144a673394b3f149a010fc21d9f85d037c9ab681807a0172f1adb205382434eec2e00c57eafe5bacacc2680a4c5f87a6ce2e276e01363161435f3a13450349d6f67296fc6301213d4c300b89be1ea9fcc1b9fb330d7ee8d146c0eabbe325aa3e2b33b1d0f6fb990730aa00f719af3b92ec5c6fbbfe0ac2d99d0d755f595dcfa8f7497c7c689e580a5f06912cfee402bbf894472a3aac273de1a9a44ecf0ff2a4c9c01f7fc1ac2a2415c49dda4f8d9c1bc9d9b27704862ec9e09fdb4331cd519fcbfcae33f8e676ccccd098f889223e034331cd8bb079ac5ad8c8c84d5d47482e9b6370268398823433e09194155a38cbfdd1b2dde9c9"}, @handle=@pci={{0x8}, {0x11}}, @handle=@pci={{0x8}, {0x11}}, @handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @handle=@pci={{0x8}, {0x11}}, @handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x1d0}, 0x1, 0x0, 0x0, 0x20}, 0x40) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0xd0, r5, 0x4, 0x70bd2a, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x80000000}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x2}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x9}}]}, 0xd0}, 0x1, 0x0, 0x0, 0x4000040}, 0x8800) 19:14:11 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext={0x2000000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') mmap$IORING_OFF_SQ_RING(&(0x7f0000131000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) pipe2(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r3 = memfd_create(&(0x7f00000000c0)='-%:\x0e', 0x0) splice(r3, &(0x7f00000007c0), r2, 0x0, 0xde, 0x0) unlinkat(r2, &(0x7f0000001c00)='./file0\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)=0x0) syz_io_uring_submit(0x0, r4, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, 0x0) syz_io_uring_submit(0x0, r4, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x5, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000440)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f0000000500)=""/112, 0x70}, {&(0x7f0000000740)=""/128, 0x80}, {&(0x7f00000007c0)=""/117, 0x75}, {&(0x7f0000000840)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x6, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x40000002, 0x0, {0x2}}, 0xdc4c) mount(&(0x7f0000001c40)=ANY=[@ANYBLOB="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"], &(0x7f0000001b00)='./file2/file0\x00', &(0x7f0000001bc0)='adfs\x00', 0xb20043, 0x0) openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000001a40)='./file2/file0\x00', 0x400, 0x112) ioctl$SG_IO(0xffffffffffffffff, 0x127f, &(0x7f00000003c0)={0xe00, 0x0, 0x0, 0xfe, @buffer={0x300, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0}) syz_mount_image$nfs(&(0x7f0000000380), &(0x7f0000001a80)='./file1\x00', 0xa5d2, 0x0, 0x0, 0x400, &(0x7f0000003040)={[{'+\x97o\xc4\xca\xdb&\xae\xd0\xf3\x99 \xd9\x18i\x0e\xe5\x88\xfb\x04\x05\xd0B\x10\xf8s\xf0\xb2\xf5\xa0r_\x91\x97\xa7\x1e\xadh\b\xee\b\xecy\xa2T\x04\x93\xce\xf3\xb3\xf1\xb2jy\xc5\xba\xc5\xe2\a\xfc\x92\xcaAd\xc2h\xfc\xda\xc5\xf9\x9f\x8a\xb2\xe6\xbd\xf1\x17\xf0\xd4\xf8;\xb3,\xcd\x82\xe3\xde'}, {'vfat\x00'}, {'\x00'}, {'\x00'}, {'\x00'}, {'vfat\x00'}, {'%*-'}, {}, {}], [{@dont_measure}, {@audit}, {@smackfsroot={'smackfsroot', 0x3d, '$+'}}, {@subj_user={'subj_user', 0x3d, '\x00'}}]}) 19:14:11 executing program 0: ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x94, 0x1, 0xf6, 0x0, 0x0, 0x8001, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x89040, 0x3, 0x0, 0x9, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002c80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000018800)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000015d40)=ANY=[@ANYBLOB="20001a00000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x20}}], 0x2, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000001880)=ANY=[@ANYBLOB="a0000000000007280001800c00028005000100840000000c00028005000100880000000c000280050001002f00000008000440000000090c0001800600034000000000000003ff0c0002800500010021000000060013400003000006000340000200000c00028005000100010000000600034000010000140001800800010000000000080002000a01010208000440fffffffd5cf03c6fba1e96bac815b838796a78636b26bde7b1b4ba1842ed1ce6"], 0xa0}, 0x1, 0x0, 0x0, 0x8810}, 0x0) r1 = getpid() epoll_create(0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x3ff, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x100, 0x2}, 0xe) sendmsg$NL80211_CMD_PROBE_CLIENT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x5c, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0x4208, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f6600006530202ab02020205ed92d2b2426282b2d5d205c202b23402b219b2e7d2d203a202f6465762f6c6f6f702d636f6e74726f6c00202662200a049a69a2c25fc047d986535a476e28d697f6a490d03c29af6c2e04a0c8ed8b1fff9cfe88dd19236b37e38df7a8563de9e593a88d3a16f8bba32c3f900557f22320d46d9fae7fd67af6dae69de139fc65ce21"], 0x94) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4b49, r3) 19:14:11 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15eU\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:14:11 executing program 2: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(0x0, 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 2848.666478] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. 19:14:11 executing program 0: ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x94, 0x1, 0xf6, 0x0, 0x0, 0x8001, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x89040, 0x3, 0x0, 0x9, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002c80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000018800)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000015d40)=ANY=[@ANYBLOB="20001a00000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x20}}], 0x2, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000001880)=ANY=[@ANYBLOB="a0000000000007280001800c00028005000100840000000c00028005000100880000000c000280050001002f00000008000440000000090c0001800600034000000000000003ff0c0002800500010021000000060013400003000006000340000200000c00028005000100010000000600034000010000140001800800010000000000080002000a01010208000440fffffffd5cf03c6fba1e96bac815b838796a78636b26bde7b1b4ba1842ed1ce6"], 0xa0}, 0x1, 0x0, 0x0, 0x8810}, 0x0) r1 = getpid() epoll_create(0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x3ff, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x100, 0x2}, 0xe) sendmsg$NL80211_CMD_PROBE_CLIENT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x5c, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0x4208, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f6600006530202ab02020205ed92d2b2426282b2d5d205c202b23402b219b2e7d2d203a202f6465762f6c6f6f702d636f6e74726f6c00202662200a049a69a2c25fc047d986535a476e28d697f6a490d03c29af6c2e04a0c8ed8b1fff9cfe88dd19236b37e38df7a8563de9e593a88d3a16f8bba32c3f900557f22320d46d9fae7fd67af6dae69de139fc65ce21"], 0x94) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c80, r3) [ 2848.842921] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19312 comm=syz-executor.7 [ 2848.863026] nfs: Unknown parameter '+—oÄÊÛ&®Ðó™ ÙiåˆûÐBøsð²õ r_‘—§­hîìy¢T“Îó³ñ²jyźÅâü’ÊAdÂhüÚÅùŸŠ²æ½ñðÔø;³' [ 2849.422653] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2854.160917] Bluetooth: hci2: command 0x0406 tx timeout 19:14:28 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0, 0x0) link(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00') 19:14:28 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15hU\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:14:28 executing program 5: syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000180)='./file2\x00', 0x0, 0x0, &(0x7f0000000840), 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB='block=0x000000\x00\x00']) 19:14:28 executing program 0: ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x94, 0x1, 0xf6, 0x0, 0x0, 0x8001, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x89040, 0x3, 0x0, 0x9, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002c80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000018800)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000015d40)=ANY=[@ANYBLOB="20001a00000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x20}}], 0x2, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000001880)=ANY=[@ANYBLOB="a0000000000007280001800c00028005000100840000000c00028005000100880000000c000280050001002f00000008000440000000090c0001800600034000000000000003ff0c0002800500010021000000060013400003000006000340000200000c00028005000100010000000600034000010000140001800800010000000000080002000a01010208000440fffffffd5cf03c6fba1e96bac815b838796a78636b26bde7b1b4ba1842ed1ce6"], 0xa0}, 0x1, 0x0, 0x0, 0x8810}, 0x0) r1 = getpid() epoll_create(0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x3ff, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x100, 0x2}, 0xe) sendmsg$NL80211_CMD_PROBE_CLIENT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x5c, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0x4208, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f6600006530202ab02020205ed92d2b2426282b2d5d205c202b23402b219b2e7d2d203a202f6465762f6c6f6f702d636f6e74726f6c00202662200a049a69a2c25fc047d986535a476e28d697f6a490d03c29af6c2e04a0c8ed8b1fff9cfe88dd19236b37e38df7a8563de9e593a88d3a16f8bba32c3f900557f22320d46d9fae7fd67af6dae69de139fc65ce21"], 0x94) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c82, r3) 19:14:28 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x5510, &(0x7f0000000180), &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) dup3(r3, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85f508c53b74be1cc06a8682449c18237d779b4f25f709ca", 0x1a}, {0x0}, {0x0}, {0x0}], 0x4}}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c8d, 0x4e98, 0x3, &(0x7f0000000080)={[0x45c1]}, 0x8) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x100010, 0xffffffffffffffff, 0x8000000) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x8000) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_CLOSE={0x13, 0x4}, 0xff) syz_io_uring_submit(r4, r2, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80000001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:14:28 executing program 3: r0 = socket$inet(0x2, 0x3, 0xff) sendmmsg$inet(r0, &(0x7f0000000ac0)=[{{&(0x7f0000000100)={0x2, 0x0, @broadcast}, 0x10, &(0x7f0000000000)=[{&(0x7f0000000280)="f8dfef5402746c30adc962258104de2e8bfca2030a4813069af541bf1675433b", 0x20}], 0x1}}, {{&(0x7f0000000680)={0x2, 0x0, @rand_addr=0x4}, 0x10, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="10000000000000ffff00000007000000"], 0x10}}], 0x2, 0x0) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x208000, 0x0) connect$inet(r1, &(0x7f00000001c0)={0x2, 0x4e22, @multicast2}, 0x10) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) sendfile(r3, r2, &(0x7f0000000040)=0xb, 0x80000001) write$P9_RLOPEN(r2, &(0x7f0000000040)={0x18, 0xd, 0x2, {{0x8, 0x4, 0x8}, 0x1f}}, 0x18) r4 = perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x9, 0x81, 0x0, 0x6, 0x0, 0x0, 0x1000, 0x9, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x1, 0x9}, 0x80, 0x7, 0x2, 0x0, 0x374ec00000000, 0x8001, 0xa38b, 0x0, 0x3f}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) stat(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) recvmsg$unix(r2, &(0x7f0000000540)={&(0x7f0000000380)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000180)=""/21, 0x15}, {&(0x7f0000000400)=""/163, 0xa3}], 0x2, &(0x7f0000000500)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}], 0x20}, 0x40024000) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r2, 0xc018937b, &(0x7f0000000580)={{0x1, 0x1, 0x18, r4, {r5, r6}}, './file0\x00'}) r7 = memfd_create(&(0x7f0000000140)=',\x00', 0x4) sendmsg$nl_generic(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)={0x1c4, 0x18, 0x300, 0x70bd2b, 0x25dfdbfc, {0x1f}, [@typed={0x4, 0x40}, @generic="6156246234afd8c2b54ef1dd70de37b5cf236d92f2de1ddfd0107bcc1a66a7f0be49a0e8c3ae8760b6d8fc86c683a120f43268825dedf443ed37bf33ecc0fda07d4711b79e3e", @typed={0x8, 0x73, 0x0, 0x0, @uid=r5}, @typed={0x8, 0x74, 0x0, 0x0, @fd=r7}, @nested={0x154, 0x8e, 0x0, 0x1, [@generic="8c4fbec920344227948c2af2d0bcbf3eae0fee3941566bf77682a13a748d90b7e7159dad0359f77f0e138d54ba2732f4a1cdb08823e815018b78bf37f828bbad5f13c98f189b8b049bb1b8d31cc0aba7c536e802b4db691c4e4d814f912eeb48450bc7e0e018ed9af638120698039f0932", @generic="8ff6c1465f1a5f426d028c0ceac197531f4f57a9e9ae7aeda8728d249b0d249db57e0ad67b81c72bb6104392b4433db7ae97e77b6a69f10c438953ad7644fa94a8d73c8b19f80eeff8e7e3f4c8acedcf9c1c07c438356a2370a1027f4ad2019291216bc94754f7005db67ef465f86555da8d7d7b13881d71db435b9ff26706d8dab147ac0c419f92a039296240662da5760ad92cb2d2752685c06dc6dffc32f659d0bc53c7077e67e1a498d4d1c32c318e724e", @typed={0x4, 0x88}, @typed={0xe, 0x5c, 0x0, 0x0, @str='/dev/hpet\x00'}, @typed={0x8, 0x86, 0x0, 0x0, @ipv4=@private=0xa010102}, @typed={0x8, 0x3b, 0x0, 0x0, @u32=0x3}, @typed={0x8, 0x46, 0x0, 0x0, @ipv4=@multicast1}]}]}, 0x1c4}, 0x1, 0x0, 0x0, 0x20000994}, 0x20000010) 19:14:28 executing program 4: r0 = creat(&(0x7f00000000c0)='./file2\x00', 0x0) r1 = syz_io_uring_setup(0x4d4f, &(0x7f0000000240), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000000, 0x13, r1, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000004, 0x4000012, r1, 0x0) io_uring_enter(r1, 0x58af, 0x0, 0x2, 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x1) fcntl$setown(r0, 0x8, 0xffffffffffffffff) r2 = creat(&(0x7f0000000040)='./file2\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x32, 0x0, 0x7, 0xff}) creat(&(0x7f0000000000)='./file2\x00', 0x0) 19:14:28 executing program 2: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 2865.263861] audit: type=1326 audit(1733339668.344:201): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=19327 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa515ed1b19 code=0x7ffc0000 [ 2865.289589] audit: type=1326 audit(1733339668.369:202): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=19327 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=83 compat=0 ip=0x7fa515ed1b19 code=0x7ffc0000 19:14:28 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15eU\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 2865.337740] audit: type=1326 audit(1733339668.417:203): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=19327 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa515ed1b19 code=0x7ffc0000 [ 2865.340811] audit: type=1326 audit(1733339668.418:204): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=19327 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa515ed1b19 code=0x7ffc0000 19:14:28 executing program 0: ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x94, 0x1, 0xf6, 0x0, 0x0, 0x8001, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x89040, 0x3, 0x0, 0x9, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002c80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000018800)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000015d40)=ANY=[@ANYBLOB="20001a00000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x20}}], 0x2, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000001880)=ANY=[@ANYBLOB="a0000000000007280001800c00028005000100840000000c00028005000100880000000c000280050001002f00000008000440000000090c0001800600034000000000000003ff0c0002800500010021000000060013400003000006000340000200000c00028005000100010000000600034000010000140001800800010000000000080002000a01010208000440fffffffd5cf03c6fba1e96bac815b838796a78636b26bde7b1b4ba1842ed1ce6"], 0xa0}, 0x1, 0x0, 0x0, 0x8810}, 0x0) r1 = getpid() epoll_create(0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x3ff, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x100, 0x2}, 0xe) sendmsg$NL80211_CMD_PROBE_CLIENT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x5c, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0x4208, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f6600006530202ab02020205ed92d2b2426282b2d5d205c202b23402b219b2e7d2d203a202f6465762f6c6f6f702d636f6e74726f6c00202662200a049a69a2c25fc047d986535a476e28d697f6a490d03c29af6c2e04a0c8ed8b1fff9cfe88dd19236b37e38df7a8563de9e593a88d3a16f8bba32c3f900557f22320d46d9fae7fd67af6dae69de139fc65ce21"], 0x94) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x541b, r3) [ 2865.360137] audit: type=1326 audit(1733339668.438:205): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=19327 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=86 compat=0 ip=0x7fa515ed1b19 code=0x7ffc0000 [ 2865.363023] audit: type=1326 audit(1733339668.438:206): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=19327 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa515ed1b19 code=0x7ffc0000 [ 2865.375995] audit: type=1326 audit(1733339668.438:207): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=19327 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa515ed1b19 code=0x7ffc0000 19:14:28 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15lU\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 2865.424242] audit: type=1326 audit(1733339668.438:208): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=19327 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=317 compat=0 ip=0x7fa515ed1b19 code=0x7ffc0000 19:14:28 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = syz_io_uring_setup(0x4d4f, &(0x7f0000000a80), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) syz_io_uring_setup(0x7243, &(0x7f0000000600)={0x0, 0xff69, 0x20, 0x2, 0x24, 0x0, r1}, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000ff6000/0x1000)=nil, &(0x7f0000000500), &(0x7f0000000540)) ioctl$AUTOFS_IOC_PROTOSUBVER(r1, 0x80049367, &(0x7f00000006c0)) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r2, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000980)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0500000000000000000006000000000000007b45a393842afb436e6dcb5977ae9879d26d929987b5f23668861fc89bb0b85c590b153ba095ab22c77db6ba304c381179529a669bb9df8bba89e68e0654ba65bc4e1cc7917b2d75aff9abf0023579525f10d76d892dcd643ca13804da8f51dc18afae01feeb8aab6aad4fac8d06acb4fe2e69ef0b5b1469f91a783d519955ba18df9b89291065d2f1a49fcfb0e79a2000"/176, @ANYRES32=r4, @ANYBLOB="0800050002000000"], 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r2, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r2, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) openat$hpet(0xffffffffffffff9c, &(0x7f0000000480), 0x101000, 0x0) sendmsg$IPVS_CMD_DEL_DEST(r3, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000380)={&(0x7f0000000600)={0x90, 0x0, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xdf5}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x8000}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0xb}}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x2a}}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x6000}, @IPVS_DAEMON_ATTR_STATE={0x8}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x65}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x101}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x81}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xe16c}]}, 0x90}, 0x1, 0x0, 0x0, 0x4000}, 0x0) syz_80211_join_ibss(&(0x7f0000000040)='wlan1\x00', 0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r5 = fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) openat2(r5, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000440)={0x4202, 0x49}, 0x18) sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000900)={&(0x7f0000000b00)=ANY=[@ANYBLOB="40010000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf251a000000280122804c00008008000400320a000008000200010000000800070001000100080002000000a001080007000100008008000400060000000800060000000000080007000400000008000300000400005400008008000400400000000800040007000000080005007b000000080006000700000008000500010000000800030003000000080002000200000008000300000c00000800040003000000080004004e0000003400008008000100ff030000080002000500000008000400050000000800020000000080080004000300000008000200b68a00001c00008008000600ead80000080003000900000008000500010000003b99c36c4efb874b080000000800040001010000080006000700000008007c0000000000080006000600000008000100400000000400cc004273edbf63368680ed59146400d118aa874784317597e98da6f0a1c6c13ad357ed632a3e8abfc9139e541ceccdeac0395d2c247c2d9a45b16d79922436541fe05a9f2dcbd70556ce34ee80f721f8d914271b5bbe6321d01bd4c8958fd7202e1b89ab43aa281b182c606daf9715d55888e442562058aa982de712ac49"], 0x140}, 0x1, 0x0, 0x0, 0x40}, 0xc0000) [ 2865.444903] audit: type=1326 audit(1733339668.439:209): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=19327 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa515ed1b19 code=0x7ffc0000 [ 2865.452152] audit: type=1326 audit(1733339668.439:210): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=19327 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa515ed1b19 code=0x7ffc0000 19:14:28 executing program 2: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:14:28 executing program 4: r0 = creat(&(0x7f0000000080)='./file2\x00', 0x1c9) fcntl$setlease(r0, 0x400, 0x1) fcntl$setown(r0, 0x8, 0xffffffffffffffff) r1 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) r2 = syz_io_uring_setup(0x7243, &(0x7f0000000600)={0x0, 0xff69, 0x20, 0x2, 0x24, 0x0, r1}, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000ff6000/0x1000)=nil, &(0x7f0000000500), &(0x7f0000000540)) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) dup2(r3, 0xffffffffffffffff) sendmsg$nl_generic(r3, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f0000000680)=ANY=[@ANYBLOB="800400001c0000042cbd7000ffdbdf251b0000008f00268008000600", @ANYRES32=r2, @ANYBLOB="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", @ANYRES32=0xee00, @ANYBLOB="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", @ANYRES32, @ANYBLOB="8ea6d21d9aa3c43d8c6cee279c411cba49626a1ffbd9c968019e121fe8e150eeec63be7b64d341fa082d35f22a7f55c32a8a9a29ec1a2c1a1552caaef58e7f20b4f2420530281e012ce37418b94223f2af78a75a7b6697ff33eb28f4304ecadc82cd99b771be0b9198e635b5461e3965119cb9928c3717688f55a400bf4604e6e27c18a3dae1374bdc7e864303f287970015312ea158a551b07ee0db74a00ab58764f718db594ec6ba9e97c5d1dc217924000000"], 0x480}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r4 = gettid() pidfd_open(r4, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff6000/0x1000)=nil, 0x1000, 0x1, 0x100010, r0, 0x0) fcntl$setown(r1, 0x8, r4) creat(&(0x7f0000000040)='./file2\x00', 0x0) creat(&(0x7f0000000000)='./file2\x00', 0x0) 19:14:28 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x5}) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0/file0\x00', 0x911802, 0x140) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) r2 = openat$hpet(0xffffffffffffff9c, 0x0, 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x93f1, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000009640)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f000000aa40)={0x0, 0x0, "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", "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"}) r7 = mq_open(&(0x7f0000005c00)='-@\x00', 0x42, 0x0, 0x0) flistxattr(r7, &(0x7f0000001140)=""/76, 0x4c) mq_timedsend(r7, 0x0, 0x0, 0x0, &(0x7f0000000040)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000007640)={0x7, [{}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {0x0, r4}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {r3}], 0x4, "9755154351ac9a"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000009640)={0x0, ""/256, 0x0}) mq_timedsend(r7, &(0x7f0000001e00)="3cd52ed97c9e213909d730166b17123f3294a3353d43c2bda33f8b46124feb3e574cb78ff55dae93c1d80f8b1b571caa5d0f953fdc20af7c2907f40c853111e5a4a6405dfd6510e2573f0cd5a14f722a746315bf5955d6443a167b62e37e70e67059a451add17b0ba3a4967e37a184c25fd56c25f32d2c08713830771e190d3e72e360fbae6eb7f69da7ae1b7575584eb3aad405c2e0cecf7c57c725e35199b38412b21fb229249cb5214590ea9c200b689ed99433fbbb389404f04d726fe19ef657f8896380c769f15ede2ebc816773d5730db7acb1828fbcdffc4da713e0944bca7028c47238c1aace7879fca945a836e4ff365b155de4a6b5e69df15c57c8c84a27359b026401b2d2ebb22fc4727115b803cbed672e1c10421e53aecb9848432f39231a6fe45af05a49d7f66593d188b01763da10fbe076c0103b005492008157072857ecefae4dfd561229bd8ecf19e938d25a4315e343c5ffc67c1810af17fff3e930e390dc021b8a020e9ad5750cbdb6ac2406d580f35c6776feba23704f457eb3c9e481a38ae02519b5561493b3a5a22682f0622f55b91bf3fe3b6eeb0b411767b39cf41b6ea7f7606bbbf59f038ed99313e9185bafa0f1fb0d7f8f854025afe6eb498d49d00f869ed3d4abccfb90d70f1dd88a92a1f6c2a1f62238ff8733e3b25225fe919598664429606c6ba859544fe0de3a9f18ed8fdd5e9ce15ab80c870a454b550e5fe805396bf4ed72b627314fad05b74a500135c9bb1b297b170356d42c9983c3275dc8c95a5a198f3b896c712d4c44d66ee10f29d4d71df5484c473cdcd107d66ded8e5219a066b00f45faca7ccbde009031f583819cffcba547c3b5707c7c1eba73dc6ade8f584244ba35302df2a0341c8e629d52fad82cc1c34dac09d39a975902e883ce1b648080e5855ad37961abaa7eecab4ac63cb839f4039f8b93d2ba6e618ebc437166e24e210171bc8ae12f31e90adadfdba265f9a8df86648ff4bcff451f289c9142ef5bac4ba3131852ff820087a5b7e1131eb05c8c857dd4cf2839501138174f70eca95c39a59220f47be95cbe4996c214f17e5a790679057bf0c05e7d79797fa74af891a0bb050183e9124f3677a94c92e3caaeb095d0746fa8a82e30f14b228fffee24ba0385ae2940a223aa6fdd3bee655aabb131e4660eefa4e65a0cd2197f54d94783a2513ab6ae8c548b7fae70692ffa367a95cde0cd90d37be42547f30d1583a913b11c9f998d60d8c78a3677d79c717dde50a0124d918e66655902e6cb60ddd82727bc05b31057693ee9d7601be6d8870edc47c328afa800911568d99655a271c65de3a07616806e280bd453217ee2420b32544c67e34bbcec1874b450af23af54048d3a10e71967bc1ee3c0029235d95f158895bbdddfa81a3cfbcc74c7c352820f75e00324e154441074853b7c2dc1c3ed42873c6323e0bd29058b62187f57ee8def92612a91b1598af90904e770a8788c05934b54f998ed0a4b54198e74a1bdcd6e5a07109f6bd0271384211633d2d70c28843fbed80968d3cf49a697bfaffb92101e0626dc34c4b9a8b47438606152c9eea6481597918ef7739be21f562c86289b842b1d9208459f41716f2518da7d3f4ba062c0ea28a221e44f071325deef0c9ce5e8bb729e8f393020db13ad241503f9c4dc21fee5bc58893e112a2bd2528aa825c3b8e19d8312b268a43c9c662737da60bf318a5cd9069a2d96653818733825f5808371ad593f124ce11272705b5dd827d269ea01ea8a3948418278ba34338fea40665bcb5365033785adbbc7f20ea2489a728670108781da688a9d2f327f7723b76e4d2dba9c05a8f15bc05fdd521ce44e606fb0daf61c3cf96094bc4c8ca55892cd55803da5ec5f72c9ea01273ba23d834061b1a4e7778470cb726d78692d1d00291b9753fe96e43b24f239b575978b0fc6855aae3e384fff6dca011d58ca718f5a64ce083744057fadce07c1569c0a2dd34cc2f990c2d0705d4ad2dd03ed74e005e495987f5dd3b561bfd610d372abd48da2cdaa6253b074b55a30c7663daf7268768a656ac8f36d0c61a6671f6b75b69634c5c3cb06bf7d28e5b01743d673ed200a51e70f7d72c908e21769144a72870fead7075c25ddadbfeb9a9818638c3829d329eac2eb542f190986977bf6b79ae967ede1bc3e998d271f8225d5ae195e1be0ae7be5dba2584bcda86187ccde07022a3a462f505557140b14646b8d2ccb67c82bcfbeb71ece2f3af3d2d522613571766fbc39716026361c6d109d1ca6616495a5c1186cb2009e8d365abaf16a81230ad8c05889f9fcbb7ce0c6a507f9b5a078dfe5a7483d376f16428d23eb15c688f252d8548b5d94f34f8cd430b1a31bcc3e1ce90d14e3e7a33021df06882d32b90e4c6968c8046a7410bb6920f278d1b1c166875217c8e8d417adf9b50c85c509fa0581d906ab12c339e7ce03a49693489e7965043c75e5950363f062e43933d848ac73cb5f8585eee7d22305f9332df9ad7a11377c01f15ae3009d92dc3fae370f8f817400fd7f5aeb5b103fa1ba707b86ebff9324e2d52a8d46baff356e4be977bab515127107916440e1867c4d6279b08479597b3268c98566723c935f96b569b2b60807f8a046ea6e2761c062c7913dc9d4bf71f60ee2fd0e7bb3e5b718e8d4a62c43f2d53d9ecdbfb6d1dea8d8ce51c574c5007a55bd1a5933e3895659255153d501e3419ecb2c63cf337b7de31b0830f7c5b4fe267ef576c7776d34e47c7ee204609284af5a10a88b0d2488574d50614b004c04285cadc63001ac023f570b6fa4c0a21635b2d53405c4279ce02ad7033cc5df8559e1cafb3e6b0dd169df0a980a27d5acd32f68e166ddd6c43e186de12bd09f14e644c5f7a696b1cec0cfc757dc64e8f0b64c8bab66db414fa724c175fa49676d0ae100537b7cb55751a54149b60653a20bbbdaa58a9172228e553a5ec93387db79eaa9cd542cf8035d4c50b7e09e3728f153641e7fd5c9cb8969df5374a25d3611aacc81ea1d195a4b2f7e1f861259fe1d2d6422e32acd44d2f996508c07e54b200a472e4782b0e5aa030898f4c51b578f60d17fc5c01055be225120118c20b171d8bffe38f194b0ef598ac5696825da3442eb0513e31dcf997a213ffb711392223c906b637c77a5ac612611b9d4f949bfa43d746b38fa61a2b736f116edfeda864cf56357f0d9ed25d27cb057c8227379a86d9f2bf00f289ea8fcf4a61f0bbc50045047e7ef0b097e4c65d749f4d40a89f6ff2e17990e837f81364faaf32cd0c5cdf9846173610759a22a424e00f57a3143c8cf561f12489ff01fa64ef27c39370e1eca076ecaa6fbd701ad2a29b80cca60bdccd34e5f26fd0ac661ef5da02883d55401b05b15770399f960c8749fdc90fc06ddc18bd88ad6d21a7db3aaf52e28ab741f211898192d4ab34b659e79eddd844a28b5c3d0125f5b8781f270f7832114c744bc5820a60b28d408291884c0f85b47e660f8545c412c235e85da5e33bd315067b9f89a36b76e204e82ee465031f0fc463d42254f73fe269bd7ba4f4f06dafe7057f58f5387f40b0bf3fa2e9ca6b2afc496d26ebd092e0373750cc649f16e1e35179825f3a51d8b015539a4ba1661addc540c776257ceadb0d795f8fd6737bc302fc39b4dda8bf0db0f4d0a62839b02ff488810413131a566082d864e5bfc3e073a63f17b28aa8929cd239f50689fef85a8de3308be69b82d7eca3d9e5190586362841d1ff6c562a3c6d74e57750e80baddf2aabd9cc40ff3aa30e2a9be9150815977e3292f171cd184074d00e90251ffb0943b276e67a87d7eed7af3d886519f54aec72d5eb01268202999e8d78532461a8524aa0fea7c49aa864f956bc4dd31047a529f8bbf4ba971ded87c6121533491863d6d2f4dbeac566839675a781f43c9ed27d0527c961a60f212deafd75ac331674b4e76d9151c9813aca07565b1e8b52a835d1693f36cdb9be6fa8cdd7431183467be6dc75c867268cbc7f7a6cd1059ccb123c47de06785d1deb8a2a4ab286929253e05107d07c80d2790af78fe59f022763514ade2fd2f2aa0fff6c99c6af7498c9024259f2f49d8e0f054b9e7d774b4e7b1552340012153d4c79451be6ffc71079da12c140d97f3a813256e93e22e3ff9045fc6075df39fab13ed8661a6a06bc083194ebe6bc40040840f08cd586d7a3a36fe7015d3a636f94553955325eeb3d5c538251202c6c1521cbe2b87e3a22ffd2744094a44be4a63e09271a29fbddc042872a53dfe54670d0028d640754c2aa06ab7e299244bcf5517eca5a0d50799ff872bdafe888a587633f3771c161c520e56764ae13e351dd4a4fbbc4c12e00986c58a3af279473acfa42cdd442d2ab36a1f2c8e15df74b9b9fdb7f4ed0a527e1b2522ea18b822d420e493a114031ef87dad32101c7002f7aacd435e3c952c5edf7f6317215709f673926e15feb3021c3d31adaf27f468ed93f65201963ce3ec173f8003d417961a503bfe5181ed3397bfe1299107235aa1562baf276ddc6b3e802a35042d0f8a79ee06102c8e9b0a92e7e92da2788c8e6450a924fe8d7637a183f9a0b69e949ee3d54bd5abf9b6a90bd3cb8a9bc9d8d91418c72b3fe665d54dec99eb53fcf474a0f42171e2f3fb16a00633408f77c205a168f70379d5f10988510ed2605f1811c5c22d9e3e44f483cfc65e373e431eb224414db926be369c40fd1e40f2938cc484b33f69d8ee518c33a91284d6e3635720b731c68011d6b467219a6deb3b6c47ae211375d738b6f77a4f6ea2b80579aa34b3d0bced65466b6946f386482db484af971f33f546f2c0b0bcf6135784fcf3f0f1006fe34617e86adbabf80935995d34b48b9d1f12ef089510dbbd616a59e875d3f3e0aa7aea1758d6c5f2a699d031823205a4ad815efee17395d817015c392a79e4d0ac9686e596220b0ecdd2c1646e54a5630cd6022b1f52d81de0b7c0e772ab6a9c931bf527b0a874f79fa860cc82283d36be2114a4ce514b60f2b1ef941fb4e1a8d2899467d6231f82fefa3bc2462677ffd1d2436b44bf4f7fe734064f0a0b16c3f16332a85895ff84494009e00440ff7940096065996741278b3652d6286545b10c77ab2e905c1bb8c2d538ca6521df0707f55e0054d2d87d060f863c9cc50db915ac404ff6017a48a04190d12168a647d803819879c0bc3e688663d1585493dc800727fb4775473005d0cc37c3941dddb31071cb5389083a0ee8aa5317326c7f8a29646e24bb32c6d6198d2e095a6694f5ad98e3940608d60e169cc7dc507564e043aebdde61d7adf96f0a52adbde8f9ce5f99a323c8cfbb35c23baef865a6a6f949b9ee425ed2dbf1f74eda38aea9bb1e814f8de792d106ffc2030223aed765a49a8c5225f986508d023b698226c40e366e93264fbf51c2fa8a889f13ef4b768c480ae4ef3d5f061d7cd2ea2456e0c2bca80c3e7b23209a4d221a1df8cc6b3e5fa6dead523253952380abf2ca49d628a4078e4c34c49caa2f84dbd9325c2459dcf8ffe65163a438dc1f204cfeca634cfd0a2f0f165539b88bbff3b4136f21cd050ea0c2959701aed2f44be88498bd6ccad2935aa459f91e146928eceef45a9dee8ac5d9ecedf6f3757a3058742aa743b74020dfbd925deacc4fc4c1e1d91653f93b190229888c5103c29a4b5ffc836babd2035e79d5742e32f663fa44ad2ccb40e547037ecfc1d8f1cf1f70638302c6b8e8524ffe1e1b33464ae0c4ad2b8f53350998a864ac84789fd0f48534295285e6", 0x1000, 0x5, &(0x7f0000000000)={0x0, 0x3938700}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000000140)={0x0, [{}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r20}, {}, {r16}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {0x0, r18}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r17}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {r24}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r22}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {0x0, r23}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r13}, {}, {}, {}, {}, {}, {}, {0x0, r19}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r21}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}], 0x7f, "9656c75f04ba4d"}) lseek(r1, 0x0, 0x2) r25 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat(r2, 0x0, 0x480c1, 0x186) copy_file_range(r25, 0x0, r1, 0x0, 0x200f5ef, 0x0) 19:14:28 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000180)) openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x40}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000240)={0x7, &(0x7f0000000200)=[{0x85b, 0xff, 0x0, 0x5}, {0xfbf, 0x4c, 0xcb, 0xffffffff}, {0x3, 0x1f, 0x1, 0x42a}, {0x0, 0x2, 0x81, 0x7f}, {0x1, 0x3, 0x6, 0x9f}, {0x5, 0x3, 0x7, 0x5}, {0x66, 0x7f, 0x1, 0x3}]}) setxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) 19:14:29 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15eU\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:14:29 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_FAIL(r0, 0x9361, 0x3) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000001500010000000000000000000a00000008000000", @ANYRES32=0x0, @ANYBLOB="6543b45d1b267306ebfa7fa688dfee74583e4a68d66caafc6b1afe62e2e801aea32f4798f868f1f4db75d786e3ae62a881d3d8a7b663ea743c4668fce6f137db577b3832b87a30bd91750fca569c5ce034c2f1dcf904253a8072e6614ba06ad102f961251e2e496db98811b02e3715af3fe5115ca41b13249ddbe06f79f05e4434e242ac6d3fc9fbbb187cb44af12d5a7320244deb38dbccf20d3eabdcbd"], 0x1c}}, 0x0) pipe2(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r3 = memfd_create(&(0x7f00000000c0)='-%:\x0e', 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000001c0)={0x0}, &(0x7f0000000240)=0xc) write$cgroup_pid(r2, &(0x7f0000000280)=r4, 0x12) r5 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) syz_io_uring_setup(0x7243, &(0x7f0000000600)={0x0, 0xff69, 0x20, 0x2, 0x24, 0x0, r5}, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000ff6000/0x1000)=nil, &(0x7f0000000500), &(0x7f0000000540)) r6 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000180)='io.pressure\x00', 0x2, 0x0) tee(r5, r6, 0x80, 0xb) splice(r3, &(0x7f00000007c0), r2, 0x0, 0xde, 0x0) open_tree(r2, &(0x7f0000000140)='./file0\x00', 0x80001) 19:14:29 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15tU\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:14:29 executing program 0: ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x94, 0x1, 0xf6, 0x0, 0x0, 0x8001, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x89040, 0x3, 0x0, 0x9, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002c80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000018800)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000015d40)=ANY=[@ANYBLOB="20001a00000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x20}}], 0x2, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000001880)=ANY=[@ANYBLOB="a0000000000007280001800c00028005000100840000000c00028005000100880000000c000280050001002f00000008000440000000090c0001800600034000000000000003ff0c0002800500010021000000060013400003000006000340000200000c00028005000100010000000600034000010000140001800800010000000000080002000a01010208000440fffffffd5cf03c6fba1e96bac815b838796a78636b26bde7b1b4ba1842ed1ce6"], 0xa0}, 0x1, 0x0, 0x0, 0x8810}, 0x0) r1 = getpid() epoll_create(0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x3ff, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x100, 0x2}, 0xe) sendmsg$NL80211_CMD_PROBE_CLIENT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x5c, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0x4208, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f6600006530202ab02020205ed92d2b2426282b2d5d205c202b23402b219b2e7d2d203a202f6465762f6c6f6f702d636f6e74726f6c00202662200a049a69a2c25fc047d986535a476e28d697f6a490d03c29af6c2e04a0c8ed8b1fff9cfe88dd19236b37e38df7a8563de9e593a88d3a16f8bba32c3f900557f22320d46d9fae7fd67af6dae69de139fc65ce21"], 0x94) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x5421, r3) 19:14:29 executing program 2: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:14:29 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f0000000240), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000080)=@IORING_OP_ASYNC_CANCEL, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000000, 0x13, r0, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_mount_image$nfs4(&(0x7f0000002300), &(0x7f0000000000)='./file0\x00', 0x5, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYRESOCT=r2]) [ 2866.911820] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2866.922014] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2867.407923] nfs4: Unknown parameter '00000000000004077740000' [ 2867.429588] nfs4: Unknown parameter '00000000000004077740000' 19:14:45 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15eU\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:14:45 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x3c, 0x3, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x5001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) dup2(r1, 0xffffffffffffffff) openat(r1, &(0x7f00000001c0)='./file0/file0\x00', 0x20000, 0x2) creat(&(0x7f0000000200)='./file1\x00', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/seq/timer\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x100000001) 19:14:45 executing program 2: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:14:45 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000001180)) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='mountstats\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) r2 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x5, 0x9, 0x0, 0x1, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, r0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r4 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, r3, 0x10000000) r5 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f0000000080)={0x0, 0xfdfdffff, 0x102, 0x0, '\x00', [{}, {0x800, 0x0, 0x400000000000000}], ['\x00']}) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r4, &(0x7f0000000480)=@IORING_OP_ACCEPT={0xd, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000440)=0x80, &(0x7f0000000840)=@qipcrtr, 0x0, 0x0, 0x0, {0x0, r6}}, 0x81) write$binfmt_elf32(r3, &(0x7f0000000200)=ANY=[], 0x31b) signalfd4(0xffffffffffffffff, &(0x7f0000000080)={[0x8001]}, 0x8, 0x100000) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) msgrcv(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x26, 0x0, 0x1000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=ANY=[@ANYBLOB="3314c7e159f443f90b1aff04f119f95d3028d94a2fc37de8b95aa96d0c7aadc8095936db1b57694aa29e3ddd20c31f5539a8d7ce6bfdb32c22707cd13a6489c417", @ANYRESHEX=r0, @ANYBLOB="0b0b000000000000000001000000"], 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) recvmsg(r5, &(0x7f00000006c0)={&(0x7f0000000640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000940)=""/165, 0xa5}, {&(0x7f0000000a00)=""/166, 0xa6}, {&(0x7f0000000ac0)=""/203, 0xcb}, {&(0x7f00000007c0)=""/114, 0x72}, {&(0x7f0000000bc0)=""/196, 0xc4}, {&(0x7f0000000cc0)=""/225, 0xe1}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000000dc0)=""/130, 0x82}, {&(0x7f0000000e80)=""/155, 0x9b}], 0x9, &(0x7f0000001000)=""/143, 0x8f}, 0x60010000) mount$9p_fd(0x0, &(0x7f00000005c0)='./file1\x00', &(0x7f0000000600), 0x4826, &(0x7f00000010c0)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r7}, 0x2c, {[{@posixacl}, {@privport}, {@version_u}], [{@hash}, {@dont_appraise}, {@euid_gt={'euid>', 0xee01}}]}}) r8 = syz_open_dev$vcsn(&(0x7f0000000000), 0x7fff, 0x200100) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r8, 0x80286722, &(0x7f0000000200)={&(0x7f00000004c0)=""/246, 0xf6, 0x6}) 19:14:45 executing program 0: ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x94, 0x1, 0xf6, 0x0, 0x0, 0x8001, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x89040, 0x3, 0x0, 0x9, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002c80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000018800)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000015d40)=ANY=[@ANYBLOB="20001a00000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x20}}], 0x2, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000001880)=ANY=[@ANYBLOB="a0000000000007280001800c00028005000100840000000c00028005000100880000000c000280050001002f00000008000440000000090c0001800600034000000000000003ff0c0002800500010021000000060013400003000006000340000200000c00028005000100010000000600034000010000140001800800010000000000080002000a01010208000440fffffffd5cf03c6fba1e96bac815b838796a78636b26bde7b1b4ba1842ed1ce6"], 0xa0}, 0x1, 0x0, 0x0, 0x8810}, 0x0) r1 = getpid() epoll_create(0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x3ff, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x100, 0x2}, 0xe) sendmsg$NL80211_CMD_PROBE_CLIENT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x5c, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0x4208, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f6600006530202ab02020205ed92d2b2426282b2d5d205c202b23402b219b2e7d2d203a202f6465762f6c6f6f702d636f6e74726f6c00202662200a049a69a2c25fc047d986535a476e28d697f6a490d03c29af6c2e04a0c8ed8b1fff9cfe88dd19236b37e38df7a8563de9e593a88d3a16f8bba32c3f900557f22320d46d9fae7fd67af6dae69de139fc65ce21"], 0x94) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x5450, r3) 19:14:45 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15zU\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:14:45 executing program 1: add_key$fscrypt_v1(&(0x7f0000000600), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a5480900000000000000dac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) r0 = getegid() perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x5805}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setresgid(r0, r0, r0) setsockopt$inet6_IPV6_DSTOPTS(r1, 0x29, 0x3b, &(0x7f0000000200)=ANY=[], 0x8) sendmmsg$inet6(r1, &(0x7f0000000040)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="10", 0xffd0}], 0x1}}, {{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000008c0)="7f", 0x1}], 0x1}}], 0x28, 0x8080) sendmsg$inet6(r1, &(0x7f0000004380)={0x0, 0x0, 0x0}, 0x0) request_key(&(0x7f0000000540)='.request_key_auth\x00', &(0x7f0000000580)={'syz', 0x2}, &(0x7f00000005c0)='\xf7{]&\x00', 0x0) unshare(0x48020200) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) accept$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000300)=0x1c) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x1a, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000340)={0xa, 0x4e20, 0x400, @loopback, 0x7}, 0x1c) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000280)=0xc) 19:14:45 executing program 4: r0 = creat(&(0x7f00000000c0)='./file2\x00', 0x0) fcntl$setlease(r0, 0x400, 0x1) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000002440)=ANY=[@ANYBLOB="380100001a0001000000000000000000ffffffff00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x138}}, 0x0) sendto(r1, &(0x7f0000001080)="d9c3131e79f3f1d43dcdf61422eb0d54fc63a7a94d9637c8d8bd14c45b177ed514eafa297253b5bdccd1536f4e376d6fac15e4d24466f1cb51670b0e16198098b204d0524abba26f48570c593fe5698633f5d54244ab28c3d2e37c6df195d0e5584e8b5c9be70eb99516f622dcb3387d2eea15d78c850c09002f06130ded4e5e70e7e4e1bd554e94852e046b2be2b158172bbd0a28da9013d762bc01b51cf65339942af9025856971dcb37972922ffaf70914b782beca316fdb025375e7813e4ce6011cfb35a207d58a0a0a517068781bfaf17e0943909092b5024ee88954556c0354e3a58494ee086ed5aa1f979217083df434dcc3bc3bf872ed51bb42c94a590caaaeafa3209f8634e59f9b69ad58a04be3057464ffa30ff5bb7d8bb9bd935d9575605fafe55ca75fd7515ef5bc99187cdef2a6719c161b6c74d33e2cae77072e73f8febc85a77f194bf2e6f26b6758bec898d166184a8edc2f0a4a5f8c2f667dbd3b5ec7cf823ae36c95a3c70107c5502fe58f9a57c8e4e7c9ae1db3a8c34f41330dd96aed30538b94c4e07e1cfe1859c7fe9f3f288117c7d76da2fc881cb85adb772a82f2fe2c65852be3c7d75a025413030a3cd9e1e7e51574d0d8c9c7edbb9ebe6df06659068da4410103ad4527203bd3de8d8368ce7d62f24f71709660da734aa953db44d8ebf3aea31e8d154da6eedf0a37a9f6c937b94c6f383fbbb61ab8d42c9bb4f852b96392b7d2a5301a015a0193ee0220a71678515025fac9db4a7792e4b8517a9cf73b3f180560e126c8cd133dc2d8ee0b09adad742bf08e7af65a9cdd7c37d34e3b1df15ffb93e0e25622a02fd3bb85922c8db7139d56b90389f0a02800736c175e4d61290b34cbf5a0e85214b2344d1e1c3fb2472ba452467502b71abae624960a1ebe91849a9384ad9e674438779246c44c76267887982e656eec9a59662d06888d7b6c0994eb4c05beffb1ed0f302c542c643530c63ceefb19dcc18b1863334757433004609cb69f191786beb1065c06fed51fe5e98453957e57a93366cbcbbec425a06a96f2091cbb25c8425518bb04bc0f007273b0ae90467f048f911bc38ca12bde9f2326b4cac23b92e6dd14c3550cd98a3900f2262b2e453735e5d7baa120d9c1b8ae06b4ccc880d67558f43f9f4613c86c6adce48bac6297d2b0d15ce0a3bd35064308cc6f3b276099a830562b9cc9342935fcfd8cf4c243506331ca87cc1910b0f60704f69f751517b38351c2dbc92ae69e82516b0137f1fa0eeb9ce56d8ea7f3b4cccf1567a938a6c101911add5cdb4ffb91b208969d13d9eff6ab92b7337891efd046e6fe3042b293e5092592d7dae8390b5909410db7716f4a1388e9d02b36389b9d1ee0a97719540d5afcf564f6d8c7bfedf9ace27263ff0491f0cbdf532ce401ee1b840d96d1b48e83932c771238774f5ce493e5a8cb40717e4020afc6d7dc8614c19350bbde6188f0d8f181f4a85710e24389302c093fd3a267a61ddd278e381251ff0cd2ba9eb4551d93604b425f0ee1381761d4b1ba31e0334df9324581a873d35ab6aa41c98a19062d12e564b1f913754357c31581fae9b9ce44abd959500e478e88a055710a5842d91c3f1b8ac1518c89742d6692407a8d01f3de8bd7c55b2e7e4f0adae819f53a82d1aaa8722fb319b24525708a0f4caf0c3d487f20ede7e4a8c660cf6f72133949dad0df5ae36a37971640c61ebb434696cbd30fa42ebc415b55bffbce7d56533b20fbdf988f009fd60b546d4dea1779ab96f9916c5c5d7c50e12afa0645d8de76f257dac502674d082e670cfecb17110e8870b713c3550bd445c2b7fb7cd5aaa465e09d14bb813eae54dbc441a4d0481c218665451db00b6b0ffeed0f9bda914cc603c6bbd1cd80b9a83039865a73193343cae244682bac5defb439ca75369c324e6ba6062038ba426f464b5d9d06ba320ba2189b66b3e5b0d64e902a455ff683488dbccb7f7b2c9cc5be963d2bbb791caad4ed124f9e1a0d6ff9866ad1dfb0a0ca603968cc4107911621bbac34fa98f7c7e7eda14e9efe4112decda0d03ad97830568e6c1e6aecb6fc16d4012a09df526a8bc6d66fd9f9bcac3df459708e2f1fb1a271920589bd795d5fced76b62b3d1e324b09c67a478490eb2256edf04f4c686d6f5232e54f40974cb0ae0a1e88011ef8447ab0bf9557d5ad10af207f0a9e8e970b9b27ccc96098bc731f20ef5cf7adfac2928a1ca61d8157e2fd19c91d5bd130a5e1523075ceded73edf1a18c96709ff2e7c899fd519e4089f4c809fdaf80557c4221914cbf8206aaf4bb38b5674c0926383c2af1dc0afe3da7c45e65f84c36a409397dba3d15dcdf8e63ccbd061460701be4edd17a296f705d5a92494ed967fd33ec0377a58be211b3b84b052db9e31fe1e1ec9fabbe3b57eb35b54b27bbed2c99e6b4b3d246042850c89a89f92e1419afde6a65f965574187ee596cd2fb9176169837ec637dea12d034c3fd8022ee4d8a36ed24080c842837e8cca5f5958c8b96e05f7156bd6e7f3c34ab7e01221ef607d31b130dba7a342a8d03eb325ae2beef2b1543807bce20ffc6354e8765cbe914d86ebe27fbc98795af586230f076af44a82941906d3c72bc19f9064d6ca6a466ba629f684e18d78a23ca800388d86ab7fa3fe6f570054d78bfdf2b0c28010c9015769d110554be966190e359dd2ca63af3bd599030e6c28f4c94a68219c29bf916e979154d04c9ef1a4e6e09cc18373beda26e8b2269a8f6b7ddab8c92a44a319c07bfd585302bdc28fed7476c159916121a96d20af476b5783c7f7d235df5c8009a9a74b8949452a628811d41bbd0d52f5986f2bf23fd8eb399c2898dd07e98562651e9c367607da21484ae4a8317b64687f4b52e2e3fd47cd3659dbd7d7a2ce57f4dc2698c3c200c6f84f631789d52164df7c9f9d14e454486d33d9ce6b9954f051ef03cb9b27a6044645e49184d7b1a622c37754b886ef1120c342415274bac4ca19aaf2f51e19b1eeddcc433abd7951f66a8dd0913b82c1c5a91e31d1015c3e395644051103f70a08913e598bacf1ce21ca6acdc86b0a567505e397955ceecce2f21a5bf16a41bee6a63a51420a11c1e3666f2c0e2bb80a6e4ee99cf000fc5db040cdbac5e6100b57d3bd20ef66bc2d8c741ec3034e714de562350925dc53103f6a1d048ac3b13ee24bba3d7572f45bad7a0419813082f632ea57dc1c7b5b2f0d3b0523f815810fce8abe17b045a9bddcbdddbe51b28b8b7423e816a74f992e623a2f086196599c7fb117aea1750e1a95193c691dd04ba9668a31a5b286bbc7c476d214b693caeb169decf030d41cd2b788cea4f89f73e6dc4873c969274684e7a28bb9d83713b9707a1c0bfbc179b1d935f091e5b868d19200febca3b7ef2a81d2113112390cc174eb58491fc4b2b177401227140d674cf37eeefdebd932dcb0a18603462360907a840c4d8bdfdf83e6e9c6e287b309d122bc71a598adb13bb76747fca4b167600aa7dc6f476fa3fbcd0841229250e403bc1953ceeaf0be26ff9cc969ac6a677f838234ff6dd51829a94378892c7f8dfca704e8e4fc06e18cec024b51b873d568d6cfabdb4fdb568218bf619fb264925cc797b402bbc90624bb3511df7b144179ffeae542a70871439b82ea7674b91a219352e7f70a217fb7c1e1a386ae4833d4ba3aa6eeb2047c5437ef6911eca1cd6613af7af3d9b53781f154bf44acd3c0bc30c1f0a544ce8fc6d039856eb720044a134b52f3aec9196e8e00cdb454e67f6020f5188791c51ccfa6206f2615678279f44dbac3e274b503a17a0cae4eba11ae91d81072d59d8055a028f53f8935348154bcc65fc245a4a99d90dbbb00a064f7afee00ab6212fea7a64538d93827722d0a29d9ae71a4aedc51120d52268a5bec94fb73df7adbbfe0f06a6992d5b6c0dd85661aca5c5ca1fa1cc49e6af36d3d74a2e1562bee0ec8c5f25b2e597c707d44b7bf6c9cdb4c3906c3e57a2685c370e92f85b8a36978f79399d9f8152ded6226db35f40b1efb18b1adb986743a25f7fd6d4e905c6afe7c2c32c6fa24b7303e66bf1116c3690e34898f3c1362276db09bf1d1c62a398373143fce1211f6375e34e019d797f5ddfcf201ff42e60510bc84fb2af9f369bce3ae88ca69eb84a08fe5eb519aca0e4d8de046793525b9df539817e03eea98ff476d8c6f1f044dc2a0edf605a17a9a1c2167f82ce2ce769ceea4fb70c8c1203cf77ede8d22c0746971f6f8adaba363523c8079b7764a1244e8e7186273f9732455251d6439215f8dd64f6b83f85eb9adb87081776db0b635473b6292b4a6aa3bdf87e3e2a7251dfd3f5f301386efd9a04a802d3a58d30be4d188eb942fb40b7e47060f04070c766ac62c038353a294289ef7306243a57f956ce5a8103461e03625c2f42643b3f4c8219f0155328d634c8b682f7d17b2978c9915356aec659ebf914c49f0dbc6c6b9c97833a5d481f43fa82e4950ae8e2537b15e1fc55b7fa067209874eb75b6a01f3150d7e3220414e874a4902c511734b7744920923f4dcf8ba1c4d0af8b21c68646664791d417a0cf8038c14bb3cbd70e7ed1aee7abe5492ae2f1a17d9b99ef7be602f04e64768a39ab857eac4176a6f3ca92ec11353d687f21e3a1e9de8cb295bedd34d326556d2928f6a0291287dc703c67277cf5cdfc3903599877b6f7e5eab69bf828f177eb4ee47c17bf9ea8c582f5ee4e31bfe901d848f0c5651390fa7e11dcb1c442a158ba5b98181c572d96d2565b277663ce7e53088f6199f5185b4073f24cc3da90bd8131418792903721313cc4805881219c2b117dc45ed7932315d051d4a207c8b1d7c65532c316618936a2f9feeb483df9ebd341084266db7b875d8d9314d07a7bb918ce51fb60b0dc981c9e9e673f8d039115a66b8a500848731d345b3655a95c04143100e311b28f772237380ebc0d9b13e3bf07d35daa0335425feb867fa1c3451ce3f0e464a0a9ab00e22cea41cd336ee83450e898c51636d9b6e487dc448af55f675cd60e986c052dd5be72bdbf55b496b465bf2e5f497d5d326dc8f68fe91da1fb857a462d93d48fb20cc0ea12b3e3ccc30a3a7f12113778ed9cf9d4223b3e58c2a83bb026d5e3652a3f24beb5c5addf79fd513eb6bb6c21c2de1fd51c7c36c48a07cf4aab4da27bd584016985cc9d0814242fb7ad3461916dd707475ac1e6ab3eb81d31e377f59dbce504561247f9ddd55a3acf8dcb5063a57d518edd6698e203a44be7e571e86d069dc775b0b1a07c0cf494af5478fe371ef4d1f4a3d98efa4424823de895e188539f489cf368ee515d21dca9d86b59f055dd0c90b04d43412d10b56283e1b494622447051f08e3de91ce669b04c0dbfbd7c54fee56b6a7137860a200cc7d8b7ff94824d5abcf2cba2f17e7f8d51fb36c7567928a5d8fd5ec5700198a056dc84f0c1a18ae3fbacb0f4378201335a87ad680007036744c5e694b704bb02606dcc965fed2363da15d22f9ab86c762bb93c09afd657a2bdeeda47fa30fd91b26f7d4483ed4edd1567f8f5c02bdc62f96043e73fe767855d3b01a20d4c2d77d2f294fe09e96f0493209d770a3cbad2c6189d14f8127a5aecca392f6f2b167665f22ab8a1ce0200c306f28449d99634325e4dabaca78583332e2e1039f85cbd086b4c2b77775f290ceea0cbfa3fb1660fd66325df5a6104ecb2f438320373d320f0e53ee41264a8a9c208449707690de0a3f412776f5c280d921b1308d2f16779cdd799a3f05dcf2e7cb4e7e03", 0x1000, 0x40c50, 0x0, 0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) creat(&(0x7f0000000040)='./file2\x00', 0x0) creat(&(0x7f0000000000)='./file2\x00', 0x0) r2 = socket$inet(0x2, 0x4, 0x2) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file2/file0\x00', 0x40000, 0x85) dup2(r4, 0xffffffffffffffff) ioctl$sock_inet_SIOCSARP(r4, 0x8955, &(0x7f0000000240)={{0x2, 0x4e22, @private=0xa010102}, {0x1, @broadcast}, 0x22, {0x2, 0x4e23, @private=0xa010100}, 'vlan0\x00'}) fchmodat(r0, &(0x7f00000002c0)='./file2\x00', 0x0) preadv(r3, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) syz_io_uring_setup(0x7243, &(0x7f0000000600)={0x0, 0xff69, 0x20, 0x2, 0x24}, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ff6000/0x3000)=nil, &(0x7f0000000500), &(0x7f0000000540)) fstat(0xffffffffffffffff, &(0x7f0000000300)) write$binfmt_elf64(r3, &(0x7f0000000800)={{0x7f, 0x45, 0x4c, 0x46, 0x1f, 0x9, 0x0, 0x9, 0xfa3, 0x2, 0x3e, 0x7, 0x138, 0x40, 0x1d6, 0x6, 0x5, 0x38, 0x2, 0x5, 0x200, 0x3}, [{0x6474e551, 0x2, 0x4, 0x7fff, 0x5, 0x8, 0x2, 0xfffffffffffffffd}], "f649e68472e17f29aaa15a830e12cced6525ee22bc081a80ca3d62ada0e110945702df5237827f4e1a33b0573e1a4031abfd30cff773a9e712a52cf65f2e470c301d28899278dfecab5e2894ac47344ef0fb08a17ebeac7774733c8e1cc4c9d32857c6a7d84feffd5a44948733f36310703f6767cfb5f2a839b2903251e6134b9bfd2700bbe95db70f2368b1061d3f088a15ff42369eb1761171cec500d93c2c4190165d62c0f271977061abe4d93cee7aa935133a5cfcdd476eae9d201839b21573e4f1b18ddb3013b41afff7d2660edc87622ee9cbc34e5fda865ecd34ee42f2a5fd8b173653be28733827", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x864) openat(r3, &(0x7f0000000080)='./file2/file0\x00', 0x400, 0x180) fcntl$setlease(r2, 0x400, 0x2) 19:14:45 executing program 5: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0xffffff00) r1 = syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000500)={r4, 0x80000001, 0x9, 0x3}) syz_io_uring_setup(0x46f7, &(0x7f0000000180)={0x0, 0xed81, 0x1, 0xa, 0x14b, 0x0, r5}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000280)) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r4, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0, 0x40000203}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r6, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) r7 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) dup2(r7, r4) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) r8 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0xe11, 0x3, 0xff, 0x7}]}) ioctl$AUTOFS_IOC_EXPIRE(r8, 0x810c9365, &(0x7f0000000300)={{0x8, 0x15}, 0x100, './file0\x00'}) 19:14:45 executing program 0: ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x94, 0x1, 0xf6, 0x0, 0x0, 0x8001, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x89040, 0x3, 0x0, 0x9, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002c80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000018800)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000015d40)=ANY=[@ANYBLOB="20001a00000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x20}}], 0x2, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000001880)=ANY=[@ANYBLOB="a0000000000007280001800c00028005000100840000000c00028005000100880000000c000280050001002f00000008000440000000090c0001800600034000000000000003ff0c0002800500010021000000060013400003000006000340000200000c00028005000100010000000600034000010000140001800800010000000000080002000a01010208000440fffffffd5cf03c6fba1e96bac815b838796a78636b26bde7b1b4ba1842ed1ce6"], 0xa0}, 0x1, 0x0, 0x0, 0x8810}, 0x0) r1 = getpid() epoll_create(0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x3ff, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x100, 0x2}, 0xe) sendmsg$NL80211_CMD_PROBE_CLIENT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x5c, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0x4208, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f6600006530202ab02020205ed92d2b2426282b2d5d205c202b23402b219b2e7d2d203a202f6465762f6c6f6f702d636f6e74726f6c00202662200a049a69a2c25fc047d986535a476e28d697f6a490d03c29af6c2e04a0c8ed8b1fff9cfe88dd19236b37e38df7a8563de9e593a88d3a16f8bba32c3f900557f22320d46d9fae7fd67af6dae69de139fc65ce21"], 0x94) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x5451, r3) 19:14:45 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa\t\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:14:45 executing program 2: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:14:45 executing program 3: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:14:45 executing program 1: r0 = memfd_create(&(0x7f0000000000)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\x01\x86\xb0\x1d`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0f', 0x3) fcntl$setstatus(r0, 0x4, 0x40000) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r0, 0x0) 19:14:45 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8d#\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:14:46 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x50102}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002740), 0xffffffffffffffff) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000002840)={0x0, 0x0, "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", "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"}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) r3 = fcntl$dupfd(r2, 0x203, r0) sendmsg$ETHTOOL_MSG_EEE_SET(r3, &(0x7f0000002800)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000940)=ANY=[@ANYBLOB="18000001", @ANYRES16=r1, @ANYBLOB="010000000000000000001100000004000180"], 0x18}}, 0x0) r4 = gettid() process_vm_readv(r4, &(0x7f0000001a40)=[{&(0x7f00000018c0)=""/31, 0x1f}, {&(0x7f0000001b40)=""/124, 0x7c}, {&(0x7f0000001980)=""/161, 0xa1}], 0x3, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/101, 0x65}, {&(0x7f0000002240)=""/183, 0xb7}, {&(0x7f0000001bc0)=""/122, 0x7a}, {&(0x7f0000001c40)=""/163, 0xa3}, {&(0x7f0000000180)=""/231, 0xe7}, {&(0x7f0000001e00)}, {&(0x7f0000001e40)=""/9, 0x9}, {&(0x7f0000001b00)=""/46, 0x2e}], 0x8, 0x0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) connect$bt_l2cap(r5, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x3}, 0xe) sendmmsg(r5, &(0x7f0000001040), 0x3fffffffffffdca, 0x40) 19:14:46 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x20, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') dup3(r1, r0, 0x0) syz_io_uring_setup(0x5606, &(0x7f0000000040)={0x0, 0xef33, 0x0, 0x3, 0x256, 0x0, r1}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f00000000c0), &(0x7f0000000100)) openat(r1, &(0x7f0000000000)='./file1/file0\x00', 0x141e40, 0x182) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@version_9p2000}, {@access_any}]}}) 19:14:46 executing program 0: ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x94, 0x1, 0xf6, 0x0, 0x0, 0x8001, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x89040, 0x3, 0x0, 0x9, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002c80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000018800)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000015d40)=ANY=[@ANYBLOB="20001a00000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x20}}], 0x2, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000001880)=ANY=[@ANYBLOB="a0000000000007280001800c00028005000100840000000c00028005000100880000000c000280050001002f00000008000440000000090c0001800600034000000000000003ff0c0002800500010021000000060013400003000006000340000200000c00028005000100010000000600034000010000140001800800010000000000080002000a01010208000440fffffffd5cf03c6fba1e96bac815b838796a78636b26bde7b1b4ba1842ed1ce6"], 0xa0}, 0x1, 0x0, 0x0, 0x8810}, 0x0) r1 = getpid() epoll_create(0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x3ff, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x100, 0x2}, 0xe) sendmsg$NL80211_CMD_PROBE_CLIENT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x5c, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0x4208, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f6600006530202ab02020205ed92d2b2426282b2d5d205c202b23402b219b2e7d2d203a202f6465762f6c6f6f702d636f6e74726f6c00202662200a049a69a2c25fc047d986535a476e28d697f6a490d03c29af6c2e04a0c8ed8b1fff9cfe88dd19236b37e38df7a8563de9e593a88d3a16f8bba32c3f900557f22320d46d9fae7fd67af6dae69de139fc65ce21"], 0x94) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x5452, r3) 19:14:46 executing program 2: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:14:46 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8d%\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:14:46 executing program 3: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:14:46 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000006c0)=ANY=[@ANYBLOB="98000000200039040000000000000000020000000dc0c23671f1a964651e4d52c3dc9432e6af519d60c901a7ea83dce8f6a9c36adbbf7c23348ed795341924f0f2e2f1324bf1187b4e1f5a7bf5116e03f38056144e4fd6711849a6579e46004fbfb9ae80572129d57aa41a4c792b56978ebd2e72f57ca14145d7bcd879afed4e97abd691d56cf2d815f272170c0011000000000000000000bb3e3c7562af040074b82fd57e7bd51e163e9c2394948632056b9357f234b64631cba45755c1eac5decd06ec9e3c7aa8b1cbc03bd674263161cff69945516e14595dfad881c35329f6a456932cd0cf306b4f29f5ac8dddb92ee4fe33f6e190dffd186aa055b9a9547a834f1d619073f3ccf4b3acda5d78a8cff254a2de72f20938d689ca4044e9b0a3ee3627818c70cc78d1fe11e55c898d61e09dd9cc4bdefd952f33df697d06ffd93de78dd16ff6fabb99fb6b42eb449d317ff0f62c982878d984496c08a7a672102affbb245b18bb390e66298d7220110693dd4d00d4a7b9a75298857b75fa243b23005fcbe455062951cd61eb7fd89947c9213bca5dc0b89a2e850f5d485e58954a516c41604d7981f0c5d28db9d69e0604b270a1c8a29ab4b046f86a311abcd1aedb3726442528292ebb13fb2e320499e3d0ed0f624e2d941077db1120084174ca637e1c74bddecf39ecb482a0e075210ffa8e8a3f5cdf7889058aba3413d408c81d4c789c0bc1ded7e543a37a0ac8edaf7fbf979e986c22e25e82884240d5dc6aaab10fe2ee4df09527c6d9c18ef983eb5ffb44cdf9e7f785eb60881ee6632f2783fc485616db255f9b8730aff47c8629f4bf50f73351c37855a123b510423a8f678a1ba6e9020d8c877b44f968a6643b64f6c6af3a820003f1bd38df826a2c51e61d15b0a22b6b57ac58f8ab5ee9f9c474ee0608879938a705519a8aa2d7821a0a475c262ecf656bec9f2b276d6bf219f5ba3de06900ecbcc4625559d8facfbd086fbcb0d9e81a4935358874000000000000000000"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xf0e7}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd=r1, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3a, 0xe, 0x1}, 0x1009) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_WRITE_FIXED={0x5, 0x2, 0x6000, @fd=r2, 0x7, 0x6, 0x3, 0xb, 0x1}, 0x9) r5 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, 0x0, 0x0, 0x0, r5) add_key$keyring(&(0x7f0000000240), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, r4) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) syz_open_procfs(0xffffffffffffffff, 0x0) r6 = add_key(&(0x7f0000000280)='id_resolver\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="fa", 0x1, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r6) unshare(0x48020200) 19:14:46 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff0000366175a204000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x800448d2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) syncfs(0xffffffffffffffff) sendmsg$NL80211_CMD_NEW_STATION(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800bbfcb0e5e540af2dc8483dddd3c7c81c611d8e3a4383e1c354d24dd36cefebcdd746dd4285f776578442d4da944a99e9c4451a356f2e259f00c420b2ed9372209d6190060000c80d00000000000075bffb891391f7217766200a4bd7e5050000000000000065e40000000001000000000000e8d5e2a0c9a6be72aca80000000000", @ANYBLOB="c35c99f79daaccf6845b6815fb189097a2574b9852937a35589d566423a14d9045a12a985e79487bb33f0568c427942a12561433075b4d6ab7f0f6ecef13fa5e2901f37e0193032e66b8ba0d356f141f090d5f579f7c055a6378ef159617e5d39ad97a9954fc1aeb86130edc93f7fddc0495b7631318f26fe5f4dec2a5e23fa5d307e192285b11773682822d12d75db1d51f65b69cc2a589fe56d942e594e02d1eb13cf78b8142360e", @ANYBLOB="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"], 0x48}, 0x1, 0x0, 0x0, 0x48854}, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f00000000c0)=""/188, &(0x7f0000000300)=0xbc) ioctl$TUNSETLINK(r0, 0x400454cd, 0x308) r1 = socket$inet(0x2, 0xa, 0x0) sendmsg$NL80211_CMD_JOIN_IBSS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000480)={&(0x7f00000002c0)=ANY=[@ANYBLOB="cb3000"/14, @ANYRES16=0x0, @ANYBLOB="000128bd7000fedbdf252b00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900f9ffffff0600000008000c0064000000"], 0x30}, 0x1, 0x0, 0x0, 0x1}, 0x8000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x100000001}, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) getsockopt(r1, 0x1, 0xff, &(0x7f0000000080)=""/45, &(0x7f0000000240)=0x2d) ioctl$SIOCGIFHWADDR(r0, 0x8927, &(0x7f0000000040)={'dummy0\x00'}) [ 2883.794610] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2883.860506] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.5'. 19:15:01 executing program 4: r0 = creat(&(0x7f00000000c0)='./file2\x00', 0x0) fcntl$setlease(r0, 0x400, 0x1) fcntl$setown(r0, 0x8, 0xffffffffffffffff) creat(&(0x7f0000000040)='./file0\x00', 0x114) r1 = syz_open_dev$vcsn(&(0x7f0000000080), 0x8, 0x40001) setsockopt$bt_hci_HCI_TIME_STAMP(r1, 0x0, 0x3, &(0x7f0000000100)=0xe29, 0x4) creat(&(0x7f0000000000)='./file2\x00', 0x0) 19:15:01 executing program 2: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040), 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:15:01 executing program 7: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) mlock2(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') 19:15:01 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8d*\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:15:01 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) r1 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(r1, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r2 = socket$nl_sock_diag(0x10, 0x3, 0x4) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000001980)=ANY=[@ANYBLOB="1f30139aa5d324003f4dd46352a86a5c571a0eb7bcd44249af87356555dac6abb68c2083e855e902d996660f6f9e1a", @ANYRES32=r2, @ANYBLOB="f0000000000000002e2f66696c65302f2e2e2f66696c653000"]) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000080)=0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x80, 0x81, 0x1, 0x2, 0x5, 0x0, 0x8, 0x800, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd77, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x100, 0x6, 0xfffffc01, 0x8, 0x101, 0xfff, 0xfc01, 0x0, 0x7fffffff, 0x0, 0x8}, r3, 0x8, r1, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') fallocate(r0, 0x69, 0x5, 0x10000) getdents(0xffffffffffffffff, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg$unix(r4, &(0x7f0000000480)={&(0x7f00000014c0)=@abs, 0x6e, &(0x7f0000001880)=[{&(0x7f0000000240)=""/27, 0x1b}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001640)=""/200, 0xc8}, {&(0x7f0000001740)=""/91, 0x5b}, {&(0x7f00000017c0)=""/132, 0x84}, {&(0x7f0000000340)}], 0x6, &(0x7f0000001900)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x50}, 0x40000100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000340)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) openat(r6, &(0x7f0000001540)='./file0/../file0\x00', 0x109a00, 0xd2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r4) unshare(0x48020200) openat(r1, &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x12) 19:15:01 executing program 0: ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x94, 0x1, 0xf6, 0x0, 0x0, 0x8001, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x89040, 0x3, 0x0, 0x9, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002c80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000018800)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000015d40)=ANY=[@ANYBLOB="20001a00000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x20}}], 0x2, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000001880)=ANY=[@ANYBLOB="a0000000000007280001800c00028005000100840000000c00028005000100880000000c000280050001002f00000008000440000000090c0001800600034000000000000003ff0c0002800500010021000000060013400003000006000340000200000c00028005000100010000000600034000010000140001800800010000000000080002000a01010208000440fffffffd5cf03c6fba1e96bac815b838796a78636b26bde7b1b4ba1842ed1ce6"], 0xa0}, 0x1, 0x0, 0x0, 0x8810}, 0x0) r1 = getpid() epoll_create(0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x3ff, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x100, 0x2}, 0xe) sendmsg$NL80211_CMD_PROBE_CLIENT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x5c, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0x4208, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f6600006530202ab02020205ed92d2b2426282b2d5d205c202b23402b219b2e7d2d203a202f6465762f6c6f6f702d636f6e74726f6c00202662200a049a69a2c25fc047d986535a476e28d697f6a490d03c29af6c2e04a0c8ed8b1fff9cfe88dd19236b37e38df7a8563de9e593a88d3a16f8bba32c3f900557f22320d46d9fae7fd67af6dae69de139fc65ce21"], 0x94) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x5460, r3) 19:15:01 executing program 3: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:15:01 executing program 1: perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x149e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x2, 0x0, 0xffffffffffffff9c, 0x0, &(0x7f0000000040)='./file0/file0\x00', 0x101, 0x0, 0x23456}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r3 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_setup(0x4601, &(0x7f0000000080)={0x0, 0x5ef3, 0x10, 0x2, 0x21a, 0x0, r0}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) r5 = syz_io_uring_setup(0x4d4f, &(0x7f0000000240), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r6, r7, &(0x7f0000000080)=@IORING_OP_ASYNC_CANCEL, 0x0) syz_io_uring_submit(r6, r7, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000000, 0x13, r5, 0x0) r8 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r5, 0x0) r9 = socket$nl_audit(0x10, 0x3, 0x9) tee(0xffffffffffffffff, r9, 0x3, 0x2) syz_io_uring_submit(r8, r7, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) r10 = syz_io_uring_setup(0x3ca0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000280)=0x0) r13 = io_uring_register$IORING_REGISTER_PERSONALITY(r10, 0x9, 0x0, 0x0) syz_io_uring_submit(r11, r12, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x0, 0x0, @fd_index, 0x8, 0x0, 0x0, 0x0, 0x0, {0x0, r13}}, 0x10000) syz_io_uring_submit(r4, r7, &(0x7f0000000280)=@IORING_OP_POLL_REMOVE={0x7, 0x5, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc5f58044d4b01c7d, {0x0, r13}}, 0x2) syz_io_uring_submit(r3, r2, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80000001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:15:01 executing program 7: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) mlock2(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') 19:15:01 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8d+\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000040)=0x3f, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, r0, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:15:01 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000300), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x28}}, 0x0) 19:15:01 executing program 2: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "d74e20697c434b3024531016f28d26c4399884b2a194ecaf8d35173ec80b9747824788d1a355f2ae564de1073ae98ccbdbe7b34bcb10ba8201f76a425c71bf4c", 0x1f}, 0x48, 0xfffffffffffffffc) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fnv\xb7k\xf2\xe4\x80\x9aJ\xe7\xdbs1Y\xbc\x19[\xec)\x02\x8e\xd3\x80\x9ai\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX*S\xb6\xc7\x97\x83\x9eQq\xc7p\xb3)\xaf\xbd\x11\xb4\x9f\xc6\xf1J\xe9\xbdGy\xbf\xb1<\x01\xf7k\xb1g\xbfb\x88\xebM\xa9\x83 4,Q4\x8d.\xe9\x8cF\x14o\x14\xe1\xa5\x94\x05\x7fw.\x98\xf2a\xa3\xfej\xa7G\xa9~g\xcb\x8e\xa8\x14+`]\xa5-ot\xc09\xc4\'\xefvd\x81\x18y7\xa1\xc7$RR\x86V\xfc', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040), 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:15:01 executing program 0: ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x94, 0x1, 0xf6, 0x0, 0x0, 0x8001, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x89040, 0x3, 0x0, 0x9, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002c80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000018800)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000015d40)=ANY=[@ANYBLOB="20001a00000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x20}}], 0x2, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000001880)=ANY=[@ANYBLOB="a0000000000007280001800c00028005000100840000000c00028005000100880000000c000280050001002f00000008000440000000090c0001800600034000000000000003ff0c0002800500010021000000060013400003000006000340000200000c00028005000100010000000600034000010000140001800800010000000000080002000a01010208000440fffffffd5cf03c6fba1e96bac815b838796a78636b26bde7b1b4ba1842ed1ce6"], 0xa0}, 0x1, 0x0, 0x0, 0x8810}, 0x0) r1 = getpid() epoll_create(0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x3ff, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x100, 0x2}, 0xe) sendmsg$NL80211_CMD_PROBE_CLIENT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x5c, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0x4208, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f6600006530202ab02020205ed92d2b2426282b2d5d205c202b23402b219b2e7d2d203a202f6465762f6c6f6f702d636f6e74726f6c00202662200a049a69a2c25fc047d986535a476e28d697f6a490d03c29af6c2e04a0c8ed8b1fff9cfe88dd19236b37e38df7a8563de9e593a88d3a16f8bba32c3f900557f22320d46d9fae7fd67af6dae69de139fc65ce21"], 0x94) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x40049409, r3) 19:15:01 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), r0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r1, 0x2ff, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0xb}]}, 0x24}}, 0x0) syz_80211_join_ibss(&(0x7f0000000080)='wlan1\x00', 0x0, 0x0, 0x0) [ 2899.441236] ------------[ cut here ]------------ [ 2899.442062] wlan1: Failed check-sdata-in-driver check, flags: 0x4 [ 2899.443090] WARNING: CPU: 1 PID: 19546 at net/mac80211/driver-ops.h:172 drv_bss_info_changed+0x554/0x5f0 [ 2899.444282] Modules linked in: [ 2899.444685] CPU: 1 PID: 19546 Comm: syz-executor.1 Not tainted 5.10.230 #1 [ 2899.445567] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2899.450720] RIP: 0010:drv_bss_info_changed+0x554/0x5f0 [ 2899.451425] Code: 49 8b ac 24 a8 03 00 00 48 85 ed 74 3e e8 d4 a0 8c fd e8 cf a0 8c fd 8b 54 24 04 48 89 ee 48 c7 c7 80 c2 95 84 e8 3c fe 24 00 <0f> 0b e9 c7 fd ff ff 4c 89 ff e8 7d 96 b8 fd e9 97 fb ff ff 4c 89 [ 2899.453732] RSP: 0018:ffff88803d0e75c8 EFLAGS: 00010282 [ 2899.454419] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 2899.459360] RDX: 0000000000040000 RSI: ffffffff8129f023 RDI: ffffed1007a1ceab [ 2899.460252] RBP: ffff8880205a8000 R08: 0000000000000001 R09: ffff88806cf37b0f [ 2899.461121] R10: 0000000000000000 R11: 0000000000000001 R12: ffff8880205a8bc0 [ 2899.462010] R13: 0000000000400000 R14: ffff8880205a9da0 R15: ffff8880205a9d98 [ 2899.483075] FS: 00007fb8d2d3a700(0000) GS:ffff88806cf00000(0000) knlGS:0000000000000000 [ 2899.484085] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2899.484812] CR2: 00007fb8d2d38ff8 CR3: 000000003961c000 CR4: 0000000000350ee0 [ 2899.485698] Call Trace: [ 2899.486026] ? __warn+0xe2/0x1f0 [ 2899.490633] ? drv_bss_info_changed+0x554/0x5f0 [ 2899.491207] ? report_bug+0x1c1/0x210 [ 2899.491702] ? handle_bug+0x41/0x90 [ 2899.492149] ? exc_invalid_op+0x14/0x50 [ 2899.492664] ? asm_exc_invalid_op+0x12/0x20 [ 2899.493203] ? vprintk_func+0x93/0x140 [ 2899.493701] ? drv_bss_info_changed+0x554/0x5f0 [ 2899.494291] ? drv_bss_info_changed+0x554/0x5f0 [ 2899.494910] ieee80211_bss_info_change_notify+0x9a/0xc0 [ 2899.495601] ieee80211_ocb_leave+0x1ed/0x340 [ 2899.496139] ? nl80211_parse_mon_options+0x45c/0x690 [ 2899.496793] __cfg80211_leave_ocb+0x1d6/0x570 [ 2899.497373] cfg80211_leave_ocb+0x4e/0x70 [ 2899.497887] cfg80211_change_iface+0x843/0xf90 [ 2899.498533] nl80211_set_interface+0x67c/0x8f0 [ 2899.499167] ? nl80211_notify_iface+0x180/0x180 [ 2899.499804] ? nl80211_pre_doit+0xa2/0x630 [ 2899.500358] genl_family_rcv_msg_doit+0x22d/0x330 [ 2899.500952] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x280/0x280 [ 2899.501788] ? cap_capable+0x1cd/0x230 [ 2899.502295] ? ns_capable+0xe2/0x110 [ 2899.506884] genl_rcv_msg+0x33c/0x5a0 [ 2899.507377] ? genl_get_cmd+0x480/0x480 [ 2899.507867] ? nl80211_notify_iface+0x180/0x180 [ 2899.508472] ? lock_release+0x680/0x680 [ 2899.508962] ? __lockdep_reset_lock+0x180/0x180 [ 2899.509585] netlink_rcv_skb+0x14b/0x430 [ 2899.510094] ? genl_get_cmd+0x480/0x480 [ 2899.514669] ? netlink_ack+0xab0/0xab0 [ 2899.515155] ? netlink_deliver_tap+0x1c4/0xcc0 [ 2899.515735] ? is_vmalloc_addr+0x7b/0xb0 [ 2899.516236] genl_rcv+0x24/0x40 [ 2899.516654] netlink_unicast+0x549/0x7f0 [ 2899.517155] ? netlink_attachskb+0x870/0x870 [ 2899.517725] netlink_sendmsg+0x90f/0xdf0 [ 2899.518231] ? netlink_unicast+0x7f0/0x7f0 [ 2899.518793] ? netlink_unicast+0x7f0/0x7f0 [ 2899.519357] __sock_sendmsg+0x154/0x190 [ 2899.519849] __sys_sendto+0x21c/0x320 [ 2899.520343] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2899.520914] ? kmem_cache_free+0xa7/0x2d0 [ 2899.521471] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2899.522118] ? call_rcu+0x435/0x9c0 [ 2899.522625] ? trace_hardirqs_on+0x5b/0x180 [ 2899.523165] ? _cond_resched+0x12/0x80 [ 2899.523684] __x64_sys_sendto+0xdd/0x1b0 [ 2899.524183] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2899.524830] do_syscall_64+0x33/0x40 [ 2899.525304] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2899.525933] RIP: 0033:0x7fb8d57778ac [ 2899.526422] Code: fa fa ff ff 44 8b 4c 24 2c 4c 8b 44 24 20 89 c5 44 8b 54 24 28 48 8b 54 24 18 b8 2c 00 00 00 48 8b 74 24 10 8b 7c 24 08 0f 05 <48> 3d 00 f0 ff ff 77 34 89 ef 48 89 44 24 08 e8 20 fb ff ff 48 8b [ 2899.528703] RSP: 002b:00007fb8d2d38f80 EFLAGS: 00000293 ORIG_RAX: 000000000000002c [ 2899.529662] RAX: ffffffffffffffda RBX: 00007fb8d2d390f0 RCX: 00007fb8d57778ac [ 2899.530601] RDX: 0000000000000024 RSI: 00007fb8d2d39140 RDI: 0000000000000004 [ 2899.531505] RBP: 0000000000000000 R08: 00007fb8d2d38fd4 R09: 000000000000000c [ 2899.532399] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 2899.533293] R13: 00007fb8d2d39140 R14: 0000000000000004 R15: 0000000000000000 [ 2899.534184] irq event stamp: 2405 [ 2899.534683] hardirqs last enabled at (2415): [] console_unlock+0x92d/0xb40 [ 2899.535745] hardirqs last disabled at (2424): [] console_unlock+0x839/0xb40 [ 2899.536801] softirqs last enabled at (1818): [] asm_call_irq_on_stack+0x12/0x20 [ 2899.537906] softirqs last disabled at (1767): [] asm_call_irq_on_stack+0x12/0x20 [ 2899.539059] ---[ end trace d5ebf035f6e2ba12 ]--- VM DIAGNOSIS: 19:15:02 Registers: info registers vcpu 0 RAX=0000000000000007 RBX=1ffff1100780bec1 RCX=0000000000000002 RDX=dffffc0000000000 RSI=0000000000000000 RDI=ffffffff84ff9960 RBP=0000000000000000 RSP=ffff88803c05f5a0 R8 =0000000000000000 R9 =0000000000000000 R10=0000000000000246 R11=0000000000000001 R12=ffff88800feab480 R13=0000000000000000 R14=ffffffff84ff9960 R15=0000000000000002 RIP=ffffffff8126e535 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007ffa2af70b58 CR3=00000000537d8000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000dd060a EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=ffffffffffffffffffffffffffffffff XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000 XMM04=000000000000000000000000000000ff XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=0000000000000032 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff822dd241 RDI=ffffffff879f1140 RBP=ffffffff879f1100 RSP=ffff88803d0e6f68 R8 =0000000000000001 R9 =0000000000000003 R10=0000000000000000 R11=0000000000000001 R12=0000000000000032 R13=0000000000000032 R14=ffffffff879f1100 R15=dffffc0000000000 RIP=ffffffff822dd298 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fb8d2d3a700 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0500000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fb8d2d38ff8 CR3=000000003961c000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=ffffffffffffffffffffffffffffffff XMM02=ffffffffffffffffffffffffffffffff XMM03=ffffffffffffffffffffffffffffffff XMM04=ffffffffffffffffffffff0000000000 XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000