1d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) 02:11:50 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x10000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0xb}, 0x1c210, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x4}, 0x0, 0xd, 0xffffffffffffffff, 0x9) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5, r0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 02:11:50 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x0, 0x1, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x8) execveat(r8, &(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000400)='\x00', &(0x7f0000000bc0)='\x00\x80C\x107\xa64\xee\xbd*\xd4o\x8a?[\x98\xf29\xee\xc7\x90\x97\xaa\xc3\xc8Zq\xf3\x91\x04[S\\B2m=V\x89\x99\x96Q\xcaA\x18\xaf\xaf:\xf1\xab\x80\"\x7f\xb3\x18\xfe\xd7\xbd\xcd\xcdIf\xae\xb5\x87\xb8#\xe1\xbe\xec\xf0\t\xa1\xf7\xa7\xb1\x9d\xc7\xc2\xf0\x02\xaf\xc4\xd0@\xc2\x12\'\xb9\x9a\xea\x90e%\xe6\xd2E\x19E/\xc6\x17gB0Qim\x82u\x0fZ\xa9\x14\xf5\xc7X\xa9\x00\xb7\xaf\xcfouN\xbd\xb2\t^\xbe&~\xa7l\xfa\x036\x1c\"\x80\xfc/\x9b\x95\xf1!K\xc5{\xe7\xfdB[\xca\x87\x9bc\x98dg\x1a\xa1\xaa\xb4\x19\x7f\xa7\x90y\x9fq\xf5\x8a\xa9 \xa6\xdd\xf0+gb\xa6g\\\xec\tz\x06\xdf\x1a\x9c\xc9\xf7\xcc\x85\xb4G\xe9\xd3D\xf4\x8c\n\x17\xd5\x00\xf18\xb3T', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000280)='@\x90\x9a\x7fl\x00\x00\x00\x00p\xc4S\x9ch\xceH9\x88\xf3c\xb4\xabz#\xa8\xbb5\xd3\xc8\x9b\x00\x00 \x00\x00\x00\x00\x00', &(0x7f0000000540)='\x00', &(0x7f0000000a00)='\x009\x1c\xaf\x14\xe6\xeb\xe9\xf1\xccO@\xbd\xfc\xbdN\xfa\x93Z\x94\xfd\xc6]\xc3\x81g\x95\'\xb7\xf2\xe8\xbf\xd3\xf3\"\xf0Z\x93T\xa1\xc6\x10\x01\xba\xf0\x11\x01 \x94X\x7fQ\xa6\v\xfa\xc2\\$\xad\x96A\xd6\xdf|\x0e,c\xc4\x13\xfb\x91\xc5|{\xde\'xb\xcd\xb2\x177\x83\'\xdb\xf6y_\x10\x87\x01\xd4\xb1\x9b\xe4\xac\xf0D4\xe6v\x86\x02^bt\xbf!b\xd4k\x11\xf5Nj\x97P\b\xf2\xdd\r\xaa,g\xfc\x8f*\bq\x10wl\xe0\x02HG)\xa0\xb9%\x12\x9fx]\xf8Gz`\xfd\x00l\xe9<\xa5\xbd\x9f\x80\xa5\x0f\xd3\xf7\xc8\x98'], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000440)='\x00', &(0x7f0000000740)='\x10', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) [ 1745.270107] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 02:11:50 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x80000, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) [ 1745.302558] FAULT_INJECTION: forcing a failure. [ 1745.302558] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1745.304454] CPU: 1 PID: 10308 Comm: syz-executor.2 Not tainted 5.10.226 #1 [ 1745.305507] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1745.306786] Call Trace: [ 1745.307203] dump_stack+0x107/0x167 [ 1745.307775] should_fail.cold+0x5/0xa [ 1745.308367] _copy_to_user+0x2e/0x180 [ 1745.308976] simple_read_from_buffer+0xcc/0x160 [ 1745.309695] proc_fail_nth_read+0x198/0x230 [ 1745.310367] ? proc_sessionid_read+0x230/0x230 [ 1745.311074] ? security_file_permission+0xb1/0xe0 [ 1745.311837] ? proc_sessionid_read+0x230/0x230 [ 1745.312536] vfs_read+0x228/0x620 [ 1745.313088] ksys_read+0x12d/0x260 [ 1745.313631] ? vfs_write+0xb10/0xb10 [ 1745.314226] do_syscall_64+0x33/0x40 [ 1745.314803] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1745.315590] RIP: 0033:0x7f906baec69c [ 1745.316169] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1745.318978] RSP: 002b:00007f90690af170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1745.320150] RAX: ffffffffffffffda RBX: 000000000000001c RCX: 00007f906baec69c [ 1745.321238] RDX: 000000000000000f RSI: 00007f90690af1e0 RDI: 0000000000000003 [ 1745.322324] RBP: 00007f90690af1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1745.323422] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1745.324512] R13: 00007ffd392808ef R14: 00007f90690af300 R15: 0000000000022000 02:11:50 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0xf, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:12:04 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000000c0)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020801000470000000f801", 0x17, 0xfffffffe}, {0x0, 0x0, 0x1000a00}], 0x800, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000}) 02:12:04 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x10000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0xb}, 0x1c210, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x4}, 0x0, 0xd, 0xffffffffffffffff, 0x9) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5, r0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 02:12:04 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="3400000010000100cc680000000000000000000005000000000000001532336740e46387f800008064dcdc6ca616ef0dd0179be149f83265ff000ad022cea3b5906ed71efbac71604114ae634a1d3f5b42332fdb1ddff6c996d594f336ad93897a4c7c7d052c951ff3b19a2ae8dfe7daae4433b91e5be24f079e43a9066a68a1d63857237b3704f14d41e4376c1319a3cb91015718c602f3acaab637ceb7852dafdf71f385cfa97aa0b4888bc38b88bda6372e3668ad38b7f74f5579af15595a0c30e5611c48d698f5ab174fbc688112a84b0e6b16587fe1cca80147b9e1c0f1ed5b30c723ba82fe7b97990c195cdd6e5a3ec6986122d762e9182637b26db43c9871a7e08e00a222e27bb9eb35ce4745ffeda794f8f9b433cfaf77a5c151481692b680c9217e78cf5b4a110e4cf58a2481900e9ee69cdf0b73241206255494d36aa01416f7d0d0620f0b8526ca8484f212079b26fe05a315317995f2e147c5246ec242cda7921facafba1cf981b778d7b9333c9f88b53bf8b3a1c472d9869179a5d75ccaa1fa65e00d0b492e89e54f4d9ef4d61d2d7315ac264ed102185b46eef868a43ff0c84a79ac7dedfe21843442cfa03ab8fdf2c4a9967b518d211ddceeca7cce24735f1daf18a359c87c7c89a2011187f1b8d95f288434370c44a92d4dda3151ae0c5bb732e4baa5994bbe49e76eb2277e38c8f867d4a099cb00d9d38ca7bca38999cd3fc3b3ecb356302feed4b34c"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x0, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x8) execveat(r8, &(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000400)='\x00', &(0x7f0000000bc0)='\x00\x80C\x107\xa64\xee\xbd*\xd4o\x8a?[\x98\xf29\xee\xc7\x90\x97\xaa\xc3\xc8Zq\xf3\x91\x04[S\\B2m=V\x89\x99\x96Q\xcaA\x18\xaf\xaf:\xf1\xab\x80\"\x7f\xb3\x18\xfe\xd7\xbd\xcd\xcdIf\xae\xb5\x87\xb8#\xe1\xbe\xec\xf0\t\xa1\xf7\xa7\xb1\x9d\xc7\xc2\xf0\x02\xaf\xc4\xd0@\xc2\x12\'\xb9\x9a\xea\x90e%\xe6\xd2E\x19E/\xc6\x17gB0Qim\x82u\x0fZ\xa9\x14\xf5\xc7X\xa9\x00\xb7\xaf\xcfouN\xbd\xb2\t^\xbe&~\xa7l\xfa\x036\x1c\"\x80\xfc/\x9b\x95\xf1!K\xc5{\xe7\xfdB[\xca\x87\x9bc\x98dg\x1a\xa1\xaa\xb4\x19\x7f\xa7\x90y\x9fq\xf5\x8a\xa9 \xa6\xdd\xf0+gb\xa6g\\\xec\tz\x06\xdf\x1a\x9c\xc9\xf7\xcc\x85\xb4G\xe9\xd3D\xf4\x8c\n\x17\xd5\x00\xf18\xb3T', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000280)='@\x90\x9a\x7fl\x00\x00\x00\x00p\xc4S\x9ch\xceH9\x88\xf3c\xb4\xabz#\xa8\xbb5\xd3\xc8\x9b\x00\x00 \x00\x00\x00\x00\x00', &(0x7f0000000540)='\x00', &(0x7f0000000a00)='\x009\x1c\xaf\x14\xe6\xeb\xe9\xf1\xccO@\xbd\xfc\xbdN\xfa\x93Z\x94\xfd\xc6]\xc3\x81g\x95\'\xb7\xf2\xe8\xbf\xd3\xf3\"\xf0Z\x93T\xa1\xc6\x10\x01\xba\xf0\x11\x01 \x94X\x7fQ\xa6\v\xfa\xc2\\$\xad\x96A\xd6\xdf|\x0e,c\xc4\x13\xfb\x91\xc5|{\xde\'xb\xcd\xb2\x177\x83\'\xdb\xf6y_\x10\x87\x01\xd4\xb1\x9b\xe4\xac\xf0D4\xe6v\x86\x02^bt\xbf!b\xd4k\x11\xf5Nj\x97P\b\xf2\xdd\r\xaa,g\xfc\x8f*\bq\x10wl\xe0\x02HG)\xa0\xb9%\x12\x9fx]\xf8Gz`\xfd\x00l\xe9<\xa5\xbd\x9f\x80\xa5\x0f\xd3\xf7\xc8\x98'], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000440)='\x00', &(0x7f0000000740)='\x10', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) 02:12:04 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x300, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:12:04 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x400300, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:12:04 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 02:12:04 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xb, 0x10, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x10, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x40345410, &(0x7f0000000040)) r3 = dup2(r1, r2) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) sendmsg$SEG6_CMD_SETHMAC(r4, 0x0, 0x0) syz_io_uring_submit(r0, 0x0, &(0x7f0000000080)=@IORING_OP_STATX={0x15, 0x2, 0x0, r3, &(0x7f0000000400), &(0x7f0000000540)='./file0/../file0\x00', 0x7ff, 0x100, 0x1}, 0x8) mount$9p_unix(&(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340), 0x1001000, &(0x7f00000001c0)=ANY=[@ANYBLOB="9c45cb289520a000000000000003ff4477258c59b47e45f5af7c6cc58be2912302a30a941821400c62f07f0d7da90830e4106ca54d64133ef17d282b6c60cfc0d7e9809d843becbf9f45447d1d03292cc66d4f40da3d4f18f164c340d9f2e3cb1be7a1e79c63edf529019b9f5cf71c3556d8d1d0e0bde6f33ed0e759b269705d1d60e77474c68805ca9675f46ecb4ac49f4f25ff22d3d60e44dda2c3b1e4174ae124b65c9404918e15065591b541ae477b3d69b3e2c5f7dd7905fae3e023"]) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'rose0\x00'}) mount$bind(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180), 0x20, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r6, 0x10e, 0x0, 0x0, &(0x7f0000000380)) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r5) sendmsg$NL80211_CMD_SET_REG(r6, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r7, 0x1, 0x70bd27, 0x25dfdbfc, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000010}, 0x2004c040) sendmsg$NL80211_CMD_SET_WIPHY(r3, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0x2c, r7, 0x10, 0x70bd26, 0x25dfdbfb, {}, [@NL80211_ATTR_WIPHY_DYN_ACK={0x4}, @NL80211_ATTR_WIPHY_NAME={0x14, 0x2, 'ipvlan1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x0) 02:12:04 executing program 5: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) [ 1758.956078] FAT-fs (loop1): Unrecognized mount option "À" or missing value [ 1758.957065] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 02:12:04 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x500, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:12:04 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x1000000, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:12:04 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) [ 1759.079932] FAT-fs (loop1): Unrecognized mount option "À" or missing value 02:12:04 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x10000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0xb}, 0x1c210, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x4}, 0x0, 0xd, 0xffffffffffffffff, 0x9) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5, r0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 02:12:04 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = epoll_create(0x3ff) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000200)={0x20000001}) dup3(r0, r2, 0x0) [ 1759.124114] EXT4-fs (sda): re-mounted. Opts: (null) [ 1759.152456] EXT4-fs (sda): re-mounted. Opts: (null) 02:12:04 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x600, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) [ 1759.228417] audit: type=1400 audit(1729131124.382:54): avc: denied { block_suspend } for pid=10363 comm="syz-executor.1" capability=36 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 02:12:04 executing program 5: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) 02:12:04 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x1ff) write(r0, &(0x7f0000000080)="01010101", 0x4) read(r0, &(0x7f00000000c0)=""/4, 0x4) close(r0) poll(&(0x7f0000000100)=[{r0, 0x20}, {}], 0x2, 0x1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r1, 0x4, 0x664, 0x8001000000000000) 02:12:04 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x0, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x8) execveat(r8, &(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000400)='\x00', &(0x7f0000000bc0)='\x00\x80C\x107\xa64\xee\xbd*\xd4o\x8a?[\x98\xf29\xee\xc7\x90\x97\xaa\xc3\xc8Zq\xf3\x91\x04[S\\B2m=V\x89\x99\x96Q\xcaA\x18\xaf\xaf:\xf1\xab\x80\"\x7f\xb3\x18\xfe\xd7\xbd\xcd\xcdIf\xae\xb5\x87\xb8#\xe1\xbe\xec\xf0\t\xa1\xf7\xa7\xb1\x9d\xc7\xc2\xf0\x02\xaf\xc4\xd0@\xc2\x12\'\xb9\x9a\xea\x90e%\xe6\xd2E\x19E/\xc6\x17gB0Qim\x82u\x0fZ\xa9\x14\xf5\xc7X\xa9\x00\xb7\xaf\xcfouN\xbd\xb2\t^\xbe&~\xa7l\xfa\x036\x1c\"\x80\xfc/\x9b\x95\xf1!K\xc5{\xe7\xfdB[\xca\x87\x9bc\x98dg\x1a\xa1\xaa\xb4\x19\x7f\xa7\x90y\x9fq\xf5\x8a\xa9 \xa6\xdd\xf0+gb\xa6g\\\xec\tz\x06\xdf\x1a\x9c\xc9\xf7\xcc\x85\xb4G\xe9\xd3D\xf4\x8c\n\x17\xd5\x00\xf18\xb3T', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000280)='@\x90\x9a\x7fl\x00\x00\x00\x00p\xc4S\x9ch\xceH9\x88\xf3c\xb4\xabz#\xa8\xbb5\xd3\xc8\x9b\x00\x00 \x00\x00\x00\x00\x00', &(0x7f0000000540)='\x00', &(0x7f0000000a00)='\x009\x1c\xaf\x14\xe6\xeb\xe9\xf1\xccO@\xbd\xfc\xbdN\xfa\x93Z\x94\xfd\xc6]\xc3\x81g\x95\'\xb7\xf2\xe8\xbf\xd3\xf3\"\xf0Z\x93T\xa1\xc6\x10\x01\xba\xf0\x11\x01 \x94X\x7fQ\xa6\v\xfa\xc2\\$\xad\x96A\xd6\xdf|\x0e,c\xc4\x13\xfb\x91\xc5|{\xde\'xb\xcd\xb2\x177\x83\'\xdb\xf6y_\x10\x87\x01\xd4\xb1\x9b\xe4\xac\xf0D4\xe6v\x86\x02^bt\xbf!b\xd4k\x11\xf5Nj\x97P\b\xf2\xdd\r\xaa,g\xfc\x8f*\bq\x10wl\xe0\x02HG)\xa0\xb9%\x12\x9fx]\xf8Gz`\xfd\x00l\xe9<\xa5\xbd\x9f\x80\xa5\x0f\xd3\xf7\xc8\x98'], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000440)='\x00', &(0x7f0000000740)='\x10', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) [ 1759.321074] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 02:12:04 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x2000000, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:12:04 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x2, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 02:12:17 executing program 5: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) 02:12:17 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x700, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:12:17 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x3, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 02:12:17 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000100)={0x6, 0x8001, 0x1, 0x32b9}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0xddfe, 0x40b, 0x7, 0x80, 0x100000001}) flistxattr(r1, &(0x7f0000000140)=""/15, 0xf) syz_open_dev$evdev(&(0x7f0000000440), 0x1, 0x8000) keyctl$search(0xa, 0x0, &(0x7f00000002c0)='rxrpc\x00', &(0x7f0000000300)={'syz', 0x2}, r3) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r4 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) mmap$IORING_OFF_SQES(&(0x7f0000fb2000/0x2000)=nil, 0x2000, 0x0, 0x50, 0xffffffffffffffff, 0x10000000) keyctl$restrict_keyring(0x1d, r4, 0x0, 0x0) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, &(0x7f0000000280)) r5 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, r5) 02:12:17 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, 0x0, &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x10000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0xb}, 0x1c210, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x4}, 0x0, 0xd, 0xffffffffffffffff, 0x9) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5, r0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 02:12:17 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) socket$inet6_udplite(0xa, 0x2, 0x88) io_setup(0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) io_setup(0x7f, &(0x7f0000000080)=0x0) io_getevents(r0, 0x10000, 0x8, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000140)={0x0, 0x989680}) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffb000/0x3000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240), 0x0, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xc, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 02:12:17 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="3400000010000100cc680000000000000000000005000000000000001532336740e46387f800008064dcdc6ca616ef0dd0179be149f83265ff000ad022cea3b5906ed71efbac71604114ae634a1d3f5b42332fdb1ddff6c996d594f336ad93897a4c7c7d052c951ff3b19a2ae8dfe7daae4433b91e5be24f079e43a9066a68a1d63857237b3704f14d41e4376c1319a3cb91015718c602f3acaab637ceb7852dafdf71f385cfa97aa0b4888bc38b88bda6372e3668ad38b7f74f5579af15595a0c30e5611c48d698f5ab174fbc688112a84b0e6b16587fe1cca80147b9e1c0f1ed5b30c723ba82fe7b97990c195cdd6e5a3ec6986122d762e9182637b26db43c9871a7e08e00a222e27bb9eb35ce4745ffeda794f8f9b433cfaf77a5c151481692b680c9217e78cf5b4a110e4cf58a2481900e9ee69cdf0b73241206255494d36aa01416f7d0d0620f0b8526ca8484f212079b26fe05a315317995f2e147c5246ec242cda7921facafba1cf981b778d7b9333c9f88b53bf8b3a1c472d9869179a5d75ccaa1fa65e00d0b492e89e54f4d9ef4d61d2d7315ac264ed102185b46eef868a43ff0c84a79ac7dedfe21843442cfa03ab8fdf2c4a9967b518d211ddceeca7cce24735f1daf18a359c87c7c89a2011187f1b8d95f288434370c44a92d4dda3151ae0c5bb732e4baa5994bbe49e76eb2277e38c8f867d4a099cb00d9d38ca7bca38999cd3fc3b3ecb356302feed4b34c"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x0, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x8) execveat(r8, &(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000400)='\x00', &(0x7f0000000bc0)='\x00\x80C\x107\xa64\xee\xbd*\xd4o\x8a?[\x98\xf29\xee\xc7\x90\x97\xaa\xc3\xc8Zq\xf3\x91\x04[S\\B2m=V\x89\x99\x96Q\xcaA\x18\xaf\xaf:\xf1\xab\x80\"\x7f\xb3\x18\xfe\xd7\xbd\xcd\xcdIf\xae\xb5\x87\xb8#\xe1\xbe\xec\xf0\t\xa1\xf7\xa7\xb1\x9d\xc7\xc2\xf0\x02\xaf\xc4\xd0@\xc2\x12\'\xb9\x9a\xea\x90e%\xe6\xd2E\x19E/\xc6\x17gB0Qim\x82u\x0fZ\xa9\x14\xf5\xc7X\xa9\x00\xb7\xaf\xcfouN\xbd\xb2\t^\xbe&~\xa7l\xfa\x036\x1c\"\x80\xfc/\x9b\x95\xf1!K\xc5{\xe7\xfdB[\xca\x87\x9bc\x98dg\x1a\xa1\xaa\xb4\x19\x7f\xa7\x90y\x9fq\xf5\x8a\xa9 \xa6\xdd\xf0+gb\xa6g\\\xec\tz\x06\xdf\x1a\x9c\xc9\xf7\xcc\x85\xb4G\xe9\xd3D\xf4\x8c\n\x17\xd5\x00\xf18\xb3T', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000280)='@\x90\x9a\x7fl\x00\x00\x00\x00p\xc4S\x9ch\xceH9\x88\xf3c\xb4\xabz#\xa8\xbb5\xd3\xc8\x9b\x00\x00 \x00\x00\x00\x00\x00', &(0x7f0000000540)='\x00', &(0x7f0000000a00)='\x009\x1c\xaf\x14\xe6\xeb\xe9\xf1\xccO@\xbd\xfc\xbdN\xfa\x93Z\x94\xfd\xc6]\xc3\x81g\x95\'\xb7\xf2\xe8\xbf\xd3\xf3\"\xf0Z\x93T\xa1\xc6\x10\x01\xba\xf0\x11\x01 \x94X\x7fQ\xa6\v\xfa\xc2\\$\xad\x96A\xd6\xdf|\x0e,c\xc4\x13\xfb\x91\xc5|{\xde\'xb\xcd\xb2\x177\x83\'\xdb\xf6y_\x10\x87\x01\xd4\xb1\x9b\xe4\xac\xf0D4\xe6v\x86\x02^bt\xbf!b\xd4k\x11\xf5Nj\x97P\b\xf2\xdd\r\xaa,g\xfc\x8f*\bq\x10wl\xe0\x02HG)\xa0\xb9%\x12\x9fx]\xf8Gz`\xfd\x00l\xe9<\xa5\xbd\x9f\x80\xa5\x0f\xd3\xf7\xc8\x98'], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000440)='\x00', &(0x7f0000000740)='\x10', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) 02:12:17 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x3000000, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) [ 1772.780330] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 02:12:17 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x4000000, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:12:17 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x4, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) [ 1772.833686] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem 02:12:17 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x900, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:12:18 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="3400000010000100cc680000000000000000000005000000000000001532336740e46387f800008064dcdc6ca616ef0dd0179be149f83265ff000ad022cea3b5906ed71efbac71604114ae634a1d3f5b42332fdb1ddff6c996d594f336ad93897a4c7c7d052c951ff3b19a2ae8dfe7daae4433b91e5be24f079e43a9066a68a1d63857237b3704f14d41e4376c1319a3cb91015718c602f3acaab637ceb7852dafdf71f385cfa97aa0b4888bc38b88bda6372e3668ad38b7f74f5579af15595a0c30e5611c48d698f5ab174fbc688112a84b0e6b16587fe1cca80147b9e1c0f1ed5b30c723ba82fe7b97990c195cdd6e5a3ec6986122d762e9182637b26db43c9871a7e08e00a222e27bb9eb35ce4745ffeda794f8f9b433cfaf77a5c151481692b680c9217e78cf5b4a110e4cf58a2481900e9ee69cdf0b73241206255494d36aa01416f7d0d0620f0b8526ca8484f212079b26fe05a315317995f2e147c5246ec242cda7921facafba1cf981b778d7b9333c9f88b53bf8b3a1c472d9869179a5d75ccaa1fa65e00d0b492e89e54f4d9ef4d61d2d7315ac264ed102185b46eef868a43ff0c84a79ac7dedfe21843442cfa03ab8fdf2c4a9967b518d211ddceeca7cce24735f1daf18a359c87c7c89a2011187f1b8d95f288434370c44a92d4dda3151ae0c5bb732e4baa5994bbe49e76eb2277e38c8f867d4a099cb00d9d38ca7bca38999cd3fc3b3ecb356302feed4b34c"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r8 = fsmount(0xffffffffffffffff, 0x0, 0x8) execveat(r8, &(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000400)='\x00', &(0x7f0000000bc0)='\x00\x80C\x107\xa64\xee\xbd*\xd4o\x8a?[\x98\xf29\xee\xc7\x90\x97\xaa\xc3\xc8Zq\xf3\x91\x04[S\\B2m=V\x89\x99\x96Q\xcaA\x18\xaf\xaf:\xf1\xab\x80\"\x7f\xb3\x18\xfe\xd7\xbd\xcd\xcdIf\xae\xb5\x87\xb8#\xe1\xbe\xec\xf0\t\xa1\xf7\xa7\xb1\x9d\xc7\xc2\xf0\x02\xaf\xc4\xd0@\xc2\x12\'\xb9\x9a\xea\x90e%\xe6\xd2E\x19E/\xc6\x17gB0Qim\x82u\x0fZ\xa9\x14\xf5\xc7X\xa9\x00\xb7\xaf\xcfouN\xbd\xb2\t^\xbe&~\xa7l\xfa\x036\x1c\"\x80\xfc/\x9b\x95\xf1!K\xc5{\xe7\xfdB[\xca\x87\x9bc\x98dg\x1a\xa1\xaa\xb4\x19\x7f\xa7\x90y\x9fq\xf5\x8a\xa9 \xa6\xdd\xf0+gb\xa6g\\\xec\tz\x06\xdf\x1a\x9c\xc9\xf7\xcc\x85\xb4G\xe9\xd3D\xf4\x8c\n\x17\xd5\x00\xf18\xb3T', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000280)='@\x90\x9a\x7fl\x00\x00\x00\x00p\xc4S\x9ch\xceH9\x88\xf3c\xb4\xabz#\xa8\xbb5\xd3\xc8\x9b\x00\x00 \x00\x00\x00\x00\x00', &(0x7f0000000540)='\x00', &(0x7f0000000a00)='\x009\x1c\xaf\x14\xe6\xeb\xe9\xf1\xccO@\xbd\xfc\xbdN\xfa\x93Z\x94\xfd\xc6]\xc3\x81g\x95\'\xb7\xf2\xe8\xbf\xd3\xf3\"\xf0Z\x93T\xa1\xc6\x10\x01\xba\xf0\x11\x01 \x94X\x7fQ\xa6\v\xfa\xc2\\$\xad\x96A\xd6\xdf|\x0e,c\xc4\x13\xfb\x91\xc5|{\xde\'xb\xcd\xb2\x177\x83\'\xdb\xf6y_\x10\x87\x01\xd4\xb1\x9b\xe4\xac\xf0D4\xe6v\x86\x02^bt\xbf!b\xd4k\x11\xf5Nj\x97P\b\xf2\xdd\r\xaa,g\xfc\x8f*\bq\x10wl\xe0\x02HG)\xa0\xb9%\x12\x9fx]\xf8Gz`\xfd\x00l\xe9<\xa5\xbd\x9f\x80\xa5\x0f\xd3\xf7\xc8\x98'], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000440)='\x00', &(0x7f0000000740)='\x10', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) 02:12:18 executing program 5: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) [ 1772.874552] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 02:12:18 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, 0x0, &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x10000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0xb}, 0x1c210, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x4}, 0x0, 0xd, 0xffffffffffffffff, 0x9) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5, r0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 02:12:18 executing program 1: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) flock(r0, 0x8) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) 02:12:18 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x5000000, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) [ 1772.895370] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 02:12:18 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x6000000, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) [ 1772.939478] blktrace: Concurrent blktraces are not allowed on loop2 [ 1772.960714] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem 02:12:18 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, 0x0, &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x10000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0xb}, 0x1c210, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x4}, 0x0, 0xd, 0xffffffffffffffff, 0x9) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5, r0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) [ 1772.985807] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 02:12:32 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0xf00, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:12:32 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x10000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0xb}, 0x1c210, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x4}, 0x0, 0xd, 0xffffffffffffffff, 0x9) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5, r0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 02:12:32 executing program 5: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) 02:12:32 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r8 = fsmount(0xffffffffffffffff, 0x0, 0x8) execveat(r8, &(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000400)='\x00', &(0x7f0000000bc0)='\x00\x80C\x107\xa64\xee\xbd*\xd4o\x8a?[\x98\xf29\xee\xc7\x90\x97\xaa\xc3\xc8Zq\xf3\x91\x04[S\\B2m=V\x89\x99\x96Q\xcaA\x18\xaf\xaf:\xf1\xab\x80\"\x7f\xb3\x18\xfe\xd7\xbd\xcd\xcdIf\xae\xb5\x87\xb8#\xe1\xbe\xec\xf0\t\xa1\xf7\xa7\xb1\x9d\xc7\xc2\xf0\x02\xaf\xc4\xd0@\xc2\x12\'\xb9\x9a\xea\x90e%\xe6\xd2E\x19E/\xc6\x17gB0Qim\x82u\x0fZ\xa9\x14\xf5\xc7X\xa9\x00\xb7\xaf\xcfouN\xbd\xb2\t^\xbe&~\xa7l\xfa\x036\x1c\"\x80\xfc/\x9b\x95\xf1!K\xc5{\xe7\xfdB[\xca\x87\x9bc\x98dg\x1a\xa1\xaa\xb4\x19\x7f\xa7\x90y\x9fq\xf5\x8a\xa9 \xa6\xdd\xf0+gb\xa6g\\\xec\tz\x06\xdf\x1a\x9c\xc9\xf7\xcc\x85\xb4G\xe9\xd3D\xf4\x8c\n\x17\xd5\x00\xf18\xb3T', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000280)='@\x90\x9a\x7fl\x00\x00\x00\x00p\xc4S\x9ch\xceH9\x88\xf3c\xb4\xabz#\xa8\xbb5\xd3\xc8\x9b\x00\x00 \x00\x00\x00\x00\x00', &(0x7f0000000540)='\x00', &(0x7f0000000a00)='\x009\x1c\xaf\x14\xe6\xeb\xe9\xf1\xccO@\xbd\xfc\xbdN\xfa\x93Z\x94\xfd\xc6]\xc3\x81g\x95\'\xb7\xf2\xe8\xbf\xd3\xf3\"\xf0Z\x93T\xa1\xc6\x10\x01\xba\xf0\x11\x01 \x94X\x7fQ\xa6\v\xfa\xc2\\$\xad\x96A\xd6\xdf|\x0e,c\xc4\x13\xfb\x91\xc5|{\xde\'xb\xcd\xb2\x177\x83\'\xdb\xf6y_\x10\x87\x01\xd4\xb1\x9b\xe4\xac\xf0D4\xe6v\x86\x02^bt\xbf!b\xd4k\x11\xf5Nj\x97P\b\xf2\xdd\r\xaa,g\xfc\x8f*\bq\x10wl\xe0\x02HG)\xa0\xb9%\x12\x9fx]\xf8Gz`\xfd\x00l\xe9<\xa5\xbd\x9f\x80\xa5\x0f\xd3\xf7\xc8\x98'], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000440)='\x00', &(0x7f0000000740)='\x10', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) 02:12:32 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x7000000, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:12:32 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x5, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) [ 1787.202909] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 02:12:32 executing program 6: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0xfe, 0x0, 0x4, 0x0, 0x105b, 0x50028, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7ff, 0x6}, 0x0, 0x0, 0x0, 0x6, 0x4080000000, 0x0, 0x86}, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x10060, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r4, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffffffffffffffff, 0xee01}}, './file0\x00'}) ioctl$EXT4_IOC_GROUP_EXTEND(r5, 0x40086607, &(0x7f0000000080)=0xc0) fsetxattr$security_ima(r1, 0x0, &(0x7f0000000200)=@ng={0x4, 0x10, "e2"}, 0x3, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000100)=0x7f, 0x7f) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$nfs(&(0x7f0000000240), &(0x7f00000002c0)='./file0/../file0\x00', 0x1, 0x3, &(0x7f0000000500)=[{&(0x7f0000000300)="b09456e1cc1abe3be01b5ab628f4f34a9a6cc65a92f9877ae3771e21d09c820335483bdc14c4696a6b7661a1c0cd40bf760bbd9d7976fb11c6db4c32f90d212b2447c78c0bb70e2341b9135a36e3d037b1", 0x51, 0xffffffffffffffff}, {&(0x7f00000003c0)="734392bf111e34ad89833539b8bc9d0c90f5905723c06cb62a77178037bdf869a9e9f9cf93423b1c6c08e00a09fffd1739e62303500b707c15a15ce9cff7d35d67b8f1929ea5dbb86e30efc44374d16ea8b43e80ec4d305a95b6b85adc47c8abfc", 0x61, 0x40}, {&(0x7f0000000440)="ffdd14b2d545b969616d54fa413948ca8c884e05a5e0b29fda45678de5b6ea9b32040cfbe28f87c93cf898c2624a360384a71f96dc79194b8c9cf744da855ca0b5aaf22f51db7f7c1cf4850f245977421e5f993e2c5e97146ac61139caedb63455f06e0ac29e00f522a151c2774de3ac62b0621adbe8f1cfca71952a01bd410dbd0731eb96367acfaef362026b898c9311a95951a302f26d1b3d3c6fb59470b3ce9e99d98277d23940f8e92a64207f20951d9407895b748c482f265db1ff0ac5", 0xc0, 0x5}], 0x1, &(0x7f0000000580)={[{'-$'}, {'rfdno'}, {'9p\x00'}, {'[\x89'}]}) setsockopt$inet6_udp_int(r5, 0x11, 0x66, &(0x7f00000005c0)=0x3, 0x4) close_range(r6, 0xffffffffffffffff, 0x0) r7 = dup2(r6, r6) ioctl$HIDIOCINITREPORT(r7, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r7, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 02:12:32 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fork() ptrace(0x10, r1) ptrace$getregset(0x4204, r1, 0x200, &(0x7f0000000100)={&(0x7f00000000c0)=""/63, 0x3f}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x1ba}}, './file0\x00'}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x8, 0x22, 0x5, 0xe1, 0x0, 0x0, 0x10040, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x3ff, 0xffff}, 0x11829, 0x1ffc000000000, 0x0, 0x2, 0x6, 0xffff, 0xffe1, 0x0, 0x8000, 0x0, 0xb2}, r1, 0xa, r2, 0x1) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000014c0)='/proc/asound/timers\x00', 0x0, 0x0) r4 = io_uring_setup(0x7fd3, &(0x7f0000001180)) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/rcu_expedited', 0x0, 0x0) ioctl$TCSETSW(r3, 0x5403, &(0x7f0000000000)={0x0, 0x2, 0x8e, 0x80000001, 0x2, "4e8e3a03be2cbb294d76879b142edeb83a5497"}) pipe(&(0x7f00000014c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet(0x2, 0xa, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) pselect6(0x71, &(0x7f0000000180), &(0x7f00000001c0)={0x3fc}, 0x0, 0x0, 0x0) copy_file_range(r5, &(0x7f00000000c0)=0xffffffff, r4, 0x0, 0x3, 0x0) [ 1787.246498] nfs: Unknown parameter '-$' 02:12:32 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="3400000010000100cc680000000000000000000005000000000000001532336740e46387f800008064dcdc6ca616ef0dd0179be149f83265ff000ad022cea3b5906ed71efbac71604114ae634a1d3f5b42332fdb1ddff6c996d594f336ad93897a4c7c7d052c951ff3b19a2ae8dfe7daae4433b91e5be24f079e43a9066a68a1d63857237b3704f14d41e4376c1319a3cb91015718c602f3acaab637ceb7852dafdf71f385cfa97aa0b4888bc38b88bda6372e3668ad38b7f74f5579af15595a0c30e5611c48d698f5ab174fbc688112a84b0e6b16587fe1cca80147b9e1c0f1ed5b30c723ba82fe7b97990c195cdd6e5a3ec6986122d762e9182637b26db43c9871a7e08e00a222e27bb9eb35ce4745ffeda794f8f9b433cfaf77a5c151481692b680c9217e78cf5b4a110e4cf58a2481900e9ee69cdf0b73241206255494d36aa01416f7d0d0620f0b8526ca8484f212079b26fe05a315317995f2e147c5246ec242cda7921facafba1cf981b778d7b9333c9f88b53bf8b3a1c472d9869179a5d75ccaa1fa65e00d0b492e89e54f4d9ef4d61d2d7315ac264ed102185b46eef868a43ff0c84a79ac7dedfe21843442cfa03ab8fdf2c4a9967b518d211ddceeca7cce24735f1daf18a359c87c7c89a2011187f1b8d95f288434370c44a92d4dda3151ae0c5bb732e4baa5994bbe49e76eb2277e38c8f867d4a099cb00d9d38ca7bca38999cd3fc3b3ecb356302feed4b34c"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r8 = fsmount(0xffffffffffffffff, 0x0, 0x8) execveat(r8, &(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000400)='\x00', &(0x7f0000000bc0)='\x00\x80C\x107\xa64\xee\xbd*\xd4o\x8a?[\x98\xf29\xee\xc7\x90\x97\xaa\xc3\xc8Zq\xf3\x91\x04[S\\B2m=V\x89\x99\x96Q\xcaA\x18\xaf\xaf:\xf1\xab\x80\"\x7f\xb3\x18\xfe\xd7\xbd\xcd\xcdIf\xae\xb5\x87\xb8#\xe1\xbe\xec\xf0\t\xa1\xf7\xa7\xb1\x9d\xc7\xc2\xf0\x02\xaf\xc4\xd0@\xc2\x12\'\xb9\x9a\xea\x90e%\xe6\xd2E\x19E/\xc6\x17gB0Qim\x82u\x0fZ\xa9\x14\xf5\xc7X\xa9\x00\xb7\xaf\xcfouN\xbd\xb2\t^\xbe&~\xa7l\xfa\x036\x1c\"\x80\xfc/\x9b\x95\xf1!K\xc5{\xe7\xfdB[\xca\x87\x9bc\x98dg\x1a\xa1\xaa\xb4\x19\x7f\xa7\x90y\x9fq\xf5\x8a\xa9 \xa6\xdd\xf0+gb\xa6g\\\xec\tz\x06\xdf\x1a\x9c\xc9\xf7\xcc\x85\xb4G\xe9\xd3D\xf4\x8c\n\x17\xd5\x00\xf18\xb3T', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000280)='@\x90\x9a\x7fl\x00\x00\x00\x00p\xc4S\x9ch\xceH9\x88\xf3c\xb4\xabz#\xa8\xbb5\xd3\xc8\x9b\x00\x00 \x00\x00\x00\x00\x00', &(0x7f0000000540)='\x00', &(0x7f0000000a00)='\x009\x1c\xaf\x14\xe6\xeb\xe9\xf1\xccO@\xbd\xfc\xbdN\xfa\x93Z\x94\xfd\xc6]\xc3\x81g\x95\'\xb7\xf2\xe8\xbf\xd3\xf3\"\xf0Z\x93T\xa1\xc6\x10\x01\xba\xf0\x11\x01 \x94X\x7fQ\xa6\v\xfa\xc2\\$\xad\x96A\xd6\xdf|\x0e,c\xc4\x13\xfb\x91\xc5|{\xde\'xb\xcd\xb2\x177\x83\'\xdb\xf6y_\x10\x87\x01\xd4\xb1\x9b\xe4\xac\xf0D4\xe6v\x86\x02^bt\xbf!b\xd4k\x11\xf5Nj\x97P\b\xf2\xdd\r\xaa,g\xfc\x8f*\bq\x10wl\xe0\x02HG)\xa0\xb9%\x12\x9fx]\xf8Gz`\xfd\x00l\xe9<\xa5\xbd\x9f\x80\xa5\x0f\xd3\xf7\xc8\x98'], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000440)='\x00', &(0x7f0000000740)='\x10', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) 02:12:32 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x9000000, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:12:32 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x10000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0xb}, 0x1c210, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x4}, 0x0, 0xd, 0xffffffffffffffff, 0x9) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5, r0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) [ 1787.346606] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 02:12:32 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x30000, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:12:32 executing program 1: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de6", 0x97, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$HIDIOCGFEATURE(r2, 0xc0404807, &(0x7f00000002c0)={0x2, "52ce82295f92360593c9bc014afd9af50f31a08cd4cf4699ee59408610f77382cbeb2a403d0bedbedcd4dd1466b724c15bd14353cbe430f49a45c2a93cb5ed9b"}) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/zoneinfo\x00', 0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) write$cgroup_int(r1, &(0x7f0000000180)=0x1f, 0x12) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x50, 0xffffffffffffffff, 0xd596d000) lseek(0xffffffffffffffff, 0x2, 0x4) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f00000000c0)=0x2) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, r0) 02:12:32 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x6, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 02:12:32 executing program 5: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) [ 1787.451300] EXT4-fs error (device loop1): ext4_orphan_get:1417: comm syz-executor.1: bad orphan inode 301979167 [ 1787.453557] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 02:12:32 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0xf000000, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:12:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0xfffffd49, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="14001b0000000000000000000000000000fc0000"], 0x14}}, 0x0) r1 = dup(r0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f00000000c0)=0x3, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) recvmmsg(r1, &(0x7f0000007940)=[{{0x0, 0x0, 0x0}}], 0x500, 0x20000022, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r2) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_START_AP(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x88, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@beacon=[@NL80211_ATTR_BEACON_HEAD={0x28, 0xe, {@wo_ht={{}, {}, @broadcast, @device_a, @from_mac}, 0x0, @default, 0x1, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void}}], @NL80211_ATTR_HE_OBSS_PD={0x1c, 0x117, 0x0, 0x1, [@NL80211_HE_OBSS_PD_ATTR_MIN_OFFSET={0x5, 0x1, 0x3}, @NL80211_HE_OBSS_PD_ATTR_MAX_OFFSET={0x5, 0x2, 0x6}, @NL80211_HE_OBSS_PD_ATTR_MIN_OFFSET={0x5, 0x1, 0x3}]}, @NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_DTIM_PERIOD={0x8}, @NL80211_ATTR_SSID={0xa, 0x34, @default_ap_ssid}, @NL80211_ATTR_AUTH_TYPE={0x8}, @NL80211_ATTR_EXTERNAL_AUTH_SUPPORT={0x4}]}, 0x88}}, 0x0) read(r2, &(0x7f0000000140)=""/115, 0x73) 02:12:45 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="3400000010000100cc680000000000000000000005000000000000001532336740e46387f800008064dcdc6ca616ef0dd0179be149f83265ff000ad022cea3b5906ed71efbac71604114ae634a1d3f5b42332fdb1ddff6c996d594f336ad93897a4c7c7d052c951ff3b19a2ae8dfe7daae4433b91e5be24f079e43a9066a68a1d63857237b3704f14d41e4376c1319a3cb91015718c602f3acaab637ceb7852dafdf71f385cfa97aa0b4888bc38b88bda6372e3668ad38b7f74f5579af15595a0c30e5611c48d698f5ab174fbc688112a84b0e6b16587fe1cca80147b9e1c0f1ed5b30c723ba82fe7b97990c195cdd6e5a3ec6986122d762e9182637b26db43c9871a7e08e00a222e27bb9eb35ce4745ffeda794f8f9b433cfaf77a5c151481692b680c9217e78cf5b4a110e4cf58a2481900e9ee69cdf0b73241206255494d36aa01416f7d0d0620f0b8526ca8484f212079b26fe05a315317995f2e147c5246ec242cda7921facafba1cf981b778d7b9333c9f88b53bf8b3a1c472d9869179a5d75ccaa1fa65e00d0b492e89e54f4d9ef4d61d2d7315ac264ed102185b46eef868a43ff0c84a79ac7dedfe21843442cfa03ab8fdf2c4a9967b518d211ddceeca7cce24735f1daf18a359c87c7c89a2011187f1b8d95f288434370c44a92d4dda3151ae0c5bb732e4baa5994bbe49e76eb2277e38c8f867d4a099cb00d9d38ca7bca38999cd3fc3b3ecb356302feed4b34c"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x0) execveat(r8, &(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000400)='\x00', &(0x7f0000000bc0)='\x00\x80C\x107\xa64\xee\xbd*\xd4o\x8a?[\x98\xf29\xee\xc7\x90\x97\xaa\xc3\xc8Zq\xf3\x91\x04[S\\B2m=V\x89\x99\x96Q\xcaA\x18\xaf\xaf:\xf1\xab\x80\"\x7f\xb3\x18\xfe\xd7\xbd\xcd\xcdIf\xae\xb5\x87\xb8#\xe1\xbe\xec\xf0\t\xa1\xf7\xa7\xb1\x9d\xc7\xc2\xf0\x02\xaf\xc4\xd0@\xc2\x12\'\xb9\x9a\xea\x90e%\xe6\xd2E\x19E/\xc6\x17gB0Qim\x82u\x0fZ\xa9\x14\xf5\xc7X\xa9\x00\xb7\xaf\xcfouN\xbd\xb2\t^\xbe&~\xa7l\xfa\x036\x1c\"\x80\xfc/\x9b\x95\xf1!K\xc5{\xe7\xfdB[\xca\x87\x9bc\x98dg\x1a\xa1\xaa\xb4\x19\x7f\xa7\x90y\x9fq\xf5\x8a\xa9 \xa6\xdd\xf0+gb\xa6g\\\xec\tz\x06\xdf\x1a\x9c\xc9\xf7\xcc\x85\xb4G\xe9\xd3D\xf4\x8c\n\x17\xd5\x00\xf18\xb3T', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000280)='@\x90\x9a\x7fl\x00\x00\x00\x00p\xc4S\x9ch\xceH9\x88\xf3c\xb4\xabz#\xa8\xbb5\xd3\xc8\x9b\x00\x00 \x00\x00\x00\x00\x00', &(0x7f0000000540)='\x00', &(0x7f0000000a00)='\x009\x1c\xaf\x14\xe6\xeb\xe9\xf1\xccO@\xbd\xfc\xbdN\xfa\x93Z\x94\xfd\xc6]\xc3\x81g\x95\'\xb7\xf2\xe8\xbf\xd3\xf3\"\xf0Z\x93T\xa1\xc6\x10\x01\xba\xf0\x11\x01 \x94X\x7fQ\xa6\v\xfa\xc2\\$\xad\x96A\xd6\xdf|\x0e,c\xc4\x13\xfb\x91\xc5|{\xde\'xb\xcd\xb2\x177\x83\'\xdb\xf6y_\x10\x87\x01\xd4\xb1\x9b\xe4\xac\xf0D4\xe6v\x86\x02^bt\xbf!b\xd4k\x11\xf5Nj\x97P\b\xf2\xdd\r\xaa,g\xfc\x8f*\bq\x10wl\xe0\x02HG)\xa0\xb9%\x12\x9fx]\xf8Gz`\xfd\x00l\xe9<\xa5\xbd\x9f\x80\xa5\x0f\xd3\xf7\xc8\x98'], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000440)='\x00', &(0x7f0000000740)='\x10', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) 02:12:45 executing program 5: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) 02:12:45 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x10000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0xb}, 0x1c210, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x4}, 0x0, 0xd, 0xffffffffffffffff, 0x9) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5, r0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 02:12:45 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x34000, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:12:45 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x7, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 02:12:45 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0xffffff7f, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:12:45 executing program 6: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) flock(r0, 0x2) r1 = eventfd(0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080), 0x2, 0x1) flock(0xffffffffffffffff, 0x1) dup3(r1, r0, 0x0) [ 1800.517303] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 02:12:45 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) unlinkat(r1, &(0x7f0000000000)='./file1\x00', 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000000c0)=0x0) syz_open_procfs(r3, &(0x7f00000001c0)='coredump_filter\x00') ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000}) 02:12:45 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x80000, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:12:45 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0xf, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:12:45 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x8, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 02:12:45 executing program 5: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) [ 1801.337463] cgroup: fork rejected by pids controller in /syz1 02:13:01 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x400300, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:13:01 executing program 1: syz_open_dev$vcsa(0x0, 0x800000000000000, 0x38d880) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r0, 0x0, 0x0, 0x1000002) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) writev(0xffffffffffffffff, &(0x7f0000000200), 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_matches\x00') syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), r2) bind(0xffffffffffffffff, &(0x7f00000002c0)=@nfc={0x27, 0x0, 0x0, 0x1}, 0x80) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x40094}, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x100000001) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r0, 0x0) 02:13:01 executing program 5: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) 02:13:01 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0x9) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5, r0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 02:13:01 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:13:01 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x9, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 02:13:01 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x0) execveat(r8, &(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000400)='\x00', &(0x7f0000000bc0)='\x00\x80C\x107\xa64\xee\xbd*\xd4o\x8a?[\x98\xf29\xee\xc7\x90\x97\xaa\xc3\xc8Zq\xf3\x91\x04[S\\B2m=V\x89\x99\x96Q\xcaA\x18\xaf\xaf:\xf1\xab\x80\"\x7f\xb3\x18\xfe\xd7\xbd\xcd\xcdIf\xae\xb5\x87\xb8#\xe1\xbe\xec\xf0\t\xa1\xf7\xa7\xb1\x9d\xc7\xc2\xf0\x02\xaf\xc4\xd0@\xc2\x12\'\xb9\x9a\xea\x90e%\xe6\xd2E\x19E/\xc6\x17gB0Qim\x82u\x0fZ\xa9\x14\xf5\xc7X\xa9\x00\xb7\xaf\xcfouN\xbd\xb2\t^\xbe&~\xa7l\xfa\x036\x1c\"\x80\xfc/\x9b\x95\xf1!K\xc5{\xe7\xfdB[\xca\x87\x9bc\x98dg\x1a\xa1\xaa\xb4\x19\x7f\xa7\x90y\x9fq\xf5\x8a\xa9 \xa6\xdd\xf0+gb\xa6g\\\xec\tz\x06\xdf\x1a\x9c\xc9\xf7\xcc\x85\xb4G\xe9\xd3D\xf4\x8c\n\x17\xd5\x00\xf18\xb3T', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000280)='@\x90\x9a\x7fl\x00\x00\x00\x00p\xc4S\x9ch\xceH9\x88\xf3c\xb4\xabz#\xa8\xbb5\xd3\xc8\x9b\x00\x00 \x00\x00\x00\x00\x00', &(0x7f0000000540)='\x00', &(0x7f0000000a00)='\x009\x1c\xaf\x14\xe6\xeb\xe9\xf1\xccO@\xbd\xfc\xbdN\xfa\x93Z\x94\xfd\xc6]\xc3\x81g\x95\'\xb7\xf2\xe8\xbf\xd3\xf3\"\xf0Z\x93T\xa1\xc6\x10\x01\xba\xf0\x11\x01 \x94X\x7fQ\xa6\v\xfa\xc2\\$\xad\x96A\xd6\xdf|\x0e,c\xc4\x13\xfb\x91\xc5|{\xde\'xb\xcd\xb2\x177\x83\'\xdb\xf6y_\x10\x87\x01\xd4\xb1\x9b\xe4\xac\xf0D4\xe6v\x86\x02^bt\xbf!b\xd4k\x11\xf5Nj\x97P\b\xf2\xdd\r\xaa,g\xfc\x8f*\bq\x10wl\xe0\x02HG)\xa0\xb9%\x12\x9fx]\xf8Gz`\xfd\x00l\xe9<\xa5\xbd\x9f\x80\xa5\x0f\xd3\xf7\xc8\x98'], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000440)='\x00', &(0x7f0000000740)='\x10', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) 02:13:01 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x80, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x3c, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast2}, {0x14, 0x4, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x80}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'wlan1\x00'}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000002c0)={0x1c, 0x20, 0x0, 0x0, 0x0, {0x2}, [@generic="0000af0180"]}, 0x1c}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, 0x0) fallocate(r3, 0x0, 0x10001, 0x100) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0x0, r3, 0x2}) r4 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa100, 0x0) r5 = syz_open_dev$ptys(0xc, 0x3, 0x0) write$binfmt_elf64(r3, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0xd3, 0x8, 0x5, 0x7, 0x0, 0x2, 0x3b, 0xfffffffd, 0x33a, 0x40, 0x2d9, 0x0, 0x8, 0x38, 0x2, 0x5, 0x3, 0x8}, [{0x2, 0xffffffff, 0x9, 0xff, 0x69, 0x1c, 0x10000, 0x7}, {0x2, 0x1, 0x1, 0x66de, 0x4322, 0x742a10fd, 0xd29, 0x3}], "de17e50b03da6128c89ca8ce32dff6570f09b520cdc566ecb18dbccb882aef61ee043b1f2f8727d00ec9d4dcdb40e2bd2bb0a0e061d14760762986e926a4de3fddf3d95255fe6d370e37cc48e2cb636d96f07377de2588dbace1fed98b5e3fe31e906304aa0c60774f78ef420646ed1a45fc86643abf7111b5e28ac9486b73be87ae9baaf0411ee74dc4200ed0d7c0617fb89eb8627435f830514fdb38e4ea6e1c7e0adfb72eb2f3acfe3f3416173241598c18942d9271710353fecdc96cd340c6eae30ad21b575f89f4bca0", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x67c) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000180)=[r0, r4, r1, r5], 0x4) r6 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/mcfilter\x00') fcntl$F_GET_FILE_RW_HINT(r6, 0x40d, &(0x7f00000001c0)) preadv(r6, &(0x7f0000001500)=[{&(0x7f0000000000)=""/84, 0x54}, {&(0x7f0000000500)=""/4096, 0x1000}], 0x2, 0x0, 0x0) [ 1816.783974] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 02:13:01 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0xc0, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:13:02 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x1000000, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:13:02 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0xf, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 02:13:02 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x0) execveat(r8, &(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000400)='\x00', &(0x7f0000000bc0)='\x00\x80C\x107\xa64\xee\xbd*\xd4o\x8a?[\x98\xf29\xee\xc7\x90\x97\xaa\xc3\xc8Zq\xf3\x91\x04[S\\B2m=V\x89\x99\x96Q\xcaA\x18\xaf\xaf:\xf1\xab\x80\"\x7f\xb3\x18\xfe\xd7\xbd\xcd\xcdIf\xae\xb5\x87\xb8#\xe1\xbe\xec\xf0\t\xa1\xf7\xa7\xb1\x9d\xc7\xc2\xf0\x02\xaf\xc4\xd0@\xc2\x12\'\xb9\x9a\xea\x90e%\xe6\xd2E\x19E/\xc6\x17gB0Qim\x82u\x0fZ\xa9\x14\xf5\xc7X\xa9\x00\xb7\xaf\xcfouN\xbd\xb2\t^\xbe&~\xa7l\xfa\x036\x1c\"\x80\xfc/\x9b\x95\xf1!K\xc5{\xe7\xfdB[\xca\x87\x9bc\x98dg\x1a\xa1\xaa\xb4\x19\x7f\xa7\x90y\x9fq\xf5\x8a\xa9 \xa6\xdd\xf0+gb\xa6g\\\xec\tz\x06\xdf\x1a\x9c\xc9\xf7\xcc\x85\xb4G\xe9\xd3D\xf4\x8c\n\x17\xd5\x00\xf18\xb3T', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000280)='@\x90\x9a\x7fl\x00\x00\x00\x00p\xc4S\x9ch\xceH9\x88\xf3c\xb4\xabz#\xa8\xbb5\xd3\xc8\x9b\x00\x00 \x00\x00\x00\x00\x00', &(0x7f0000000540)='\x00', &(0x7f0000000a00)='\x009\x1c\xaf\x14\xe6\xeb\xe9\xf1\xccO@\xbd\xfc\xbdN\xfa\x93Z\x94\xfd\xc6]\xc3\x81g\x95\'\xb7\xf2\xe8\xbf\xd3\xf3\"\xf0Z\x93T\xa1\xc6\x10\x01\xba\xf0\x11\x01 \x94X\x7fQ\xa6\v\xfa\xc2\\$\xad\x96A\xd6\xdf|\x0e,c\xc4\x13\xfb\x91\xc5|{\xde\'xb\xcd\xb2\x177\x83\'\xdb\xf6y_\x10\x87\x01\xd4\xb1\x9b\xe4\xac\xf0D4\xe6v\x86\x02^bt\xbf!b\xd4k\x11\xf5Nj\x97P\b\xf2\xdd\r\xaa,g\xfc\x8f*\bq\x10wl\xe0\x02HG)\xa0\xb9%\x12\x9fx]\xf8Gz`\xfd\x00l\xe9<\xa5\xbd\x9f\x80\xa5\x0f\xd3\xf7\xc8\x98'], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000440)='\x00', &(0x7f0000000740)='\x10', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) 02:13:02 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0x9) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5, r0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 02:13:02 executing program 5: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, 0x0, 0x0) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) 02:13:02 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x2000000, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) [ 1817.084145] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 02:13:02 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0xf0, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 02:13:02 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0xec0, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:13:17 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x2c4, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 02:13:17 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@flushpolicy={0x114, 0x12, 0xc9b8ebb5536361cd, 0x0, 0x0, "", [@tmpl={0x104, 0x5, [{{@in=@rand_addr=0x64010102, 0x4d6, 0x3c}, 0xa, @in6=@ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x24}}, 0x3505, 0x3, 0x1, 0x3, 0x0, 0x1, 0x6}, {{@in=@empty, 0x4d5, 0x6c}, 0x0, @in=@local, 0x3503, 0x2, 0x3, 0x0, 0x5, 0x7f}, {{@in=@empty, 0x4d3, 0x33}, 0x2, @in=@multicast1, 0x3502, 0x1, 0x1, 0x5, 0x9a, 0x9a9, 0x8}, {{@in=@multicast1, 0x4d3, 0x33}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0x1e}, 0x3502, 0x3, 0x2, 0x8, 0x0, 0xfffffffd, 0x6e62}]}]}, 0x114}}, 0x0) ioctl$AUTOFS_IOC_ASKUMOUNT(r0, 0x80049370, &(0x7f0000000140)) 02:13:17 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x3000000, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:13:17 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) fsmount(r5, 0x0, 0x8) execveat(0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000400)='\x00', &(0x7f0000000bc0)='\x00\x80C\x107\xa64\xee\xbd*\xd4o\x8a?[\x98\xf29\xee\xc7\x90\x97\xaa\xc3\xc8Zq\xf3\x91\x04[S\\B2m=V\x89\x99\x96Q\xcaA\x18\xaf\xaf:\xf1\xab\x80\"\x7f\xb3\x18\xfe\xd7\xbd\xcd\xcdIf\xae\xb5\x87\xb8#\xe1\xbe\xec\xf0\t\xa1\xf7\xa7\xb1\x9d\xc7\xc2\xf0\x02\xaf\xc4\xd0@\xc2\x12\'\xb9\x9a\xea\x90e%\xe6\xd2E\x19E/\xc6\x17gB0Qim\x82u\x0fZ\xa9\x14\xf5\xc7X\xa9\x00\xb7\xaf\xcfouN\xbd\xb2\t^\xbe&~\xa7l\xfa\x036\x1c\"\x80\xfc/\x9b\x95\xf1!K\xc5{\xe7\xfdB[\xca\x87\x9bc\x98dg\x1a\xa1\xaa\xb4\x19\x7f\xa7\x90y\x9fq\xf5\x8a\xa9 \xa6\xdd\xf0+gb\xa6g\\\xec\tz\x06\xdf\x1a\x9c\xc9\xf7\xcc\x85\xb4G\xe9\xd3D\xf4\x8c\n\x17\xd5\x00\xf18\xb3T', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000280)='@\x90\x9a\x7fl\x00\x00\x00\x00p\xc4S\x9ch\xceH9\x88\xf3c\xb4\xabz#\xa8\xbb5\xd3\xc8\x9b\x00\x00 \x00\x00\x00\x00\x00', &(0x7f0000000540)='\x00', &(0x7f0000000a00)='\x009\x1c\xaf\x14\xe6\xeb\xe9\xf1\xccO@\xbd\xfc\xbdN\xfa\x93Z\x94\xfd\xc6]\xc3\x81g\x95\'\xb7\xf2\xe8\xbf\xd3\xf3\"\xf0Z\x93T\xa1\xc6\x10\x01\xba\xf0\x11\x01 \x94X\x7fQ\xa6\v\xfa\xc2\\$\xad\x96A\xd6\xdf|\x0e,c\xc4\x13\xfb\x91\xc5|{\xde\'xb\xcd\xb2\x177\x83\'\xdb\xf6y_\x10\x87\x01\xd4\xb1\x9b\xe4\xac\xf0D4\xe6v\x86\x02^bt\xbf!b\xd4k\x11\xf5Nj\x97P\b\xf2\xdd\r\xaa,g\xfc\x8f*\bq\x10wl\xe0\x02HG)\xa0\xb9%\x12\x9fx]\xf8Gz`\xfd\x00l\xe9<\xa5\xbd\x9f\x80\xa5\x0f\xd3\xf7\xc8\x98'], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000440)='\x00', &(0x7f0000000740)='\x10', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r8 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r9 = dup2(r6, r5) openat(r9, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r8, 0x0) 02:13:17 executing program 1: ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f00000004c0)) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x1000, 0x8000, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000)={0x9, 0x80000000, 0x8001}, 0xc) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000580)=@IORING_OP_SPLICE={0x1e, 0x1, 0x0, @fd, 0x1ff, {}, 0x0, 0x2}, 0x10001) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000500)=@IORING_OP_OPENAT2={0x1c, 0x5, 0x0, r5, &(0x7f00000000c0)={0x400000, 0x21, 0x12}, &(0x7f00000001c0)='./file0/file0\x00', 0x18, 0x0, 0x31713}, 0x3ff) syz_io_uring_submit(0x0, 0x0, &(0x7f00000007c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000040)={0x0, 0x989680}, 0x1, 0x1, 0x1}, 0x6266) creat(&(0x7f0000000080)='./file0/file0\x00', 0x18) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240), &(0x7f00000002c0)='./file0/file0\x00', 0x1, 0x6, &(0x7f0000000680)=[{&(0x7f0000000300)="43f0ea8ff0523e6f372217bde62e2416f35e5c97a4933d4b41dc0f40fce2a49629d813fc5f9c495a9cafc1898a97408589b078e8e678057d535fee48e44b8278ce5e8e663f25b48c2ed24501d7e6a420e4cfdf6dd1a12774a0", 0x59, 0x8}, {&(0x7f0000000380)="5be39de1bcac0a70287d5cf2d40b618c2aed7b026bdcab34352423b96bfa0a9e9466dce894500f4da7efa15a50d8e82c3e98c000b387f7ce914284037d7d450f4e6b4a2ef1fdcc02fa508eb7a4ef72b18cdf2c4d2a4b61be54219b26a43c1266610502567c9766a6063a8d8c1876798fd6f3a4fb19ae99978dfb68b96ccd6e4af19c894424fe0c961e6f8e6bdc00c675f4661e0fe4f308b40f2c", 0x9a, 0x9}, {&(0x7f0000000440)="7fffca5c378b0698e20b5d072408377a76c4a7525a45aeb9f6c963810e", 0x1d, 0x3}, {&(0x7f0000000480)="ced1820ee36916c4b856315efc93de97a4a0bb31890c6e4a97b646da202ca2d192c37bd5706a2fe2992b1478b1814b46c67f91b923736585bf71da", 0x3b, 0x8001}, {&(0x7f0000000540)="7beada0894a047b938187bc50e9fcff4dc30b8f359306c3bed37947f73ef519be24359242286dee29bac1467f04bbb2463e4e6b4ebff1747577219297db435df4dc468846e67bc28", 0x48, 0x1}, {&(0x7f00000005c0)="a3d4b07b95998ad3422e32ff8d07ff02e4adb72fe53c6f92942a2f9c80633bb5592580b59f540df3241ffde07767cf536ba701dc7097cc183cdd9c527bd2e76b87bff13e003daf09283cf4cadf4a593662d38faace2443fb4e03186e941543ecee4d5179c4a8f6773de84320901acdecf1dbf1b2b422b7c97dd983988cc697e08a", 0x81, 0x4}], 0x0, &(0x7f0000000740)={[{@shortname_win95}, {@utf8}, {@rodir}, {@shortname_winnt}, {@utf8}, {@shortname_mixed}, {@nonumtail}], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 1832.214908] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 02:13:17 executing program 5: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, 0x0, 0x0) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) 02:13:17 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0x9) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5, r0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 02:13:17 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x33fe0, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:13:17 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) fcntl$setstatus(r1, 0x4, 0xc00) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000040)={{{@in6=@dev, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={r2, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x2c}}, 0x10) r3 = dup2(r0, r1) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r3, 0x89f5, &(0x7f00000002c0)={'ip6tnl0\x00', &(0x7f0000000240)={'ip6_vti0\x00', r2, 0x0, 0xb1, 0x4, 0x80000001, 0xe, @dev={0xfe, 0x80, '\x00', 0x29}, @dev={0xfe, 0x80, '\x00', 0x2f}, 0x1, 0x10, 0x4, 0x737f}}) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f0000000300)={r4, 0x1, 0x6, @remote}, 0x10) 02:13:17 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x4000000, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:13:17 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x2000069c, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:13:17 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x300, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 02:13:17 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) fsmount(r5, 0x0, 0x8) execveat(0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000400)='\x00', &(0x7f0000000bc0)='\x00\x80C\x107\xa64\xee\xbd*\xd4o\x8a?[\x98\xf29\xee\xc7\x90\x97\xaa\xc3\xc8Zq\xf3\x91\x04[S\\B2m=V\x89\x99\x96Q\xcaA\x18\xaf\xaf:\xf1\xab\x80\"\x7f\xb3\x18\xfe\xd7\xbd\xcd\xcdIf\xae\xb5\x87\xb8#\xe1\xbe\xec\xf0\t\xa1\xf7\xa7\xb1\x9d\xc7\xc2\xf0\x02\xaf\xc4\xd0@\xc2\x12\'\xb9\x9a\xea\x90e%\xe6\xd2E\x19E/\xc6\x17gB0Qim\x82u\x0fZ\xa9\x14\xf5\xc7X\xa9\x00\xb7\xaf\xcfouN\xbd\xb2\t^\xbe&~\xa7l\xfa\x036\x1c\"\x80\xfc/\x9b\x95\xf1!K\xc5{\xe7\xfdB[\xca\x87\x9bc\x98dg\x1a\xa1\xaa\xb4\x19\x7f\xa7\x90y\x9fq\xf5\x8a\xa9 \xa6\xdd\xf0+gb\xa6g\\\xec\tz\x06\xdf\x1a\x9c\xc9\xf7\xcc\x85\xb4G\xe9\xd3D\xf4\x8c\n\x17\xd5\x00\xf18\xb3T', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000280)='@\x90\x9a\x7fl\x00\x00\x00\x00p\xc4S\x9ch\xceH9\x88\xf3c\xb4\xabz#\xa8\xbb5\xd3\xc8\x9b\x00\x00 \x00\x00\x00\x00\x00', &(0x7f0000000540)='\x00', &(0x7f0000000a00)='\x009\x1c\xaf\x14\xe6\xeb\xe9\xf1\xccO@\xbd\xfc\xbdN\xfa\x93Z\x94\xfd\xc6]\xc3\x81g\x95\'\xb7\xf2\xe8\xbf\xd3\xf3\"\xf0Z\x93T\xa1\xc6\x10\x01\xba\xf0\x11\x01 \x94X\x7fQ\xa6\v\xfa\xc2\\$\xad\x96A\xd6\xdf|\x0e,c\xc4\x13\xfb\x91\xc5|{\xde\'xb\xcd\xb2\x177\x83\'\xdb\xf6y_\x10\x87\x01\xd4\xb1\x9b\xe4\xac\xf0D4\xe6v\x86\x02^bt\xbf!b\xd4k\x11\xf5Nj\x97P\b\xf2\xdd\r\xaa,g\xfc\x8f*\bq\x10wl\xe0\x02HG)\xa0\xb9%\x12\x9fx]\xf8Gz`\xfd\x00l\xe9<\xa5\xbd\x9f\x80\xa5\x0f\xd3\xf7\xc8\x98'], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000440)='\x00', &(0x7f0000000740)='\x10', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r8 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r9 = dup2(r6, r5) openat(r9, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r8, 0x0) 02:13:17 executing program 5: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, 0x0, 0x0) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) [ 1832.436551] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 02:13:17 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x10000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0xb}, 0x1c210, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x4}, 0x0, 0xd, 0xffffffffffffffff, 0x9) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5, r0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) [ 1832.471064] FAT-fs (loop1): Unrecognized mount option "nnonumtail=1" or missing value 02:13:17 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x5000000, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:13:31 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/bus/pnp', 0x80000, 0x92) io_uring_enter(r0, 0x42ac, 0xbe7b, 0x3, &(0x7f00000001c0)={[0x17a]}, 0x8) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet6(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000080)="50b31d6a", 0xfe9f}], 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="14000000001100002900d5d47e097ac101577efd09cfd5ecf22e380000000000000000008c0d7a4f557314b6598db632574d4268dbeee5bed391bd0c57887235fb2e29be8329a45a718cc917ec3fefb50fe7a0070afb625914ee7068337ddc2981f31e7c8d9949b0d51d68010e02b4a77aea6f885214056f7c298f8889289451f1f538c751893a8cba090a4cce06495825b51fff677458536f20cec8bc24d8b956424cb7380c63b560db2bd68f3673b96f7e936833372cfa34b1bbcecf8102cf9975ea024b"], 0x18}, 0x0) 02:13:31 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x7ffff000, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:13:31 executing program 5: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000200), 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) 02:13:31 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x10000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0xb}, 0x1c210, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x4}, 0x0, 0xd, 0xffffffffffffffff, 0x9) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5, r0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 02:13:31 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x6000000, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:13:31 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) fsmount(r5, 0x0, 0x8) execveat(0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000400)='\x00', &(0x7f0000000bc0)='\x00\x80C\x107\xa64\xee\xbd*\xd4o\x8a?[\x98\xf29\xee\xc7\x90\x97\xaa\xc3\xc8Zq\xf3\x91\x04[S\\B2m=V\x89\x99\x96Q\xcaA\x18\xaf\xaf:\xf1\xab\x80\"\x7f\xb3\x18\xfe\xd7\xbd\xcd\xcdIf\xae\xb5\x87\xb8#\xe1\xbe\xec\xf0\t\xa1\xf7\xa7\xb1\x9d\xc7\xc2\xf0\x02\xaf\xc4\xd0@\xc2\x12\'\xb9\x9a\xea\x90e%\xe6\xd2E\x19E/\xc6\x17gB0Qim\x82u\x0fZ\xa9\x14\xf5\xc7X\xa9\x00\xb7\xaf\xcfouN\xbd\xb2\t^\xbe&~\xa7l\xfa\x036\x1c\"\x80\xfc/\x9b\x95\xf1!K\xc5{\xe7\xfdB[\xca\x87\x9bc\x98dg\x1a\xa1\xaa\xb4\x19\x7f\xa7\x90y\x9fq\xf5\x8a\xa9 \xa6\xdd\xf0+gb\xa6g\\\xec\tz\x06\xdf\x1a\x9c\xc9\xf7\xcc\x85\xb4G\xe9\xd3D\xf4\x8c\n\x17\xd5\x00\xf18\xb3T', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000280)='@\x90\x9a\x7fl\x00\x00\x00\x00p\xc4S\x9ch\xceH9\x88\xf3c\xb4\xabz#\xa8\xbb5\xd3\xc8\x9b\x00\x00 \x00\x00\x00\x00\x00', &(0x7f0000000540)='\x00', &(0x7f0000000a00)='\x009\x1c\xaf\x14\xe6\xeb\xe9\xf1\xccO@\xbd\xfc\xbdN\xfa\x93Z\x94\xfd\xc6]\xc3\x81g\x95\'\xb7\xf2\xe8\xbf\xd3\xf3\"\xf0Z\x93T\xa1\xc6\x10\x01\xba\xf0\x11\x01 \x94X\x7fQ\xa6\v\xfa\xc2\\$\xad\x96A\xd6\xdf|\x0e,c\xc4\x13\xfb\x91\xc5|{\xde\'xb\xcd\xb2\x177\x83\'\xdb\xf6y_\x10\x87\x01\xd4\xb1\x9b\xe4\xac\xf0D4\xe6v\x86\x02^bt\xbf!b\xd4k\x11\xf5Nj\x97P\b\xf2\xdd\r\xaa,g\xfc\x8f*\bq\x10wl\xe0\x02HG)\xa0\xb9%\x12\x9fx]\xf8Gz`\xfd\x00l\xe9<\xa5\xbd\x9f\x80\xa5\x0f\xd3\xf7\xc8\x98'], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000440)='\x00', &(0x7f0000000740)='\x10', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r8 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r9 = dup2(r6, r5) openat(r9, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r8, 0x0) 02:13:31 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) socket$inet6_udplite(0xa, 0x2, 0x88) io_setup(0x80000001, &(0x7f0000000280)) r0 = syz_mount_image$tmpfs(&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)=ANY=[@ANYBLOB='\x00'/11]) r1 = openat(r0, 0x0, 0x101142, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) syz_io_uring_setup(0x24, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x40000, 0x204, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) unlinkat(r1, &(0x7f0000000ac0)='./file0\x00', 0x200) socket$nl_xfrm(0x10, 0x3, 0x6) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0x1, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_ASYNC_CANCEL={0xe, 0x4, 0x0, 0x0, 0x0, 0x12345, 0x0, 0x0, 0x1}, 0x9) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240), 0x0, 0x2404c000) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x10001, 0x100) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}) syz_io_uring_setup(0x45f9, &(0x7f0000000b00)={0x0, 0x9c03, 0x1, 0x1, 0xdd}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000b80), &(0x7f0000000bc0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f00000002c0)='./file0\x00', 0x4, 0x8, &(0x7f0000000980)=[{&(0x7f0000000300)="aec59640b22bf8fc45feec467770cfbaa43492e5897a19d3b41dbb4ea97e879e060fe3cecd3eeeacccb5589943cd93f0475da6c3415e34fec653d9099548df349421aac5d79312c28ea1d4f8cc702c1b2102ba5a74fdeee3b91930a15dde6d268614da530c71c9a50371bf6df5c8d6f9ebe5466d2353b9099812b4512bc63fa8cf82150b9980788f2002d163439789798792db24b392e64ecc25e7c1610e44a11d44c9a5a171ad2c1cf4d4c12f5c2445cc104315a01b906bfb7dd9df02aa32fe562091a505b63cf9949f8c0c5973999f9f3bb3b62c24a71d09f6b06204bbefec3bfcc19fd527f2e91d673b97e477380603ced656d8f29b", 0xf7, 0x4}, {&(0x7f0000000400)="65d6772d0862e46a4295025ca1a2d62c320808302742bf08886026c3eb2ba7de04937c36f36c4e59aada2d0d5128ac3b5dc59eb29bce80448a187e581c03e7b8f9238fb92311e8aa4c", 0x49, 0x1}, {&(0x7f0000000480)="4cb589b6ec88f9b3ca40d713b7c60fe85bfe39d1930321f8d6d3ba1d5493aaf105c6dba3ee6b43790867e76a733374cd7b070d3eb5a14e224c4476ce6737477d508d373df91e2a9f6efa3f669bc12405b7a5cf0e2ffced2311bdfcd794f004343d049bc1dbadb613ebc5384a0ae000a244de1cfe11b1e4adc94dd603db45d9bf2eb2d5cae731170116a917aa752f44458c6d019226a126055863b7d03e6fdf30d12a556255cd091d70281097b48b663413044e98e196ad6eb5d8c9673ec6fc97b1b9c4c312a6db0e844c4bb4e0e07216b3e5f71820c0fc752b2eaa1ba54600f9b8103664508ef49827b427e5a667b49a32", 0xf1, 0x3}, {&(0x7f0000000580)="ac1a4997d19ef431b488eeee9df932ef9e032ef26595f638e8fb7a20f79fb3f2b00f3fc3592e37dfa3ff33ccb71d7d3acb8bf1756cfd11328f0bd5bf71bba93226d51d3f03b70107bdc264b301f7ff822012974fd7fd7f27b1e5afe102d1b13d61fc9c145e68315120d8a78968a3f9dc06cbd62d78f1ce725bc3187615e81e80b9ef36f8b800a8d79c30c3626b35059eb662608b54070b1968fe34ead681b18f9136ace80db9c6cebf13", 0xaa, 0x80000001}, {&(0x7f0000000640)="9f929f7e23d2ee6f1e08f63eb6498d1de558e4e88a79e01592ae82b13edab156a24640702e9607da5569185d180719ecd7c03a540bb55221aacf4de4a39335245b7da901efe6f40df70325b5e681451c637c8adeeda1350f84019893a537f38f650c01e859082bb6f75082647484a15fcf943bc22841f12ba263b6a73c52d7d32aef010d3c731f36", 0x88, 0x4}, {&(0x7f0000000700)="98429e19396ff72dbd718ef2ff344ba52e3943ea6ffa2b4d7c88c4e9a24c1063eead73a1eeccdc3b9b9b69fc847c7e381054da6e508d4f5aaa3b8d899cd0afc1e92ac023e2d339376606e1596227e8a059aa2c2ccd24dea96f7903ba5752e22d30c8c29b845ca79f3b2e090020208ad09d47aa32be7d748f222ed9a4fc45c951fc1c8f97d4bb286daf4bccbf0a297c81d828c559872d6895de2743932f7b8bb1b431e820009ee16bd1c186801973c21fc462060580e079b7e5474cf5523d064b0563ca5dd9d31a3b5662c40c42260f92ddd0efe2bef2f2f0cef01aaf06497e005ace2c08999913ccefc89e2c90e9c1d0553fb00652760e38", 0xf8, 0x6}, {&(0x7f0000000800)="fcf27871effbc54ca98486b52d9e9ddc3cdd3fa953b36bb0a4d97c11989dab4f943dffd8381c2483193b1a82f7d8414f3e55544369d9d7c7575c933b1def358bbdfc6a83114ef48d832661580bc3675ba0375528d25671de0ef7d8c28b8b88fd05df5d612d348be7435d70", 0x6b, 0x20}, {&(0x7f0000000880)="42c3364156803effbb3e821d27e4fcafdc83df561b188ad2d3800310a07e750d5e09307e41e3c533eb40c319b37990286e31235e2cf84a5c4931e6deec3d0938f43a689d1556a7423810aaaa6e08d11bcdd33ff478949c217f01a7628fea98024880abc18a5a5f5902c38bb32c7736b5d76d38d207827c72ccede1fad4a3a10e9c3730a1ee2258e0fb449803ada8167a051208c92fe3d9994602c0079058702273dfe2ba5aa187ab6b131fe3f99f5ac9884055a0bf29db14a43ed49edefa4901c091244f39", 0xc5, 0x400}], 0x1020000, &(0x7f0000000a40)=ANY=[@ANYBLOB='shortn`me=mixed,uni_xlate=0,rodir,shortname=win95,iocharset=cp950,measure,\x00']) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 02:13:31 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x500, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) [ 1846.483481] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 02:13:31 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0xfffffdef, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:13:31 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x7000000, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) [ 1846.569297] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem 02:13:31 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x600, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 02:13:31 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x6, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) [ 1846.649553] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 02:13:31 executing program 1: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000002c0)=0x0) r2 = fcntl$dupfd(r0, 0x406, r0) r3 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffff7}, 0x2800, 0x0, 0xfffffffd, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000500)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r4, 0x0) r5 = fsopen(&(0x7f00000000c0)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r5, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x0, 0x1f, 0xf5, 0xde, 0x0, 0x1f, 0x3006, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xff, 0x0, @perf_bp={&(0x7f0000000040)}, 0x200, 0x80000000, 0x0, 0x5, 0x0, 0x101, 0xd90, 0x0, 0xffffffff}, r1, 0x3, r3, 0x2) r6 = syz_open_dev$vcsu(0x0, 0x0, 0x0) syz_io_uring_setup(0x7781, &(0x7f0000000400)={0x0, 0x26b9, 0x20, 0x0, 0x310, 0x0, r6}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000480), &(0x7f00000004c0)) r7 = openat$cgroup_devices(r2, &(0x7f0000000080)='devices.allow\x00', 0x2, 0x0) fsconfig$FSCONFIG_SET_FD(r6, 0x5, &(0x7f0000000000)='.&-\x00', 0x0, r7) fsmount(r6, 0x1, 0x6) recvmsg$unix(r6, &(0x7f0000000980)={&(0x7f00000001c0), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000300)=""/248, 0xf8}, {&(0x7f0000000740)=""/151, 0x97}], 0x2, &(0x7f0000000800)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x178}, 0x12060) ioctl$sock_SIOCGPGRP(r8, 0x8904, &(0x7f00000009c0)) 02:13:31 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x10000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0xb}, 0x1c210, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x4}, 0x0, 0xd, 0xffffffffffffffff, 0x9) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5, r0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 02:13:31 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x9000000, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:13:31 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x8) execveat(r8, 0x0, &(0x7f00000005c0)=[&(0x7f0000000400)='\x00', &(0x7f0000000bc0)='\x00\x80C\x107\xa64\xee\xbd*\xd4o\x8a?[\x98\xf29\xee\xc7\x90\x97\xaa\xc3\xc8Zq\xf3\x91\x04[S\\B2m=V\x89\x99\x96Q\xcaA\x18\xaf\xaf:\xf1\xab\x80\"\x7f\xb3\x18\xfe\xd7\xbd\xcd\xcdIf\xae\xb5\x87\xb8#\xe1\xbe\xec\xf0\t\xa1\xf7\xa7\xb1\x9d\xc7\xc2\xf0\x02\xaf\xc4\xd0@\xc2\x12\'\xb9\x9a\xea\x90e%\xe6\xd2E\x19E/\xc6\x17gB0Qim\x82u\x0fZ\xa9\x14\xf5\xc7X\xa9\x00\xb7\xaf\xcfouN\xbd\xb2\t^\xbe&~\xa7l\xfa\x036\x1c\"\x80\xfc/\x9b\x95\xf1!K\xc5{\xe7\xfdB[\xca\x87\x9bc\x98dg\x1a\xa1\xaa\xb4\x19\x7f\xa7\x90y\x9fq\xf5\x8a\xa9 \xa6\xdd\xf0+gb\xa6g\\\xec\tz\x06\xdf\x1a\x9c\xc9\xf7\xcc\x85\xb4G\xe9\xd3D\xf4\x8c\n\x17\xd5\x00\xf18\xb3T', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000280)='@\x90\x9a\x7fl\x00\x00\x00\x00p\xc4S\x9ch\xceH9\x88\xf3c\xb4\xabz#\xa8\xbb5\xd3\xc8\x9b\x00\x00 \x00\x00\x00\x00\x00', &(0x7f0000000540)='\x00', &(0x7f0000000a00)='\x009\x1c\xaf\x14\xe6\xeb\xe9\xf1\xccO@\xbd\xfc\xbdN\xfa\x93Z\x94\xfd\xc6]\xc3\x81g\x95\'\xb7\xf2\xe8\xbf\xd3\xf3\"\xf0Z\x93T\xa1\xc6\x10\x01\xba\xf0\x11\x01 \x94X\x7fQ\xa6\v\xfa\xc2\\$\xad\x96A\xd6\xdf|\x0e,c\xc4\x13\xfb\x91\xc5|{\xde\'xb\xcd\xb2\x177\x83\'\xdb\xf6y_\x10\x87\x01\xd4\xb1\x9b\xe4\xac\xf0D4\xe6v\x86\x02^bt\xbf!b\xd4k\x11\xf5Nj\x97P\b\xf2\xdd\r\xaa,g\xfc\x8f*\bq\x10wl\xe0\x02HG)\xa0\xb9%\x12\x9fx]\xf8Gz`\xfd\x00l\xe9<\xa5\xbd\x9f\x80\xa5\x0f\xd3\xf7\xc8\x98'], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000440)='\x00', &(0x7f0000000740)='\x10', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) 02:13:31 executing program 5: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000200), 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) [ 1846.781368] EXT4-fs (loop6): Unrecognized mount option "./file0" or missing value 02:13:31 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x8, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) [ 1846.858105] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 02:13:46 executing program 6: syz_emit_ethernet(0x66, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb08004500005800000000002f9078ac1414bbac1414aa342065580000000000000800000086dd080088be000000001000000001000000000000000200000000000000000000000800655800"/102], 0x0) 02:13:46 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x700, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 02:13:46 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x404000, 0x0) dup2(r0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) syz_io_uring_setup(0x448, &(0x7f00000000c0)={0x0, 0x52d0, 0x1, 0x5, 0xbc, 0x0, r0}, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000180), &(0x7f0000000240)) sendmmsg$inet6(r2, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x84) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000001a40)={&(0x7f0000000300)=@ieee802154={0x24, @short}, 0x80, &(0x7f0000000280)}, 0x0, 0x8abb4d2a8b028460}, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r3, 0xc018937e, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, @out_args}, './file0\x00'}) statx(r4, &(0x7f00000002c0)='./file0\x00', 0x2000, 0x4, &(0x7f0000000300)) fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, &(0x7f0000000140)='\x00', 0x0, 0xffffffffffffffff) 02:13:46 executing program 5: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000200), 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) 02:13:46 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x500, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:13:46 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0xb}, 0x1c210, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x4}, 0x0, 0xd, 0xffffffffffffffff, 0x9) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5, r0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 02:13:46 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x8) execveat(r8, 0x0, &(0x7f00000005c0)=[&(0x7f0000000400)='\x00', &(0x7f0000000bc0)='\x00\x80C\x107\xa64\xee\xbd*\xd4o\x8a?[\x98\xf29\xee\xc7\x90\x97\xaa\xc3\xc8Zq\xf3\x91\x04[S\\B2m=V\x89\x99\x96Q\xcaA\x18\xaf\xaf:\xf1\xab\x80\"\x7f\xb3\x18\xfe\xd7\xbd\xcd\xcdIf\xae\xb5\x87\xb8#\xe1\xbe\xec\xf0\t\xa1\xf7\xa7\xb1\x9d\xc7\xc2\xf0\x02\xaf\xc4\xd0@\xc2\x12\'\xb9\x9a\xea\x90e%\xe6\xd2E\x19E/\xc6\x17gB0Qim\x82u\x0fZ\xa9\x14\xf5\xc7X\xa9\x00\xb7\xaf\xcfouN\xbd\xb2\t^\xbe&~\xa7l\xfa\x036\x1c\"\x80\xfc/\x9b\x95\xf1!K\xc5{\xe7\xfdB[\xca\x87\x9bc\x98dg\x1a\xa1\xaa\xb4\x19\x7f\xa7\x90y\x9fq\xf5\x8a\xa9 \xa6\xdd\xf0+gb\xa6g\\\xec\tz\x06\xdf\x1a\x9c\xc9\xf7\xcc\x85\xb4G\xe9\xd3D\xf4\x8c\n\x17\xd5\x00\xf18\xb3T', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000280)='@\x90\x9a\x7fl\x00\x00\x00\x00p\xc4S\x9ch\xceH9\x88\xf3c\xb4\xabz#\xa8\xbb5\xd3\xc8\x9b\x00\x00 \x00\x00\x00\x00\x00', &(0x7f0000000540)='\x00', &(0x7f0000000a00)='\x009\x1c\xaf\x14\xe6\xeb\xe9\xf1\xccO@\xbd\xfc\xbdN\xfa\x93Z\x94\xfd\xc6]\xc3\x81g\x95\'\xb7\xf2\xe8\xbf\xd3\xf3\"\xf0Z\x93T\xa1\xc6\x10\x01\xba\xf0\x11\x01 \x94X\x7fQ\xa6\v\xfa\xc2\\$\xad\x96A\xd6\xdf|\x0e,c\xc4\x13\xfb\x91\xc5|{\xde\'xb\xcd\xb2\x177\x83\'\xdb\xf6y_\x10\x87\x01\xd4\xb1\x9b\xe4\xac\xf0D4\xe6v\x86\x02^bt\xbf!b\xd4k\x11\xf5Nj\x97P\b\xf2\xdd\r\xaa,g\xfc\x8f*\bq\x10wl\xe0\x02HG)\xa0\xb9%\x12\x9fx]\xf8Gz`\xfd\x00l\xe9<\xa5\xbd\x9f\x80\xa5\x0f\xd3\xf7\xc8\x98'], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000440)='\x00', &(0x7f0000000740)='\x10', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) 02:13:46 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0xf000000, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) [ 1861.039149] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 02:13:46 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, r0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0xb657) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100), 0x2, 0x1) r2 = syz_io_uring_complete(r1) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x15) mlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) r3 = signalfd4(r2, &(0x7f0000000140)={[0x7]}, 0x8, 0xc0000) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f0000000180)={0x9, 0x2, 0x8001, 0x60108797, 0x6}) 02:13:46 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0xffffff7f, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:13:46 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x900, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 02:13:46 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:13:46 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x8) execveat(r8, 0x0, &(0x7f00000005c0)=[&(0x7f0000000400)='\x00', &(0x7f0000000bc0)='\x00\x80C\x107\xa64\xee\xbd*\xd4o\x8a?[\x98\xf29\xee\xc7\x90\x97\xaa\xc3\xc8Zq\xf3\x91\x04[S\\B2m=V\x89\x99\x96Q\xcaA\x18\xaf\xaf:\xf1\xab\x80\"\x7f\xb3\x18\xfe\xd7\xbd\xcd\xcdIf\xae\xb5\x87\xb8#\xe1\xbe\xec\xf0\t\xa1\xf7\xa7\xb1\x9d\xc7\xc2\xf0\x02\xaf\xc4\xd0@\xc2\x12\'\xb9\x9a\xea\x90e%\xe6\xd2E\x19E/\xc6\x17gB0Qim\x82u\x0fZ\xa9\x14\xf5\xc7X\xa9\x00\xb7\xaf\xcfouN\xbd\xb2\t^\xbe&~\xa7l\xfa\x036\x1c\"\x80\xfc/\x9b\x95\xf1!K\xc5{\xe7\xfdB[\xca\x87\x9bc\x98dg\x1a\xa1\xaa\xb4\x19\x7f\xa7\x90y\x9fq\xf5\x8a\xa9 \xa6\xdd\xf0+gb\xa6g\\\xec\tz\x06\xdf\x1a\x9c\xc9\xf7\xcc\x85\xb4G\xe9\xd3D\xf4\x8c\n\x17\xd5\x00\xf18\xb3T', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000280)='@\x90\x9a\x7fl\x00\x00\x00\x00p\xc4S\x9ch\xceH9\x88\xf3c\xb4\xabz#\xa8\xbb5\xd3\xc8\x9b\x00\x00 \x00\x00\x00\x00\x00', &(0x7f0000000540)='\x00', &(0x7f0000000a00)='\x009\x1c\xaf\x14\xe6\xeb\xe9\xf1\xccO@\xbd\xfc\xbdN\xfa\x93Z\x94\xfd\xc6]\xc3\x81g\x95\'\xb7\xf2\xe8\xbf\xd3\xf3\"\xf0Z\x93T\xa1\xc6\x10\x01\xba\xf0\x11\x01 \x94X\x7fQ\xa6\v\xfa\xc2\\$\xad\x96A\xd6\xdf|\x0e,c\xc4\x13\xfb\x91\xc5|{\xde\'xb\xcd\xb2\x177\x83\'\xdb\xf6y_\x10\x87\x01\xd4\xb1\x9b\xe4\xac\xf0D4\xe6v\x86\x02^bt\xbf!b\xd4k\x11\xf5Nj\x97P\b\xf2\xdd\r\xaa,g\xfc\x8f*\bq\x10wl\xe0\x02HG)\xa0\xb9%\x12\x9fx]\xf8Gz`\xfd\x00l\xe9<\xa5\xbd\x9f\x80\xa5\x0f\xd3\xf7\xc8\x98'], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000440)='\x00', &(0x7f0000000740)='\x10', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) 02:13:46 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0xb}, 0x1c210, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x4}, 0x0, 0xd, 0xffffffffffffffff, 0x9) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5, r0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 02:13:46 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0xf, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) [ 1861.226525] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 02:13:46 executing program 5: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) 02:14:01 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0xb}, 0x1c210, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x4}, 0x0, 0xd, 0xffffffffffffffff, 0x9) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5, r0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 02:14:01 executing program 6: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00), 0x40000000000012c, 0x4000850) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000004000000", @ANYRES32, @ANYBLOB="05000000000000002e2f66696c653100"]) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x6) r0 = creat(0x0, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000080)=ANY=[@ANYBLOB="00000000fffffdfd0201000000000000000000000000000000000000000010000000000000000000"]) bind(0xffffffffffffffff, &(0x7f00000002c0)=@can, 0x80) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="00b1e13559681147000000003fab060008", @ANYRES16=0x0, @ANYBLOB="08002cbd7000ffdbdf25040000"], 0x14}}, 0x448d5) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x40000) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) ftruncate(0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) fstat(r2, &(0x7f0000000600)) accept4(0xffffffffffffffff, &(0x7f0000000200)=@isdn, &(0x7f0000000140)=0x80, 0x80800) sendfile(r2, r3, 0x0, 0x100000001) 02:14:01 executing program 5: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) 02:14:01 executing program 1: ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000280)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x5}}, './file0\x00'}) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r0, 0x80605414, &(0x7f00000002c0)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, 0x0) fallocate(r2, 0x0, 0x10001, 0x100) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0x0, r2, 0x2}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) getsockopt$inet6_mreq(r3, 0x29, 0x14, &(0x7f0000000000)={@private0}, &(0x7f0000000340)=0x14) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000080)={'TPROXY\x00'}, &(0x7f00000000c0)=0x1e) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100), &(0x7f0000000140)=0x4) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) r5 = accept$inet6(r4, &(0x7f0000000380)={0xa, 0x0, 0x0, @remote}, &(0x7f00000003c0)=0x1c) socket(0x3, 0x2, 0x0) getsockopt$sock_timeval(r5, 0x1, 0x42, &(0x7f0000000200), &(0x7f0000000240)=0x10) r6 = openat$sr(0xffffffffffffff9c, &(0x7f0000002780), 0x101000, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000002740), r6) 02:14:01 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0xec0, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 02:14:01 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x2, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:14:01 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:14:01 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="3400000010000100cc680000000000000000000005000000000000001532336740e46387f800008064dcdc6ca616ef0dd0179be149f83265ff000ad022cea3b5906ed71efbac71604114ae634a1d3f5b42332fdb1ddff6c996d594f336ad93897a4c7c7d052c951ff3b19a2ae8dfe7daae4433b91e5be24f079e43a9066a68a1d63857237b3704f14d41e4376c1319a3cb91015718c602f3acaab637ceb7852dafdf71f385cfa97aa0b4888bc38b88bda6372e3668ad38b7f74f5579af15595a0c30e5611c48d698f5ab174fbc688112a84b0e6b16587fe1cca80147b9e1c0f1ed5b30c723ba82fe7b97990c195cdd6e5a3ec6986122d762e9182637b26db43c9871a7e08e00a222e27bb9eb35ce4745ffeda794f8f9b433cfaf77a5c151481692b680c9217e78cf5b4a110e4cf58a2481900e9ee69cdf0b73241206255494d36aa01416f7d0d0620f0b8526ca8484f212079b26fe05a315317995f2e147c5246ec242cda7921facafba1cf981b778d7b9333c9f88b53bf8b3a1c472d9869179a5d75ccaa1fa65e00d0b492e89e54f4d9ef4d61d2d7315ac264ed102185b46eef868a43ff0c84a79ac7dedfe21843442cfa03ab8fdf2c4a9967b518d211ddceeca7cce24735f1daf18a359c87c7c89a2011187f1b8d95f288434370c44a92d4dda3151ae0c5bb732e4baa5994bbe49e76eb2277e38c8f867d4a099cb00d9d38ca7bca38999cd3fc3b3ecb356302feed4b34c"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x8) execveat(r8, &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000440)='\x00', &(0x7f0000000740)='\x10', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) [ 1876.837378] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 02:14:01 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x3, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:14:02 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0xf00, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 02:14:02 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0xc0, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:14:16 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x8) execveat(r8, &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000440)='\x00', &(0x7f0000000740)='\x10', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) 02:14:16 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = openat2(0xffffffffffffffff, &(0x7f0000002740)='./file0\x00', &(0x7f0000002780)={0x80880, 0x0, 0x7}, 0x18) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), r2) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) r4 = pidfd_open(0x0, 0x0) r5 = dup(r4) r6 = syz_io_uring_setup(0x21, &(0x7f0000000080), &(0x7f00000a0000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) r9 = io_uring_register$IORING_REGISTER_PERSONALITY(r6, 0x9, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000000280)={r4, 0x8, 0xfffffffffffffff9, 0x5}) io_uring_register$IORING_UNREGISTER_PERSONALITY(r6, 0xa, 0x0, r9) syz_io_uring_submit(r7, r8, &(0x7f0000000500)=@IORING_OP_FALLOCATE={0x11, 0x1, 0x0, @fd_index=0x9, 0x80000001, 0x0, 0x2}, 0x9) syz_io_uring_submit(r7, 0x0, &(0x7f0000000580)=@IORING_OP_SPLICE={0x1e, 0x1, 0x0, @fd, 0x1ff, {0x0, r4}, 0x0, 0x2, 0x0, {0x0, r9}}, 0x10001) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITEV={0x2, 0x3, 0x6000, @fd_index=0x1, 0x6, &(0x7f0000000040)=[{&(0x7f0000000380)="a685a8cccca840447491694a8578b3499fd49d933b2f69b035705d17c3183a5d5021124e728812f310e17788bc994fdba720286a1133851414e5dd08014b08cd4d35feb12e0382de29399ed5c05ef4c02a0956621d96a0a1fc8a2029d6b2909ec71685b57dd050196facbdccc039abe9a36c2cf2fc61666a29111a5aef67d283a45172fe45c76e0c74ae", 0x8a}, {&(0x7f0000000440)="34dae567dfc35c5847b999d4164d1346f9c4182d0b87c50b6158774419a65ca870d41177675e77fb277060c9ecaf06c459243b5afd373def75f5fa25c65ede00edecd1aa1ccc91fdddd9ba6f591a9916bad75cf1cfc1eed79dddab45d5c9890b92a65f51438e7a6aa8ccde4cf83f33b7277e626cfa02fb61cf0415bf34eb08199af87df91dec75a5767dc5e077b010e21b86e8150a6dd3e9414d74352bfe190f7d0e650ea51ac1b799d50cbb2896bf0b9ef758f7ca9c156aa8a59488d698930444d2f27752104d5dfdb4865c45c212ba9458b2a3443e72019b1a259a4d42203ed19b02ab11687b903c89b30db817384464f959fbfb128c", 0xf7}, {&(0x7f0000000640)="6d51c5d45bb22fcb010bea8b076025478f895afa7643a61770f34e2c78e432decff0824bc3ef307351801343cefe99a5c8be849d078233efa548d3e78dd9bd34e6f0cedd483bbba79a7bb0b7def2d8a7ef40d9913b0c416d19ecf8f3aecd2822299bb882485cd171f923587b973091025138965d846c43916a5f9d3dd36c6f32214f64664ce8c33761ecfd2e06403f4f4d6398ae37098e7be0a047f556afe18bcf3875febc8f46787d0acc221e629f6def36949b879b3723568fee3154c0662479fee1acd385719e20647efe4a7f8f4a55c3", 0xd2}, {&(0x7f0000000140)="b315ce7878201fdcf59d422818c58f478b6ddef78640d879a16b4c4f95f8650638782fec23be60db04a3309a948440d3d19440a07a246623c0908ce6522eced6a6bbfc18360a9cba0ae20371c92730bbd53767417a4ab0490e84d4db5a10ab227580ce3b6705", 0x66}], 0x4, 0xc, 0x0, {0x0, r9}}, 0xd29d) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000000c0)={'wlan0\x00'}) sendmsg$NL80211_CMD_START_AP(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x80, r3, 0x5, 0x0, 0xfffffffc, {{}, {@void, @void}}, [@beacon=[@NL80211_ATTR_BEACON_HEAD={0x28, 0xe, {@wo_ht={{}, {}, @device_a, @device_a, @from_mac}, 0x0, @default, 0x1, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void}}], @NL80211_ATTR_HE_OBSS_PD={0x1c, 0x117, 0x0, 0x1, [@NL80211_HE_OBSS_PD_ATTR_MIN_OFFSET={0x5, 0x1, 0x23}, @NL80211_HE_OBSS_PD_ATTR_MAX_OFFSET={0x5, 0x2, 0xa}, @NL80211_HE_OBSS_PD_ATTR_MIN_OFFSET={0x5, 0x1, 0x3}]}, @NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_DTIM_PERIOD={0x8}, @NL80211_ATTR_SSID={0xa, 0x34, @default_ap_ssid}, @NL80211_ATTR_SMPS_MODE={0x5, 0xd5, 0x2}, @NL80211_ATTR_EXTERNAL_AUTH_SUPPORT={0x4}]}, 0x80}}, 0x0) r10 = syz_open_dev$char_usb(0xc, 0xb4, 0x8) fcntl$setstatus(r10, 0x4, 0x40800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getpeername$inet6(r0, 0x0, 0x0) 02:14:16 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x4, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:14:16 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/cpuset.cpus\x00', 0x42, 0x0) io_setup(0x2, &(0x7f0000000140)=0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) io_submit(r1, 0x2, &(0x7f0000000300)=[&(0x7f0000000180)={0x0, 0x0, 0x5, 0x0, 0x0, r0, 0x0}, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2, 0x0, r2, 0x0, 0x0, 0x9}]) creat(&(0x7f0000000000)='./cgroup.cpu/cpuset.cpus\x00', 0xc0) 02:14:16 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0xec0, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:14:16 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0xc00e, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 02:14:16 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0xb}, 0x1c210, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x4}, 0x0, 0xd, 0xffffffffffffffff, 0x9) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5, r0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 02:14:16 executing program 5: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) [ 1891.663246] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 02:14:16 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x5, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:14:16 executing program 1: r0 = syz_io_uring_setup(0x132, &(0x7f0000000180), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_WRITE={0x17, 0x0, 0x4007, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000540)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x2}, 0x6) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_io_uring_setup(0x0, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_STATX={0x15, 0x4, 0x0, 0xffffffffffffffff, &(0x7f00000002c0), &(0x7f00000000c0)='./file0\x00', 0x800, 0x800, 0x1}, 0x5) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000006, 0x20010, r0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000440)=@IORING_OP_FSYNC={0x3, 0x1, 0x0, @fd_index=0x3}, 0x7a2) pipe2(&(0x7f0000000240)={0xffffffffffffffff}, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000001c0)={@private0, 0x6f, r4}) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r3, 0x89f5, &(0x7f0000000000)={'ip6_vti0\x00', &(0x7f00000003c0)={'syztnl1\x00', r4, 0x4, 0xa1, 0x7, 0x8000, 0x8, @mcast2, @empty, 0x10, 0x8000, 0x800, 0x3}}) fcntl$F_SET_RW_HINT(r3, 0x40c, &(0x7f00000006c0)) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r3, 0x4008941a, &(0x7f0000000040)) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x80004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0xffff8001, 0x0, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000480)=@IORING_OP_READ_FIXED={0x4, 0x1, 0x2007, @fd, 0x8, 0x7, 0x9, 0x8, 0x1, {0x1}}, 0x0) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 02:14:16 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x33fe0, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:14:16 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0xc402, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 02:14:16 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000640)=""/186, 0xba, 0x9) readv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)=""/205, 0xcd}, {&(0x7f0000000280)=""/130, 0x82}, {&(0x7f0000000340)=""/154, 0x9a}, {&(0x7f0000000040)=""/16, 0x10}], 0x4) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') pwritev(0xffffffffffffffff, &(0x7f0000000600)=[{0x0}, {&(0x7f0000000540)="b68bd2c352e4e28c62ce35d35ce977efab94b5b114d19604", 0x18}, {&(0x7f0000001e00)="cf85aec236f054499f6dcd7eded77cbb9bb3b3e004a151683e534ba756e8ded8183c272f7805f4e46302841dbe248f782fbcbf6f83da95337e779798b956a7627877c6bac80c2b1941d49d556c8b7d082b9e7d84543f5775de450bc4aef59972152c7b85d9e930718124af984aa27127cc65f3e8cfcb083fbfb1a59df57602ca1d6ce1c51eabbbf4a131b7661efc78f5bbbcec90386655529552621523224386dcc5a70624414102d3ca1fdc2a472c7c764db778f3b1e377ca457360003d173d82344c863021f60c209efcb67e4d8f82e1ef7e19bc355de6183805263098cb82af68d8ce18c5bcbf7a308df9a8122be4f7477f8d39c9e9fc663e0ddc287ced2d9a863d958404bb89f60c897603e89a1202ab4ca3a7c3e52fbf576b36eda6c39b8aa2e688caf1f320f0246167bbd6c776ec9bc291f9d43d6542ef55050709706490adc11688b67d931a33dbe466c1ce382f3fd8dd9191feb4cf66d787ef8799e1ff2223f612f60a778ca90575618865281d962c53a079bb10b501558f855068abbda50d746763c935c03b8f93b6d5868761eca2a264108535818d7725ae9f09eae53d2d407b0574cfac23a8bf94c7324853707b1e72357867c14022f168bdfa7606ee7aea10bcfed6ef4502cd6ee831b70e7f3c8a663d8020f78b96cdfb74cab1f640496913db1c8401a5410820302655b0d98c78c61da03398030d910bc3e3745a3aea876de5d0092991075921eaff50b6b64be08f83f0f4e8f18b94d32e268ebed8442f16e1df304e228c5ce00ea78719921147be38f9f8f489766af360614c18a5c0da4884a700b827d1e268d53f43c17a24b1c11d6c2fa7eccae0c7cb1d9dbddd020ecde6db9e219ce5b65e6c433594b2022897635f48cad7515b5e3f617e6544c5a558945e1f133a1e14b415c997677c15914ffd9648ac57d449e95d38ffff28a66bae8f2ac7091ee3e3b12ba8348963c28180d37b5314b8e757b52d394875cff55407a3a6fa8c70d96d93d9e4c6dcf9d649b619fcbd8894e2f84370b24e23ef445a3622312152aff1b4ca736a866ee3d182cf682db1d763ba652b64b6031b57dfb0b9082073feb8df37d837405ac211b2de39505d9b4e9cf2079739278184023d7b0286901093e5a70ae263b0087e3cf1006574c8f7685448bcf4ab9156eff2602a0d7af7742882821e7c1f4458949732faa331810d3fc503fa5e5602dacafe0fa8b57ca6623b3162cdc962de20490a81aad2b3159af68dd3d25c2107ced77b3bcd1a8b844f6d2b3f0c3125b54d1927d5bf7a96faa00f683f251e25795a4529929e47cd90b17c883c3a0bb796683fd70538fcad44f92de0a6d26b4b0da756ac59d4778b4a07fd192d48e01a5657dfa22296cec3b45bfbe1005ebdfb85a16bea6e3ead804fbcf8182799cdcaf8133ac691a86bbb57b3afc9d5a053d35e50c49b234d884438dad480234e2c5ead0973967552e5326fe1b420a947f5d2ae46483dfcc39b37274de0516960efc8f03600c08da3b882a7889c29b3a37fac15a649c8a505db81f8c99ca95c68ec1b00412f7b6a2647adae907736148de260949f927f1fa0e0743aaa9e461e25e45ea6b99115df9f2ca5718e54c7c635fbeff19cf88d3a978cb1e363bc82e9b3e004a92060e9c3f905138379d9e396326d9272cdf3da011d432197b2c7e04aa7fa5d693ad469da54bbb4fc379e466804062855534642e6d31fd74c66961297043eae80a15a59d5f138d6d415de4e758c874198bb9ba4487b2a2de3c7961af5b5738793ec1e817bbe3b44c8fb14cc6111f706caf83be1314038958360d292ad86cbfc07e8b3861da42003974c92bcd7d87b66a622d869eb7df68c2cfb528e8d3c21d9998a401f86b2dc97f5afe1c349add1a1161426451bc3c6eaa4f9378edd7d17ea3283891a4a756e0933d02d570f88cca31e1c990f2c232f6821ad48576eecc523bb57b1455d58f03d108846904db55e0cdf2bbbce91e126bdb60474fcd2a899acf86fd8ea8d9f0b54a94cb8043fde5e725b9813c013d074fd88acfb5c021352b2eb066426d4a54fc52ed677cbdaa9fefd383339e41290d16217386900143167e4499e5dc7ecb886357242f369e5f326467d571d9526ef7cbc2641411d5ba6b13d8fb1e37164c21125cdf22fd54013daede2d816b11fc38bcbf6458451076cc88d6f09cf411a2ded7d8eb041796519d1d8a35e950d5b942f6b0a9566c004b7f3d1bd86c5fbffba41aae828dd52ec4b38a67b0574af5d34332b54eec8095c1778cab551dbb7ee867f1d9e53c30c2e3050763af61fad68d3baa6e4085050a53be679ad92b30e6112559e49d6cdf19e63bf746a0394ad08f890188af1dab0f13d7e4f42e0ec49724a64cd45522d279f5154ae5341377eef6921041e46f6146d2bf95fb48a147de75b7e238d00e20fe9e573e6527e8583c6b41a896fcd1c96f0bf07a4b6c94918843f3642f16bff2f3610215881412c985f786a69982ec5dd1cc5f8cf67dd40e08f2c0300350025d750c939230b838be58fa7e4a8d795d27a7d3a714327b742f105db778703948ced550d951ee0b54cb61439053ae324c3d87da4c8517afeb86afe936b0380e9e3db4d8cf98b8d592b0d762ae724717e43d30760d3cb939986ef6d9979fb2768bb291a531d42c2f1330cf8261b027e71e67193fa2c585eed7d3c5288d652f377c4272821a18d9c86fc9f8c579e829a9c645b2ec03c58feaa231b60e58f86c86cb4235ec2df95646826070c383508c77de10ba4b73c8732dc5c82f45e7355d44b9d059d3acf187c4d9a40a116c39fd0d65750fcaf092e3d03c3e2dcb7f22b12b65d6a4c4ecbe7cf7297dbfaabfcec476568d2d7cfbc19c8592cba386bcd14b6513304bb7b3753687a9d54b004298bad315c28eaa27c242a70a9608bde6d127f4f60ad237b38a977609b5581d63d8ec06c95a01ebdf2debd3e7d386f9a6e777dd78ea8cca4eb45a99893df597b4f9245c1063f81fec9893d71ca8fd08750b516a15483e7e24eb5a4a94aa5b2f9647041acbac296e3e08d4c92324d3ae6a3a9b3c0ea4c8b64d3d0b7f3fad8d181f3e0e75938c9df1bf25f136181fb5acd0186ab78ee51a66766b85d735a804f9311e3749076103ad68c94e63f20148d8b56d45c8b8a0f3cf42d767e518ac455ae04575e259b424083b47cab2f5bfb52f7b50d769ec8f5b4bc237332d1b1ccdb6dcf7d1cec674ea8ca9e0dc8bcbb09255e79413f758c08232c7e0f5bffd81c23596feb5aac66a130b5dbecde7cf885af2e27b78b9041460e5e89cea2aff46f15a568dddf9be6506c2b20ef73c0792094b7192ffabf9ccbb140157320e9d7ddb1d90407a642b4ab6ec4745222e978230b5c7b85926b995709ba22d50cc9565937b430284ae91bd2be5825756ce69a50802a806804cd9910cf2c01c14399484687402087ce779868f053b64dce6f5df96b3d8574cacb348555d8a780b83e6ff72642f17305ee4bf6b17a32f952e463c719c98f394c2fba906458194f861a4b183ba88ed44543fd1d09684d8c64fc8edc4d2b01f8ce224cc463e2105102a7cee753f17950a9daf9f6b6f114221e56ed11b16af397ead010c611875f0276eec3c8425b6641bf208031bf60b4b0ecb782cc7a96af4437f7b103dc00cd573978bc999c73cef88de2e03df5188dc7d26692d02607d17a943d06329f3812f0620b9c74cc91a461946391739b6d59ddcc4ca30f487eedba58d9477026a618dccdc03d292735e729b6ee9383f985df4c45b529e137a4c7af78ab973f4ef6029cd6083b1c27beb941d4996eb8cdc20abf00c0d1b7e0f6b79d5e5c1f650ddb985fe6624fb775bbcfcb36d00bb6831f61e5f182cd407f76f708145a7132d9ff2fd7a39c8a16c07e39d0e506f2517445e666e1b86886ffde524194308f8882dc39047f5fd4605e410ce85106ec2ce0564123b384a329b5557724c8982ba05d1ca9729678d73ca5c34e682860e14a9c9e1c464197035054982fc3cc492fbc25edd63202767cd77b7fed0d69d33af286907c788795740f905180449655d895f9198bc09983326d3ef684ed67fb8caffc3d46dbac1e14c2d245d3e3d7216bb5a0197db5dda568c669b76a4866be7a78250292f658c546ed584fed73b9f834a2e2835482fc39253e879f81a64b5efb046a6fe6755d5029d0d441edb40070651ff8e2352aa8d79d8291e4fd5de013078e2a812ebb495e865b13f1416136cf271470a6f56eae48db04f4b09e42f22f2c2f8bfe759cbe3eed0a4041e63d9e7f17c27d760629ff2afeefc61f6620b82d9980db382a0874dd58409de4b5d6b4858b420488d7f962237bc96ba6c87d13148fdd1a9016fb57f940f00634fc9b98e2f145a3b6eda2608daf3ef9e26d7506ca66392573793a2e9153ca037d77bc30b6989ed497e27f20567dc7000aa2291f8f4c8e860e3caa168695e4d8328d6ebd77c19d365c40bcc970e6571d3986920357522b1554c96a6d5f72e35d18fca13f18c15678f35acb6f155ee26026487a559a352aba6f4a27e88e0a4b46591a15e452919a3c7d5f4880fac5f56178a2821792e4008d52c002774ce6e6017f9f563728842e34425dfb7c8788ae91fb1af84fca53219a50f23a23d82a13a8bc5f16ed896e7b268d9b4ca4f95a14c9fa82bbd70d37e484883507e9d1e2dfe67ebdc57dd892a65b7498106ac494cefc6cafeca7bf3c0f62666dc97c2f63fb4063afdcd7844768dd4968b998e10f016f3f05e1a28a33658a891dcf5ac914af1d4b2402a59552e8165f78f99a03f1b10b0f66c9c21ce278f516bb9503c37f321d782f6bc14b2faaab2f81d223edc23aa7279bb5cf9fc25e3c53a28153cdc03af04cfd53db32147818ec87cce1e936ed624b2665757a0a48e7f56ce261e325ef34e06bded02e2f2f43462fe3aa1bfc4942cb46811170018ed883580c6695bc973a345b79a4834885190b079da7e0124f9d6bc70515b2a0aa31c739b6c1c274e0fe7e6ed3f0846c35a4efd2ee744817b2b32a63ab75e88ed9ea0c03f99dcdca2f56b6ae832c3d2c30c7b9b2dede875473c3e3dc9dd88567bc278a30e16ff01fa7bf3dcee5bbcfd4adb557d51c11583358abdfa5a10c04b4d26653e626f786eb5043567da460b94cb0dc91b21cfa59b9dbce836cdc2f3e152e204167ecd6f2438e96c1e61a4e4e5ee700cc101db87f8debd9e5f5427f50284a3bc12bd8cb63dec96fa3c23398c0e465152af6030f030bb91d5dc1031d416c3aeb9127b55d34b4396bda07561c0d18dfdfc9748c38deab25f9d60a8a6e1dbcb53e7ff045693fffd47bd03a04f8d20e38ea183f227c4dedd9d1c0c75ed1f6ae5ed9e37574fc19c370689a0c071dd609199e8b93a8cc20a4d50746f9c46d26ae27a5ef16bb7c7e945e0bcd3f47fe0683cb564a5483f362c22ba7f838c616103dba8287bb2a2ac56d55f2633a13c55db39cff8585ac68f89fb0a3d9351eb00ef16efda892f8f43c6bdc140bf6922b7b7fda6002a08a20529bb44ac61154b1989dd03811989ceddc389f598c48eab5c2e471a3b852d1b16bc040fb45ad8dda8b5dc14e6d958c4c1b7bcd4e88c2cdc7c6b80694a37ac4badb654d08748565bdcb266fef32f951cc24b2280541606699702a8299638ac1b94ee6bf49d1a3c973fe850ef59a5f7850b810c89e2941ccd69ec867e5c05213332c7aa7fb168609a3ba314a8c8c9a93ef3d88dd25cf14a291e56fc74a60b0565e330726bb8e008181281ff00e0a6df48cf10fd8b67224caf29c55f26dd4d2c1d679", 0x1000}, {&(0x7f00000005c0)="514e50b7ff945c4eaf57bb19affafd600372dc495e9557c58a24630a3d140bc0ba684fc5", 0x24}], 0x4, 0x7, 0x0) preadv(r0, &(0x7f0000000580)=[{&(0x7f0000001380)=""/213, 0xd5}], 0x1, 0x5545, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) socket$netlink(0x10, 0x3, 0x12) 02:14:16 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x8) execveat(r8, &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000440)='\x00', &(0x7f0000000740)='\x10', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) [ 1891.903864] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 02:14:17 executing program 5: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) 02:14:17 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0xb}, 0x1c210, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x4}, 0x0, 0xd, 0xffffffffffffffff, 0x9) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5, r0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 02:14:17 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x6, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:14:17 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x2000069c, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:14:17 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0xf000, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 02:14:30 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) socket$inet6_udplite(0xa, 0x2, 0x88) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x6) io_setup(0x0, 0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffb000/0x3000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="7f454c4600100007000080000000400003007af2f374542c8ad8ab4a6c1e9e6934567da29825c8ac03f7ff0d6f480fa66f8d0335b95241a9e9acfa47a983be89edd3d1c426a165acb5ab5eb841a97e7a4abfc377ae45285da3da542431fd03e207a5390f35c62704cc5e62449fbbfe49be3ec427e30eb247e4c1f6331ec07d0b03d8ff4e287e3e5128d8fd42b0598a4b894f2dbf257efa1b96f4833e7bb1ef6f904b79cf791f9cde70744c16a6ff1d81563ad29969628886866cf5ba8eb93e7fe821da12cc1201a6f12a1d5581e88c3390fdb8879a166708f2"], 0xaf2) close(r2) clone3(&(0x7f00000001c0)={0x90040180, 0x0, 0x0, 0x0, {0x40}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240), 0x0, 0x2404c000) r3 = open(&(0x7f0000000080)='./file0\x00', 0x88000, 0x40) pidfd_getfd(r2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000140)=ANY=[@ANYBLOB="000000000000000918000000", @ANYRES32=r1, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00./file0\x00']) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) futimesat(r4, &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)={{r5, r6/1000+60000}, {0x0, 0xea60}}) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) creat(&(0x7f0000000340)='./file1\x00', 0x180) 02:14:30 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x8) execveat(r8, &(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000400)='\x00', &(0x7f0000000bc0)='\x00\x80C\x107\xa64\xee\xbd*\xd4o\x8a?[\x98\xf29\xee\xc7\x90\x97\xaa\xc3\xc8Zq\xf3\x91\x04[S\\B2m=V\x89\x99\x96Q\xcaA\x18\xaf\xaf:\xf1\xab\x80\"\x7f\xb3\x18\xfe\xd7\xbd\xcd\xcdIf\xae\xb5\x87\xb8#\xe1\xbe\xec\xf0\t\xa1\xf7\xa7\xb1\x9d\xc7\xc2\xf0\x02\xaf\xc4\xd0@\xc2\x12\'\xb9\x9a\xea\x90e%\xe6\xd2E\x19E/\xc6\x17gB0Qim\x82u\x0fZ\xa9\x14\xf5\xc7X\xa9\x00\xb7\xaf\xcfouN\xbd\xb2\t^\xbe&~\xa7l\xfa\x036\x1c\"\x80\xfc/\x9b\x95\xf1!K\xc5{\xe7\xfdB[\xca\x87\x9bc\x98dg\x1a\xa1\xaa\xb4\x19\x7f\xa7\x90y\x9fq\xf5\x8a\xa9 \xa6\xdd\xf0+gb\xa6g\\\xec\tz\x06\xdf\x1a\x9c\xc9\xf7\xcc\x85\xb4G\xe9\xd3D\xf4\x8c\n\x17\xd5\x00\xf18\xb3T', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000280)='@\x90\x9a\x7fl\x00\x00\x00\x00p\xc4S\x9ch\xceH9\x88\xf3c\xb4\xabz#\xa8\xbb5\xd3\xc8\x9b\x00\x00 \x00\x00\x00\x00\x00', &(0x7f0000000540)='\x00'], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000440)='\x00', &(0x7f0000000740)='\x10', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) 02:14:30 executing program 5: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) 02:14:30 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x7ffff000, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:14:30 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x7, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:14:30 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sockfs\x00', 0x4000, &(0x7f0000000000)='\x00>\xd7C\xbeom6%\xe2\xb1\x8dU\x93\xd3@\xe0\xe2\xdaJb#\xadMGxb\xd8[8\x16\xff\xa3%\xb1\xc3\x8b\x99J\xc2\xf5\t\x1b\x97W\xf0]\x97842') 02:14:30 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x34000, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 02:14:30 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0xb}, 0x1c210, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x4}, 0x0, 0xd, 0xffffffffffffffff, 0x9) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5, r0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) [ 1905.473034] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1905.518693] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1905.586866] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 02:14:30 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0xfffffdef, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:14:30 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x8, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:14:30 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x8) execveat(r8, &(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000400)='\x00', &(0x7f0000000bc0)='\x00\x80C\x107\xa64\xee\xbd*\xd4o\x8a?[\x98\xf29\xee\xc7\x90\x97\xaa\xc3\xc8Zq\xf3\x91\x04[S\\B2m=V\x89\x99\x96Q\xcaA\x18\xaf\xaf:\xf1\xab\x80\"\x7f\xb3\x18\xfe\xd7\xbd\xcd\xcdIf\xae\xb5\x87\xb8#\xe1\xbe\xec\xf0\t\xa1\xf7\xa7\xb1\x9d\xc7\xc2\xf0\x02\xaf\xc4\xd0@\xc2\x12\'\xb9\x9a\xea\x90e%\xe6\xd2E\x19E/\xc6\x17gB0Qim\x82u\x0fZ\xa9\x14\xf5\xc7X\xa9\x00\xb7\xaf\xcfouN\xbd\xb2\t^\xbe&~\xa7l\xfa\x036\x1c\"\x80\xfc/\x9b\x95\xf1!K\xc5{\xe7\xfdB[\xca\x87\x9bc\x98dg\x1a\xa1\xaa\xb4\x19\x7f\xa7\x90y\x9fq\xf5\x8a\xa9 \xa6\xdd\xf0+gb\xa6g\\\xec\tz\x06\xdf\x1a\x9c\xc9\xf7\xcc\x85\xb4G\xe9\xd3D\xf4\x8c\n\x17\xd5\x00\xf18\xb3T', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000280)='@\x90\x9a\x7fl\x00\x00\x00\x00p\xc4S\x9ch\xceH9\x88\xf3c\xb4\xabz#\xa8\xbb5\xd3\xc8\x9b\x00\x00 \x00\x00\x00\x00\x00', &(0x7f0000000540)='\x00'], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000440)='\x00', &(0x7f0000000740)='\x10', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) 02:14:30 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x80000, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 02:14:30 executing program 5: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) 02:14:30 executing program 6: r0 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000000)='cpu.pressure\x00', 0x2, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000100), 0x400, 0x0) poll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x3e1}], 0x2, 0x10000) r2 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)={0x24, 0x1a, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x8, 0x3, 0x0, 0x1, [@generic="02000000"]}]}, 0x24}}, 0x0) 02:14:30 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @private2}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in=@multicast1, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x180, 0x0, 0x0, 0xffffffffffffffff}, {}, {0x4000000000000000}, 0x0, 0x0, 0x1}, {{@in6=@loopback, 0x0, 0x32}, 0x0, @in=@multicast2}}, 0xe8) sendmsg$inet6(r0, &(0x7f0000001b00)={&(0x7f0000001980)={0xa, 0x4e21, 0x9, @local, 0x5}, 0x1c, &(0x7f0000001ac0)=[{&(0x7f00000019c0)="97b96c8a2f24f2dd48c46571c6307a92673ec038b71c5d33dfda6c2a77e1036c4663c8b0efb62d35ebd3981c4ef49ffc1d93a901502fa302b0f9952b0fc4eb819f93e937cd7859bcc304834192d76efd81a18b299d1deac16a14d34b6d8877479275f5c6cd148aa1783dd56e86b477e9e4b8840894250cb253af00ec2b81b35e3c9ed0ec2159b8c68b2f34b77532386143b3352977b8e1b684d6d6", 0x9b}, {&(0x7f0000001a80)="8f5be9f0809314c258cb8a345760b6ceb0c3eb", 0x13}], 0x2}, 0x20004044) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0xffffffffffffffff, 0xffffffffffffffff}}, './file0\x00'}) sendmmsg$inet6(r1, &(0x7f0000001900)=[{{&(0x7f00000001c0)={0xa, 0x4e20, 0x2, @mcast2, 0x1ff}, 0x1c, &(0x7f0000000640)=[{&(0x7f00000004c0)="e950d97ab0bc7a652e0cdec9c238efa52a8fccd09a7356fc837fc117a43d5b948590744229fcb724a49d2fb9ee4106e7b5df00eeddf8b0367b989e40955adbfd83f7d9554d889b7ccf8479fd3b811f0224ae314ef4a4a5c597ab998c3b276768ff85c0c8b7165754503a83605c719cd8a59655c5a704f5ac32cf8ab05215e5002d8899", 0x83}, {&(0x7f0000000580)="f96f4b307bc9c5238d1826370492d7d5a7a1953c5b9ee79ed4f3c83d72522a873f44098417e36a95544d236f883fed96d0eddd7404f309297eb7ef5459163ad0613754cacb66f17dfa1ff9c6172605aa65b19780e352fcc0d7160e853abc51ad29edde6dddbca097d850c01474a3497cd1e2bc5b1c70d41e70f75dacba5c00d9b0a119b1cd2adc9b092ca869819f709bbdcc3693700f7b3f363625", 0x9b}, {&(0x7f0000000200)="939d5ca785e93696ec5a09f09b970322d141d7fb2899c1943ef69a0bcc84f07b02428ac10290aa2ee8fa83aeccf9cf96818b386909706db4aa305224836af976e6cba92a6b185c53a954fb086db06343b0619a59a598b478509e275e573c397bdc731d05c4ecf8efd1c1a48e", 0x6c}], 0x3, &(0x7f0000000680)=[@rthdr_2292={{0x48, 0x29, 0x39, {0x88, 0x6, 0x3, 0xf6, 0x0, [@remote, @rand_addr=' \x01\x00', @private2={0xfc, 0x2, '\x00', 0x1}]}}}], 0x48}}, {{&(0x7f0000000700)={0xa, 0x4e22, 0x2, @dev={0xfe, 0x80, '\x00', 0x41}, 0x7}, 0x1c, &(0x7f0000001800)=[{&(0x7f0000000740)="79135625d24cd0c84b0eee280315122d690593a5db1b78e2efd619c6d8f3296135b8b5ff8ea91c734793ac833c060b103c57d786362bac5f83b2ad7f9fe5fcddfb20e7f9d0ce508a216bf2c7c0e641d28985b11c0a6f8f7867315b445c089fae0ffb1140bb3d8a2a8516897eb6c37d6cffa6738053fcf06676e73930ec99d57db4503b94e93cc72caa2d2f009004e88198e1f38c3f68853ef6d452a2ba5685dd3e582a17748daa989d622c8d4aacbf278508c5c152277f4a47b24bd77fa24bb2adfadcfd72c997f2fd2dbd888c1738b45342c8ade5168f744bc443a3e4b513ee2f9dda0f840eb25cf02d95f40ba7329b3a865743cdd81f642edbfb224c0d6f16e54fe53103643081068cd282b86c105209eb6681ac1290da4c62f159bd5862369cf244813cab095556f3ca22ef56ab19b68ecfefd0f0e1703d13fa9e01372505d7547ddc309bdd43df6605aa4076fc0b6336dd39a7fabb2ef8fe27935f993702e7fd29fa98dc524bd483a23062ccfffc5bca5711196cdfa3db52406519c0f025d68145e41c10c827fae7f6b46f23d0fae099bccf3246e44c15e0c41c5b99f584189b04c4ce1664aed8b8699199546252622ed42d59fe4fac2848911487ce5b8b21559e474c8b9188bab467f607d1c6ce1da771c2c81bf4030b598067dc871fa565b685780f806f340dff3d93410b146a2b6818b783a1147649e81d66b6af36600baf50e346489b58b2cad97e6ada0c38a3ef1e09025eb6c4b154f182516c3a9152ffbb26bcd123d1bd93d50a9306f0a94b05725d8766cdad3af8e88c545e08983cb8c0ae9fe9ed41a29a3d7af5f0e5715830823a6b1c650e777b809cc7ca42751fb95bb08577c2063de6272ba871c6a1077ba3041610be4122ee4a7a238c2e34b510cae5bb35df273788d67d6c25d02c7cae077c0fc8704cdaa866969a6b01cb1bc8928d9d82d005b807a884029c6c7e0acab80f335d8fcbe033fdc5993803724d736f906be428d4c2b2c647d8043b5b3194d6f2433df10870f3e45490dd4e7b1e583c5bff90489e303a5a116cc508b7875843c4e195bf660860a2f8eac7e952c356808d452d39b2d97576681375d6bb68d071a20bc593e20bfda25820b58cb9337fed91d39a51b3f26fdc7d9989218dd31bada13c4c466e960037b9c0a6f41f462614f66c39c2bddbcfedf33487f9431e93fb8d87bf4d1c1d9dbc89876406cbc13d62859e9c9d6c9a49fd3809d71d4c61863b07c215520f692f3fe4840ba863934cfcdfb01f661534ec1039d1cea6e4c384009ad59da61d3a3226d7b4922aa780fa8a3818ed0b50b3df52a60c97776401f8013a8759b1c804e09b071e3a9f537c33c450eb86a9634f8364609299345f3ca58588fc4a8804260318e007c82a11dc7779f2020c65ecef67a8547760d82f14db276ea1e3dd5d7ff456b6ab614921538c1c12da4543971f72f13b4d4d1a4b819783da8c94da62fa6a8afd376e01f8110717be2d9d4e4d9772f4aa2ae684aa61a541b6adc89d5c0d72d7b905b92f86435893bc21ac80536ed49379c5d41120885fdd989881b00ba6f935a3a26ae805f26e7741d62218ffe6f71b2764949daabbdf4765e354614fc08bcb4fa543686f4c1cacf8d9e5e70fa33e3ad3eb75b5f36806aa83457dcca00d1c796597d967e29d8333a083c3de48b778ac1bc89a0382d80235f6547efb83cb337c19714f0d971d5ca886b14a5feeaf2b0c4478e4dba6ce2038da61aac7cb5299fe87edc1ceea6f078b40bedc71c08cfd808405d8f4a7c0e3f389ba72593f9456fd42bf782bf3f8a769c5f172e995652779595317e054eb0b9b506f691024cb1c388a7350bf68bef127eebeb4689c15c1b1620272ca338de7f95bfc1fa5bf417cc684877962a3029d004046f567cd976883437f0e70b7de871d7552e01289b410cc7e41ae27d57609ed22c6d23489811c614919792651d563118307690523fd894f3bddf14dd029a8701bff350853bf9d0965d9c6d03c8af9bde9441f547e0fdaf8fa7ae095fc197dfd17bc083ba86ffa10aded911d85769911ba60d1dffce57402347fcf65c4c03b88d393f2ea95ccc86c85f18e9b6e1d59646b9c0459c91eef10904f21486ff3ca00e8fac7bffbb863d2cf5693a6916e6fa160de64f9acf2b2d53416308075a14a1c0c76c6c20c1fe6fd09d937dc2decf9e1f01ea33bee75002e9793f26b5d87b05c87d619cd60a72f7cca24a8affc0d4479233846b98f9f2ea1b92a2c84a6aa06d9fc68610b9526ead03de55fa9767f2a0ca1242452e6c2ed1e2ea5c930c444fb99f7ba967832fba64c19cb5bfaa96cf9e379b6a1342ef30c1999b71a723758ed223f2056b79c95f1337a22629bae756b5f1de39c9216c596570e1e094d14951eb6df95c573c252a354bdcf8c001e5cf71695986d14e1a1a59eb318d59610f4eedbe7dd78d1c6f3009c67c81d7921a407a06c28f441ab21981812c85afee78ac9513e518313fd0858c2fc060414b0759d4e4665c768cc1832c86aa9bd764314a2102524bcacb0249fce9dce1ab25877d641708a71498e409b006e59e6cefa8a957f933b7e92ea1a8144a77c6f993a7dbf8bbe319ee51ff9a5b6698cf2921f03988438ffaa07458c20b2a7921fd3448a9e8f936fc1a0a0eb242d90b61053a11de8f0fd140eb9b80d3b477246851d1bd0df4b0961cbba434e3331bf6a8ac3b99a94e8a22e1f3e4af0a56f1b0b824dff1e52481e5fc615f9195c76bbf384059e4c76aca5134a6a297e49d9d61c8fc02b9bb29308c0a84e27d31f21956cf76176274919dc68ccf696fd02eeb72d3e266c740571e251e29ccf4f433b795816eda3ca1422a0a1314701492afef2d9999689e148b2965da50123d700523ddc9b012e2d73b40b4fa16fd7c729e0b6fcc643eddd255d70f703b9922526d44e6c34de739400aad46375071657ac21f2fdf455eb53ef001c979548b0d92b1294c8c4de8c047da88586f09a9e82cc740dfd3283018fa4f9629cf956f9f86154c9d71294758fa6aa065932cdbf87e82e07c8923e3f9affd90fa14ffc2fb83cd2da64b1e2a4cc2c6722222f2b6272cbfe55681987d1fd14b821e9e7aede78915f9a489028f805f84eb17f6b5b3be3ea9a5b1a9cfa84c95818d0ca66312c179d787e9f4c53052734aa4e9f38da4acd1f38edf067a0ce700bc2d07e9dfbe9a3179ca6d29f767f5996459238087f32c183bd5ddbf4c5630e2932063d33470d97a1381cfb26ad2ba79728485bd06854c62bbe22c9dcb95d2543094d786382107d65dcf88b92d637dbb80d3be8c8c9ac92c18d9d6be656827a346cd3c8a52128ae6fbfea4cfbdce0b5a52d529fab9250089c271899dd74542953c40e4deebdb3d04b371dcb737698a49fca1d1f49aa7a99c7ff23e38a6b0c4cd0173477a3c00e5b875787ed968dc8d41a92148e333a17b0fde44f4afeeb5f6457ea98c0084f250729358b47fb398a6a824cb8cbf02d3bfe2b38f1b91cd4b396958cbe72200b475f107a506c6e3e186db9562cde831e3e685e0fbe04bc6823e4723d0c19597b287efedfa278b4203b6258adf0f0bce7eb8f1233a728209e95d2a2b4a4584e02998e373eb0e2e19311dabacf4650a75cc657717855abbc5249de3ba0e8f0aaf83c73e8c02b192a52e1a63f2071196efa80136b1d0a37b2ff4b3d4d9a5f1d859819f0ce3be6b4598920979dd40d0410a66b53ac619884e384bd29683c8af8a1ce6a515ada03b49a0ba2c8de5e13afbcc684dcb00133e40f6053be010fc120d9dccfa16e166b58c2fdff0df7a47aaa7eb917ba7d7a557b4382e1b7d53629a9d6e31442c291ac13288af0dd0cdd70885ba6d2f17c3632bdcbfcc82f63e5e9b121ea269d52f510034e91635a409be6f040e092308e1742e3aaadd81746c9f77cdbb2d67b3a387470e66135504b95603b45bbedf47d5448bcff851d4f1a7996d79f9a607deeac7b375118a48d2153330fb489e5832893594ddd655c6af28b99ac81d47363cff017a2ffc1797d88893f21caf5c65cacd5b192b9f9c3ec68109f0e15589d97af12efa9ad3258e183e0d3679db7599cad2c16db79bd9849caa311414c1d3d0c8cc95dbe310f2c5451b0975b60f69496107da3e06df731e6d12bd67631cd43eab9a88dc6bb473c0bcb3cf88aea866f912f0b8152ae45773479ca6c20cba768867968c65157233886e427d6d53c27ebb06adb2a89887db444a21b2a5e460e761d289a02a63463a168f98105335b9c84ed9c76d99a6f5bdd3372751389b04e3b1a881505d9707382f3aa5a572ab6f263d45f8a83725c46c68c3ae456688a6ac31629089b43f68aefa09bd2458704da988bb6e066970c05af3919dfc6541afbe9f6fe79ffc78bf5d316c11f6a1ccac03cd1738ef4d40a23a6ecbb94a3999cf274c53b4f4d65b2f55b1b9a58005bf500e7afcb573a10474205fb962739216a374691db5e0ef76e8b97531810f4b99d1275af84e1741a107aed68f53aa142539d697c563b96ce334f9d700642454571b2e1af07c3e040c506848aa62a5a7d2204763dcc15bfdbdccedd140987cf7cc637fa15e812ecaad5144ca1c26f1f78a3a678468b6e8fc5952a4592a2b5cae725caea271f5c7e11078722a277bba1de0f2b3df20308ce9b976e68d5d7ec1f9242c709b994dd90495c512b582ad4042e0dca3525650c9dacfc4d24d36aab6db10f5c5b3f4d5cc66740beb95385848466712a78eb80c6e3b429705fefd5ffcf0634ad2b770e415caa74640d19e0b89b45cfa03c770ae8feda363f73f2811cd0e8548ae7f119840c4debd044769531309ff5567ed65b478f8b29eccf264eca36edab4fba6e2434abec5dcbf68adfb2bc768d1176449f9c8374db8af876f1355b6b371af9155208cd50c7f63c0681a5515a9d0e4991c1f76c8d731de7076a7992f8357ca1236ae3f139997518a7b81bc81b9a044387de46d01db902699e525aca806e373c88c32f4efdbcc61017bd792cfcb568b4a4d0ad2239584493eedf70458c647ebc6cfd855b7de10fa2e29f440deb39ab4e83215b2ee86c94d80f7f01a94056f97ba00190962529b191c6ee940ab3c0857a84da5002facbe126b3d48ab7df02f51815615960531007a3d165e888805570c7b38d141acc1df757b77437e3513832759c018d5a5b21fcccaed6d8855b5318a110fab5c702d7da70e049dab8357a8ee134b6c1df9b91d825e906141e51e99546b8e723fb36e131e2b7a949ce8637c9e3ead393718e978276b40b95cef85eabdf3564a06d7f452312d65e8101475b85bd15e8fc07b4d078197d2fa49bfd2f7b0d7c8278db5fc531c930b8add4662e10b3c8685360e198a76a5fd8f39c1e1ed8b493c45afd814c5a37175a02be9dae9618bc67b0ede740ddce39193aee6890dbbb8882bd61374bbe24ab696fc1d32234c037950d0504fdb9359b7e9f794ce7cf3f060e90562b4f6f43337cb97c2f7eabad9ae058620981ed849e6f7569c70b40e81c1d30f5f8c179dc7bbe857bcb475f295b911e5d761e484f828b7966f01c6e58daa89e3957a846cf3659448a94b8af57ef6cc01c08c1912df564cd412a60f27962fa9a76080bf0c8fbe8d61b52fe140d54fa44ce709bef4ac26f458f9e277341eed2d26ea7ce0b74f8d0dc7e2383459df9b970ed584f8999a7078f21f79dd95c195c778831a0a09f67476691474ceaea31b02d64382bbbbba8e275236278a5555265ecc83c6b911d5c94345ed33817ed079b91aac5788860b8bdab5c5cacf827dab3d43e600528e5", 0x1000}, {&(0x7f0000001740)="3323e431ff256b73f7faac6366dcc6318b5cd766bb9f7d662bbe06675787f54920e883235803355d8d12f2608601ada8b53198334f7d470392ba4d15db640eb502ce45c7ade6a178add707635b7cc0cb70b47696e24bb7bf06ca0bf658cf8334babce9970e596b3ec46308390cbecb63f74a193333313f6ebbe7eae74501801cad43207807dbbc5bed8710afc22de3715671c2c5c89a691510eb67f3a6bffa5397c7d09c0f427c2c2d8fa4", 0xab}], 0x2, &(0x7f0000001840)=[@dontfrag={{0x14, 0x29, 0x3e, 0x6}}, @rthdr={{0x68, 0x29, 0x39, {0x21, 0xa, 0x1, 0x6, 0x0, [@private1={0xfc, 0x1, '\x00', 0x1}, @ipv4={'\x00', '\xff\xff', @multicast1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private2={0xfc, 0x2, '\x00', 0x1}, @private2]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x8}}], 0x98}}], 0x2, 0x1) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000140)=0x7, 0x4) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) setsockopt$inet6_udp_int(r2, 0x11, 0xb, &(0x7f0000000300)=0x6, 0x4) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)=0xcc) [ 1905.727029] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 02:14:30 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0xb}, 0x1c210, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x4}, 0x0, 0xd, 0xffffffffffffffff, 0x9) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5, r0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 02:14:30 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x2, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:14:30 executing program 5: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, 0x0, 0x0) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) 02:14:30 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x9, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:14:30 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x400300, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 02:14:31 executing program 6: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_START_REQ(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000400)={0x20, r1, 0xd8499488957a772f, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}]}, 0x20}}, 0x0) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x50b, 0x70bd27, 0x25dfdbfe, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x1}, 0x20004000) sendmsg$IEEE802154_START_REQ(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) setsockopt$inet6_int(r2, 0x29, 0xce, &(0x7f0000000180)=0xbb6, 0x4) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000640)=ANY=[], 0x30) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x3ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r2, &(0x7f0000004d00), 0x400000000000070, 0x0) 02:14:46 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2e, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaeaaaaaaaaaaaabb0800460000200000000000029078ac1414aa0a0101020702000000009078ffffffff"], 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) 02:14:46 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0xb}, 0x1c210, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x4}, 0x0, 0xd, 0xffffffffffffffff, 0x9) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5, r0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 02:14:46 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x3, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:14:46 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x8) execveat(r8, &(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000400)='\x00', &(0x7f0000000bc0)='\x00\x80C\x107\xa64\xee\xbd*\xd4o\x8a?[\x98\xf29\xee\xc7\x90\x97\xaa\xc3\xc8Zq\xf3\x91\x04[S\\B2m=V\x89\x99\x96Q\xcaA\x18\xaf\xaf:\xf1\xab\x80\"\x7f\xb3\x18\xfe\xd7\xbd\xcd\xcdIf\xae\xb5\x87\xb8#\xe1\xbe\xec\xf0\t\xa1\xf7\xa7\xb1\x9d\xc7\xc2\xf0\x02\xaf\xc4\xd0@\xc2\x12\'\xb9\x9a\xea\x90e%\xe6\xd2E\x19E/\xc6\x17gB0Qim\x82u\x0fZ\xa9\x14\xf5\xc7X\xa9\x00\xb7\xaf\xcfouN\xbd\xb2\t^\xbe&~\xa7l\xfa\x036\x1c\"\x80\xfc/\x9b\x95\xf1!K\xc5{\xe7\xfdB[\xca\x87\x9bc\x98dg\x1a\xa1\xaa\xb4\x19\x7f\xa7\x90y\x9fq\xf5\x8a\xa9 \xa6\xdd\xf0+gb\xa6g\\\xec\tz\x06\xdf\x1a\x9c\xc9\xf7\xcc\x85\xb4G\xe9\xd3D\xf4\x8c\n\x17\xd5\x00\xf18\xb3T', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000280)='@\x90\x9a\x7fl\x00\x00\x00\x00p\xc4S\x9ch\xceH9\x88\xf3c\xb4\xabz#\xa8\xbb5\xd3\xc8\x9b\x00\x00 \x00\x00\x00\x00\x00', &(0x7f0000000540)='\x00'], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000440)='\x00', &(0x7f0000000740)='\x10', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) [ 1921.010942] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 02:14:46 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0xf, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:14:46 executing program 5: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, 0x0, 0x0) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) 02:14:46 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0xf0ffff, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 02:14:46 executing program 1: sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, 0x0, 0x80) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000700)='uid_map\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000380)) sendmsg$NL80211_CMD_GET_SURVEY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="1c000000fd5834a34da6a7f4fca9701359d0e981ead1bb03e767cec802f88e538c11579d9c45e888a06af98286a33362c3074a4a6e757c6de6a484812d135a98025a4e38a4f31f9e1e7e2ee9eb91b12ec079e4e8658f1bccc72c9c9724e0f1437e20b595239f1d7393e7ef02426e8e805ee2e18788ccabc0830b712547c9b138583567aaf843fb9972371f7dc51b627930be3d0891ddca2acbd0beff26cb9cadda02b997d1976cb0", @ANYRES16=0x0, @ANYRES32=0x0], 0x1c}}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, 0x0}, 0x40000) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001880)={0x53, 0x0, 0x6, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000001780)="12648e45da18", 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) ftruncate(0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) lseek(r2, 0x800, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r2, &(0x7f0000000600)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000680)={{}, {0x1, 0x4}, [{}, {0x2, 0x6}], {0x4, 0x2}, [{}, {0x8, 0x3}, {0x8, 0x1, r4}, {0x8, 0x1}], {0x10, 0x4}, {0x20, 0x4}}, 0x54, 0x3) sendfile(r2, r3, 0x0, 0x100000001) 02:15:01 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x300, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:15:01 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0xb}, 0x1c210, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x4}, 0x0, 0xd, 0xffffffffffffffff, 0x9) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5, r0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 02:15:01 executing program 5: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, 0x0, 0x0) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) 02:15:01 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x8) execveat(r8, &(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000400)='\x00', &(0x7f0000000bc0)='\x00\x80C\x107\xa64\xee\xbd*\xd4o\x8a?[\x98\xf29\xee\xc7\x90\x97\xaa\xc3\xc8Zq\xf3\x91\x04[S\\B2m=V\x89\x99\x96Q\xcaA\x18\xaf\xaf:\xf1\xab\x80\"\x7f\xb3\x18\xfe\xd7\xbd\xcd\xcdIf\xae\xb5\x87\xb8#\xe1\xbe\xec\xf0\t\xa1\xf7\xa7\xb1\x9d\xc7\xc2\xf0\x02\xaf\xc4\xd0@\xc2\x12\'\xb9\x9a\xea\x90e%\xe6\xd2E\x19E/\xc6\x17gB0Qim\x82u\x0fZ\xa9\x14\xf5\xc7X\xa9\x00\xb7\xaf\xcfouN\xbd\xb2\t^\xbe&~\xa7l\xfa\x036\x1c\"\x80\xfc/\x9b\x95\xf1!K\xc5{\xe7\xfdB[\xca\x87\x9bc\x98dg\x1a\xa1\xaa\xb4\x19\x7f\xa7\x90y\x9fq\xf5\x8a\xa9 \xa6\xdd\xf0+gb\xa6g\\\xec\tz\x06\xdf\x1a\x9c\xc9\xf7\xcc\x85\xb4G\xe9\xd3D\xf4\x8c\n\x17\xd5\x00\xf18\xb3T', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000280)='@\x90\x9a\x7fl\x00\x00\x00\x00p\xc4S\x9ch\xceH9\x88\xf3c\xb4\xabz#\xa8\xbb5\xd3\xc8\x9b\x00\x00 \x00\x00\x00\x00\x00', &(0x7f0000000540)='\x00', 0x0], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000440)='\x00', &(0x7f0000000740)='\x10', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) 02:15:01 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x6, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:15:01 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x1000000, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 02:15:01 executing program 6: sendmsg$NL80211_CMD_PEER_MEASUREMENT_START(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000000c0)={&(0x7f0000001e00)=ANY=[@ANYBLOB="88ce8800", @ANYRES16=0x0, @ANYBLOB="02002cbd7000ffdbdf258300000008000300", @ANYRES32=0x0, @ANYBLOB="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"], 0x378c}, 0x1, 0x0, 0x0, 0x400}, 0x2000c840) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0x0, 0x0, &(0x7f0000000380)) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r0) sendmsg$NL80211_CMD_SET_REG(r1, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x1, 0x70bd27, 0x25dfdbfc, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000010}, 0x2004c040) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f0000000580)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000480)={0xc0, r2, 0x1, 0x70bd29, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0xf0, 0x15}}}}, [@NL80211_ATTR_MESH_CONFIG={0x24, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_CONFIRM_TIMEOUT={0x6, 0x2, 0x16}, @NL80211_MESHCONF_HT_OPMODE={0x6, 0x16, 0x10}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_GATE_ANNOUNCEMENTS={0x5}]}, @NL80211_ATTR_BSS_BASIC_RATES={0x7, 0x24, [{0x3}, {0x22, 0x1}, {0x1}]}, @NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PREQ_MIN_INTERVAL={0x6, 0xc, 0x1}, @NL80211_MESHCONF_MAX_RETRIES={0x5, 0x5, 0xb}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5, 0xe, 0x4}, @NL80211_MESHCONF_RETRY_TIMEOUT={0x6, 0x1, 0x4e}, @NL80211_MESHCONF_MAX_RETRIES={0x5, 0x5, 0xe}, @NL80211_MESHCONF_PLINK_TIMEOUT={0x8, 0x1c, 0x200}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x1f}, @NL80211_MESHCONF_HWMP_ACTIVE_PATH_TIMEOUT={0x8, 0xb, 0xfffff000}, @NL80211_MESHCONF_MAX_PEER_LINKS={0x6, 0x4, 0x8c}, @NL80211_MESHCONF_RSSI_THRESHOLD={0x8, 0x14, 0xffffffffffffff2b}]}, @NL80211_ATTR_HANDLE_DFS={0x4}, @NL80211_ATTR_BSS_BASIC_RATES={0xe, 0x24, [{0x36, 0x1}, {0xb}, {0xc, 0x1}, {0x24}, {0x12}, {0x4, 0x1}, {0x2, 0x1}, {0x6c, 0x1}, {0x1, 0x1}, {0x2, 0x1}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x24040100}, 0x0) sendmsg$TIPC_CMD_SET_NETID(r1, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x24, 0x0, 0x200, 0x70bd27, 0x25dfdbfb, {{}, {}, {0x8}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x800) sendmsg$NLBL_UNLABEL_C_ACCEPT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)=ANY=[@ANYBLOB='|\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="200700bd7080fedbdf250100000005000100010000001400060077673200000000004251e0ad000014c1140003fffd88310b000000f719c193647d61ee0114000600767863616e31000000000000000000000500010000000000050001000000000014000300fc0100"/118], 0x7c}, 0x1, 0x0, 0x0, 0x1}, 0x48081) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x2}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700", 0x93, 0xb800}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='H']) r5 = open(&(0x7f0000000700)='./file0\x00', 0x50040, 0x20) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r3) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000600), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_MAX_CSMA_BACKOFFS(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x20, r6, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x404c080}, 0x40000) openat(r4, &(0x7f0000000040)='./file0\x00', 0x10042, 0x41) 02:15:01 executing program 1: syz_emit_ethernet(0x51, &(0x7f0000000080)={@multicast, @remote, @void, {@ipv4={0x800, @udp={{0xd, 0x4, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x11, 0x0, @loopback, @remote, {[@timestamp_prespec={0x44, 0x1c, 0x0, 0x3, 0x0, [{@loopback}, {@local}, {@multicast1}]}, @rr={0x7, 0x3}]}}, {0x0, 0x0, 0xf, 0x0, @opaque="5b28232befcc72"}}}}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x8401, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f00000000c0)={'ipvlan1\x00'}) write$tun(r0, &(0x7f0000001180)={@val, @val, @mpls={[], @generic="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"}}, 0x285) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r1) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_START_AP(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x88, r2, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@beacon=[@NL80211_ATTR_BEACON_HEAD={0x28, 0xe, {@wo_ht={{}, {}, @broadcast, @device_a, @from_mac}, 0x0, @default, 0x1, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void}}], @NL80211_ATTR_HE_OBSS_PD={0x1c, 0x117, 0x0, 0x1, [@NL80211_HE_OBSS_PD_ATTR_MIN_OFFSET={0x5, 0x1, 0x3}, @NL80211_HE_OBSS_PD_ATTR_MAX_OFFSET={0x5, 0x2, 0x6}, @NL80211_HE_OBSS_PD_ATTR_MIN_OFFSET={0x5, 0x1, 0x3}]}, @NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_DTIM_PERIOD={0x8}, @NL80211_ATTR_SSID={0xa, 0x34, @default_ap_ssid}, @NL80211_ATTR_AUTH_TYPE={0x8}, @NL80211_ATTR_EXTERNAL_AUTH_SUPPORT={0x4}]}, 0x88}}, 0x0) ioctl$BTRFS_IOC_SPACE_INFO(r1, 0xc0109414, &(0x7f0000001440)={0x7dd, 0x7, ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}) [ 1936.551011] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11499 comm=syz-executor.6 [ 1936.553439] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 02:15:01 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x10000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000100), 0xb}, 0x1c210, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x4}, 0x0, 0xd, 0xffffffffffffffff, 0x9) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5, r0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 02:15:01 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x500, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:15:01 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x8, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:15:01 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r4, 0xc018937b, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYRES32, @ANYRES32=0xee01, @ANYBLOB="2e2f66d6ab80d04a"]) ioctl$EXT4_IOC_GROUP_EXTEND(r5, 0x40086607, &(0x7f0000000080)=0xc0) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$nfs(&(0x7f0000000240), &(0x7f00000002c0)='./file0/../file0\x00', 0x1, 0x3, &(0x7f0000000500)=[{&(0x7f0000000300)="b09456e1cc1abe3be01b5ab628f4f34a9a6cc65a92f9877ae3771e21d09c820335483bdc14c4696a6b7661a1c0cd40bf760bbd9d7976fb11c6db4c32f90d212b2447c78c0bb70e2341b9135a", 0x4c, 0xffffffffffffffff}, {&(0x7f00000003c0)="734392bf111e34ad89833539b8bc9d0c90f5905723c06cb62a77178037bdf869a9e9f9cf93423b1c6c08e00a09fffd1739e62303500b707c15a15ce9cff7d35d67b8f1929ea5dbb86e30efc44374d16ea8b43e80ec4d305a95b6b85adc47c8abfc", 0x61, 0x40}, {&(0x7f0000000440)="ffdd14b2d545b969616d54fa413948ca8c884e05a5e0b29fda45678de5b6ea9b32040cfbe28f87c93cf898c2624a360384a71f96dc79194b8c9cf744da855ca0b5aaf22f51db7f7c1cf4850f245977421e5f993e2c5e97146ac61139caedb63455f06e0ac29e00f522a151c2774de3ac62b0621adbe8f1cfca71952a01bd410dbd0731eb96367acfaef362026b898c9311a95951a302f26d1b3d3c6fb59470b3ce9e99d98277d23940f8e92a64207f20951d9407895b748c482f265db1", 0xbd, 0x5}], 0x1, &(0x7f0000000600)=ANY=[@ANYBLOB="2d242fd14d8b0f1ca26c465fb2dfc7414bf88fa9f61890e03a1fd40484aa98326f28b3ec29b0e0b04ae1328bd7897e84258162d0dd6f8e38968a9d7813f24a5a61f9a7436bf484655ec081fa4cbc19089bc32c7266646e6f2c3970002c5b892c2b4f73682c00"]) setsockopt$inet6_udp_int(r5, 0x11, 0xa, &(0x7f00000005c0)=0x6, 0x4) r7 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000200), 0x200) dup3(r7, r6, 0x80000) ioctl$F2FS_IOC_GET_FEATURES(r5, 0x8004f50c, &(0x7f0000000100)) close_range(r6, 0xffffffffffffffff, 0x0) ioctl$HIDIOCINITREPORT(0xffffffffffffffff, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e23, 0x4, @empty, 0x9}, 0x1c) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x5) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 02:15:01 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x2000000, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) [ 1936.774366] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11509 comm=syz-executor.6 02:15:01 executing program 5: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040), 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) 02:15:01 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x600, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:15:01 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x8) execveat(r8, &(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000400)='\x00', &(0x7f0000000bc0)='\x00\x80C\x107\xa64\xee\xbd*\xd4o\x8a?[\x98\xf29\xee\xc7\x90\x97\xaa\xc3\xc8Zq\xf3\x91\x04[S\\B2m=V\x89\x99\x96Q\xcaA\x18\xaf\xaf:\xf1\xab\x80\"\x7f\xb3\x18\xfe\xd7\xbd\xcd\xcdIf\xae\xb5\x87\xb8#\xe1\xbe\xec\xf0\t\xa1\xf7\xa7\xb1\x9d\xc7\xc2\xf0\x02\xaf\xc4\xd0@\xc2\x12\'\xb9\x9a\xea\x90e%\xe6\xd2E\x19E/\xc6\x17gB0Qim\x82u\x0fZ\xa9\x14\xf5\xc7X\xa9\x00\xb7\xaf\xcfouN\xbd\xb2\t^\xbe&~\xa7l\xfa\x036\x1c\"\x80\xfc/\x9b\x95\xf1!K\xc5{\xe7\xfdB[\xca\x87\x9bc\x98dg\x1a\xa1\xaa\xb4\x19\x7f\xa7\x90y\x9fq\xf5\x8a\xa9 \xa6\xdd\xf0+gb\xa6g\\\xec\tz\x06\xdf\x1a\x9c\xc9\xf7\xcc\x85\xb4G\xe9\xd3D\xf4\x8c\n\x17\xd5\x00\xf18\xb3T', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000280)='@\x90\x9a\x7fl\x00\x00\x00\x00p\xc4S\x9ch\xceH9\x88\xf3c\xb4\xabz#\xa8\xbb5\xd3\xc8\x9b\x00\x00 \x00\x00\x00\x00\x00', &(0x7f0000000540)='\x00', 0x0], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000440)='\x00', &(0x7f0000000740)='\x10', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) 02:15:02 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x3000000, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 02:15:02 executing program 6: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x1000000, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 02:15:02 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) [ 1936.918859] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 02:15:02 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x700, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:15:02 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x10000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000100), 0xb}, 0x1c210, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x4}, 0x0, 0xd, 0xffffffffffffffff, 0x9) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5, r0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 02:15:02 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x2, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:15:02 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x4000000, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 02:15:02 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', 0x0, &(0x7f0000000300)='security.capability\x00'], 0x0, 0x1000) ftruncate(r0, 0x1000003) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) write(0xffffffffffffffff, &(0x7f0000000200)="8b7876f31d04c964fa152d1f0d027a59e65dcc3a4fadec7a224e944bf39adf7d75e5163d473e1008f7300e2ffdcbcd73b569090e80415268326395e509a1cb3935a83c558bdcd0fa56006a5a3debe3c3c90ff414baa9bd893de667905d4c2b254b9475fbc380b4d96412cd1a", 0x6c) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x3, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@ipv4={'\x00', '\xff\xff', @dev}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0xa, @in, 0x0, 0x4, 0x0, 0xfc}}, 0xe8) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r3 = accept(r2, 0x0, &(0x7f0000000100)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x9a) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x8000, 0x10) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0xe, 0x0, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xed14, 0xffffffff80000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) connect$inet(r3, &(0x7f0000000340)={0x2, 0x4e20, @empty}, 0x10) 02:15:18 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', 0x0, &(0x7f0000000300)='security.capability\x00'], 0x0, 0x1000) ftruncate(r0, 0x1000003) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) write(0xffffffffffffffff, &(0x7f0000000200)="8b7876f31d04c964fa152d1f0d027a59e65dcc3a4fadec7a224e944bf39adf7d75e5163d473e1008f7300e2ffdcbcd73b569090e80415268326395e509a1cb3935a83c558bdcd0fa56006a5a3debe3c3c90ff414baa9bd893de667905d4c2b254b9475fbc380b4d96412cd1a", 0x6c) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x3, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@ipv4={'\x00', '\xff\xff', @dev}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0xa, @in, 0x0, 0x4, 0x0, 0xfc}}, 0xe8) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r3 = accept(r2, 0x0, &(0x7f0000000100)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x9a) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x8000, 0x10) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0xe, 0x0, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xed14, 0xffffffff80000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) connect$inet(r3, &(0x7f0000000340)={0x2, 0x4e20, @empty}, 0x10) 02:15:18 executing program 5: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040), 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) 02:15:18 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x10000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000100), 0xb}, 0x1c210, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x4}, 0x0, 0xd, 0xffffffffffffffff, 0x9) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5, r0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 02:15:18 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x8) execveat(r8, &(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000400)='\x00', &(0x7f0000000bc0)='\x00\x80C\x107\xa64\xee\xbd*\xd4o\x8a?[\x98\xf29\xee\xc7\x90\x97\xaa\xc3\xc8Zq\xf3\x91\x04[S\\B2m=V\x89\x99\x96Q\xcaA\x18\xaf\xaf:\xf1\xab\x80\"\x7f\xb3\x18\xfe\xd7\xbd\xcd\xcdIf\xae\xb5\x87\xb8#\xe1\xbe\xec\xf0\t\xa1\xf7\xa7\xb1\x9d\xc7\xc2\xf0\x02\xaf\xc4\xd0@\xc2\x12\'\xb9\x9a\xea\x90e%\xe6\xd2E\x19E/\xc6\x17gB0Qim\x82u\x0fZ\xa9\x14\xf5\xc7X\xa9\x00\xb7\xaf\xcfouN\xbd\xb2\t^\xbe&~\xa7l\xfa\x036\x1c\"\x80\xfc/\x9b\x95\xf1!K\xc5{\xe7\xfdB[\xca\x87\x9bc\x98dg\x1a\xa1\xaa\xb4\x19\x7f\xa7\x90y\x9fq\xf5\x8a\xa9 \xa6\xdd\xf0+gb\xa6g\\\xec\tz\x06\xdf\x1a\x9c\xc9\xf7\xcc\x85\xb4G\xe9\xd3D\xf4\x8c\n\x17\xd5\x00\xf18\xb3T', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000280)='@\x90\x9a\x7fl\x00\x00\x00\x00p\xc4S\x9ch\xceH9\x88\xf3c\xb4\xabz#\xa8\xbb5\xd3\xc8\x9b\x00\x00 \x00\x00\x00\x00\x00', &(0x7f0000000540)='\x00', 0x0], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000440)='\x00', &(0x7f0000000740)='\x10', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) 02:15:18 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x900, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:15:18 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x5000000, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 02:15:18 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x3, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:15:18 executing program 1: sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8080) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f0000002800)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0], 0x20}, 0x1, 0x0, 0x0, 0x801}, 0x0) r1 = gettid() process_vm_readv(r1, &(0x7f0000001a40)=[{&(0x7f00000018c0)=""/31, 0x1f}, {&(0x7f0000001b40)=""/124, 0x7c}, {&(0x7f0000001980)=""/161, 0xa1}], 0x3, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/101, 0x65}, {&(0x7f0000002240)=""/183, 0xb7}, {&(0x7f0000001bc0)=""/122, 0x7a}, {&(0x7f0000001c40)=""/163, 0xa3}, {&(0x7f0000000180)=""/231, 0xe7}, {&(0x7f0000001e00)}, {&(0x7f0000001e40)=""/9, 0x9}, {&(0x7f0000001b00)=""/46, 0x2e}], 0x8, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ff8000/0x2000)=nil, 0x2000, 0x300000a, 0x11, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r3, &(0x7f0000000180)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, 0x4}, &(0x7f00000000c0)='./file0\x00', 0x18}, 0x0) r4 = pidfd_open(0x0, 0x0) r5 = dup(r4) r6 = syz_io_uring_setup(0x21, &(0x7f0000000080), &(0x7f00000a0000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) r9 = io_uring_register$IORING_REGISTER_PERSONALITY(r6, 0x9, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000000280)={r4, 0x8, 0xfffffffffffffff9, 0x5}) io_uring_register$IORING_UNREGISTER_PERSONALITY(r6, 0xa, 0x0, r9) syz_io_uring_submit(r7, r8, &(0x7f0000000500)=@IORING_OP_FALLOCATE={0x11, 0x1, 0x0, @fd_index=0x9, 0x80000001, 0x0, 0x2}, 0x9) syz_io_uring_submit(r7, 0x0, &(0x7f0000000580)=@IORING_OP_SPLICE={0x1e, 0x1, 0x0, @fd, 0x1ff, {0x0, r4}, 0x0, 0x2, 0x0, {0x0, r9}}, 0x10001) syz_io_uring_submit(0x0, r3, &(0x7f0000000080)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0x80000141, 0x1, {0x1, r9}}, 0xb0d7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) connect$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x3}, 0xe) sendmmsg(0xffffffffffffffff, &(0x7f0000001040), 0x0, 0x40) [ 1953.521504] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 02:15:18 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x8) execveat(r8, &(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000400)='\x00', &(0x7f0000000bc0)='\x00\x80C\x107\xa64\xee\xbd*\xd4o\x8a?[\x98\xf29\xee\xc7\x90\x97\xaa\xc3\xc8Zq\xf3\x91\x04[S\\B2m=V\x89\x99\x96Q\xcaA\x18\xaf\xaf:\xf1\xab\x80\"\x7f\xb3\x18\xfe\xd7\xbd\xcd\xcdIf\xae\xb5\x87\xb8#\xe1\xbe\xec\xf0\t\xa1\xf7\xa7\xb1\x9d\xc7\xc2\xf0\x02\xaf\xc4\xd0@\xc2\x12\'\xb9\x9a\xea\x90e%\xe6\xd2E\x19E/\xc6\x17gB0Qim\x82u\x0fZ\xa9\x14\xf5\xc7X\xa9\x00\xb7\xaf\xcfouN\xbd\xb2\t^\xbe&~\xa7l\xfa\x036\x1c\"\x80\xfc/\x9b\x95\xf1!K\xc5{\xe7\xfdB[\xca\x87\x9bc\x98dg\x1a\xa1\xaa\xb4\x19\x7f\xa7\x90y\x9fq\xf5\x8a\xa9 \xa6\xdd\xf0+gb\xa6g\\\xec\tz\x06\xdf\x1a\x9c\xc9\xf7\xcc\x85\xb4G\xe9\xd3D\xf4\x8c\n\x17\xd5\x00\xf18\xb3T', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000280)='@\x90\x9a\x7fl\x00\x00\x00\x00p\xc4S\x9ch\xceH9\x88\xf3c\xb4\xabz#\xa8\xbb5\xd3\xc8\x9b\x00\x00 \x00\x00\x00\x00\x00', &(0x7f0000000a00)='\x009\x1c\xaf\x14\xe6\xeb\xe9\xf1\xccO@\xbd\xfc\xbdN\xfa\x93Z\x94\xfd\xc6]\xc3\x81g\x95\'\xb7\xf2\xe8\xbf\xd3\xf3\"\xf0Z\x93T\xa1\xc6\x10\x01\xba\xf0\x11\x01 \x94X\x7fQ\xa6\v\xfa\xc2\\$\xad\x96A\xd6\xdf|\x0e,c\xc4\x13\xfb\x91\xc5|{\xde\'xb\xcd\xb2\x177\x83\'\xdb\xf6y_\x10\x87\x01\xd4\xb1\x9b\xe4\xac\xf0D4\xe6v\x86\x02^bt\xbf!b\xd4k\x11\xf5Nj\x97P\b\xf2\xdd\r\xaa,g\xfc\x8f*\bq\x10wl\xe0\x02HG)\xa0\xb9%\x12\x9fx]\xf8Gz`\xfd\x00l\xe9<\xa5\xbd\x9f\x80\xa5\x0f\xd3\xf7\xc8\x98'], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000440)='\x00', &(0x7f0000000740)='\x10', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) [ 1953.609828] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 02:15:34 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0xf00, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:15:34 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x6000000, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 02:15:34 executing program 1: r0 = getpgrp(0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r2, 0x10e, 0x0, 0x0, &(0x7f0000000380)) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r1) sendmsg$NL80211_CMD_SET_REG(r2, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r3, 0x1, 0x70bd27, 0x25dfdbfc, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000010}, 0x2004c040) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000000)=r0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) r4 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FIBMAP(r4, 0x1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5a, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r5, &(0x7f0000000180)=ANY=[], 0xfdef) ioctl$NS_GET_OWNER_UID(r5, 0xb704, &(0x7f00000003c0)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000040)) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r6, &(0x7f0000001000)=ANY=[], 0x15b0) 02:15:34 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', 0x0, &(0x7f0000000300)='security.capability\x00'], 0x0, 0x1000) ftruncate(r0, 0x1000003) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) write(0xffffffffffffffff, &(0x7f0000000200)="8b7876f31d04c964fa152d1f0d027a59e65dcc3a4fadec7a224e944bf39adf7d75e5163d473e1008f7300e2ffdcbcd73b569090e80415268326395e509a1cb3935a83c558bdcd0fa56006a5a3debe3c3c90ff414baa9bd893de667905d4c2b254b9475fbc380b4d96412cd1a", 0x6c) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x3, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@ipv4={'\x00', '\xff\xff', @dev}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0xa, @in, 0x0, 0x4, 0x0, 0xfc}}, 0xe8) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r3 = accept(r2, 0x0, &(0x7f0000000100)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x9a) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x8000, 0x10) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0xe, 0x0, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xed14, 0xffffffff80000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) connect$inet(r3, &(0x7f0000000340)={0x2, 0x4e20, @empty}, 0x10) 02:15:34 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x10000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000000100), 0xb}, 0x1c210, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x4}, 0x0, 0xd, 0xffffffffffffffff, 0x9) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5, r0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 02:15:34 executing program 5: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040), 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) 02:15:34 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x8) execveat(r8, &(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000400)='\x00', &(0x7f0000000bc0)='\x00\x80C\x107\xa64\xee\xbd*\xd4o\x8a?[\x98\xf29\xee\xc7\x90\x97\xaa\xc3\xc8Zq\xf3\x91\x04[S\\B2m=V\x89\x99\x96Q\xcaA\x18\xaf\xaf:\xf1\xab\x80\"\x7f\xb3\x18\xfe\xd7\xbd\xcd\xcdIf\xae\xb5\x87\xb8#\xe1\xbe\xec\xf0\t\xa1\xf7\xa7\xb1\x9d\xc7\xc2\xf0\x02\xaf\xc4\xd0@\xc2\x12\'\xb9\x9a\xea\x90e%\xe6\xd2E\x19E/\xc6\x17gB0Qim\x82u\x0fZ\xa9\x14\xf5\xc7X\xa9\x00\xb7\xaf\xcfouN\xbd\xb2\t^\xbe&~\xa7l\xfa\x036\x1c\"\x80\xfc/\x9b\x95\xf1!K\xc5{\xe7\xfdB[\xca\x87\x9bc\x98dg\x1a\xa1\xaa\xb4\x19\x7f\xa7\x90y\x9fq\xf5\x8a\xa9 \xa6\xdd\xf0+gb\xa6g\\\xec\tz\x06\xdf\x1a\x9c\xc9\xf7\xcc\x85\xb4G\xe9\xd3D\xf4\x8c\n\x17\xd5\x00\xf18\xb3T', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000280)='@\x90\x9a\x7fl\x00\x00\x00\x00p\xc4S\x9ch\xceH9\x88\xf3c\xb4\xabz#\xa8\xbb5\xd3\xc8\x9b\x00\x00 \x00\x00\x00\x00\x00', &(0x7f0000000a00)='\x009\x1c\xaf\x14\xe6\xeb\xe9\xf1\xccO@\xbd\xfc\xbdN\xfa\x93Z\x94\xfd\xc6]\xc3\x81g\x95\'\xb7\xf2\xe8\xbf\xd3\xf3\"\xf0Z\x93T\xa1\xc6\x10\x01\xba\xf0\x11\x01 \x94X\x7fQ\xa6\v\xfa\xc2\\$\xad\x96A\xd6\xdf|\x0e,c\xc4\x13\xfb\x91\xc5|{\xde\'xb\xcd\xb2\x177\x83\'\xdb\xf6y_\x10\x87\x01\xd4\xb1\x9b\xe4\xac\xf0D4\xe6v\x86\x02^bt\xbf!b\xd4k\x11\xf5Nj\x97P\b\xf2\xdd\r\xaa,g\xfc\x8f*\bq\x10wl\xe0\x02HG)\xa0\xb9%\x12\x9fx]\xf8Gz`\xfd\x00l\xe9<\xa5\xbd\x9f\x80\xa5\x0f\xd3\xf7\xc8\x98'], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000440)='\x00', &(0x7f0000000740)='\x10', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) 02:15:34 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x4, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) [ 1969.146439] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 02:15:34 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x30000, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:15:34 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ftruncate(0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8004) r2 = fcntl$getown(r0, 0x9) r3 = fork() ptrace(0x10, r3) ptrace$getregset(0x4204, r3, 0x200, &(0x7f0000000100)={&(0x7f00000000c0)=""/63, 0x3f}) kcmp(r2, r3, 0x4, r0, 0xffffffffffffffff) mq_open(&(0x7f00000001c0)='\x00', 0x40, 0x2, &(0x7f0000000200)={0x6, 0x5000000000000000, 0x3, 0x2}) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000080)=0x29eb, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x20, 0x3, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000100), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 02:15:34 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x5, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:15:34 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x7000000, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 02:15:34 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x10000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000000100), 0xb}, 0x1c210, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x4}, 0x0, 0xd, 0xffffffffffffffff, 0x9) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5, r0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 02:15:34 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x8) execveat(r8, &(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000400)='\x00', &(0x7f0000000bc0)='\x00\x80C\x107\xa64\xee\xbd*\xd4o\x8a?[\x98\xf29\xee\xc7\x90\x97\xaa\xc3\xc8Zq\xf3\x91\x04[S\\B2m=V\x89\x99\x96Q\xcaA\x18\xaf\xaf:\xf1\xab\x80\"\x7f\xb3\x18\xfe\xd7\xbd\xcd\xcdIf\xae\xb5\x87\xb8#\xe1\xbe\xec\xf0\t\xa1\xf7\xa7\xb1\x9d\xc7\xc2\xf0\x02\xaf\xc4\xd0@\xc2\x12\'\xb9\x9a\xea\x90e%\xe6\xd2E\x19E/\xc6\x17gB0Qim\x82u\x0fZ\xa9\x14\xf5\xc7X\xa9\x00\xb7\xaf\xcfouN\xbd\xb2\t^\xbe&~\xa7l\xfa\x036\x1c\"\x80\xfc/\x9b\x95\xf1!K\xc5{\xe7\xfdB[\xca\x87\x9bc\x98dg\x1a\xa1\xaa\xb4\x19\x7f\xa7\x90y\x9fq\xf5\x8a\xa9 \xa6\xdd\xf0+gb\xa6g\\\xec\tz\x06\xdf\x1a\x9c\xc9\xf7\xcc\x85\xb4G\xe9\xd3D\xf4\x8c\n\x17\xd5\x00\xf18\xb3T', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000280)='@\x90\x9a\x7fl\x00\x00\x00\x00p\xc4S\x9ch\xceH9\x88\xf3c\xb4\xabz#\xa8\xbb5\xd3\xc8\x9b\x00\x00 \x00\x00\x00\x00\x00', &(0x7f0000000a00)='\x009\x1c\xaf\x14\xe6\xeb\xe9\xf1\xccO@\xbd\xfc\xbdN\xfa\x93Z\x94\xfd\xc6]\xc3\x81g\x95\'\xb7\xf2\xe8\xbf\xd3\xf3\"\xf0Z\x93T\xa1\xc6\x10\x01\xba\xf0\x11\x01 \x94X\x7fQ\xa6\v\xfa\xc2\\$\xad\x96A\xd6\xdf|\x0e,c\xc4\x13\xfb\x91\xc5|{\xde\'xb\xcd\xb2\x177\x83\'\xdb\xf6y_\x10\x87\x01\xd4\xb1\x9b\xe4\xac\xf0D4\xe6v\x86\x02^bt\xbf!b\xd4k\x11\xf5Nj\x97P\b\xf2\xdd\r\xaa,g\xfc\x8f*\bq\x10wl\xe0\x02HG)\xa0\xb9%\x12\x9fx]\xf8Gz`\xfd\x00l\xe9<\xa5\xbd\x9f\x80\xa5\x0f\xd3\xf7\xc8\x98'], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000440)='\x00', &(0x7f0000000740)='\x10', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) [ 1969.372068] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 02:15:34 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', 0x0, &(0x7f0000000300)='security.capability\x00'], 0x0, 0x1000) ftruncate(r0, 0x1000003) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) write(0xffffffffffffffff, &(0x7f0000000200)="8b7876f31d04c964fa152d1f0d027a59e65dcc3a4fadec7a224e944bf39adf7d75e5163d473e1008f7300e2ffdcbcd73b569090e80415268326395e509a1cb3935a83c558bdcd0fa56006a5a3debe3c3c90ff414baa9bd893de667905d4c2b254b9475fbc380b4d96412cd1a", 0x6c) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x3, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@ipv4={'\x00', '\xff\xff', @dev}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0xa, @in, 0x0, 0x4, 0x0, 0xfc}}, 0xe8) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r3 = accept(r2, 0x0, &(0x7f0000000100)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x9a) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x8000, 0x10) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0xe, 0x0, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xed14, 0xffffffff80000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) connect$inet(r3, &(0x7f0000000340)={0x2, 0x4e20, @empty}, 0x10) 02:15:34 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x6, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:15:34 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x9000000, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 02:15:34 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x34000, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:15:34 executing program 5: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) 02:15:34 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x8) execveat(r8, &(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000400)='\x00', &(0x7f0000000bc0)='\x00\x80C\x107\xa64\xee\xbd*\xd4o\x8a?[\x98\xf29\xee\xc7\x90\x97\xaa\xc3\xc8Zq\xf3\x91\x04[S\\B2m=V\x89\x99\x96Q\xcaA\x18\xaf\xaf:\xf1\xab\x80\"\x7f\xb3\x18\xfe\xd7\xbd\xcd\xcdIf\xae\xb5\x87\xb8#\xe1\xbe\xec\xf0\t\xa1\xf7\xa7\xb1\x9d\xc7\xc2\xf0\x02\xaf\xc4\xd0@\xc2\x12\'\xb9\x9a\xea\x90e%\xe6\xd2E\x19E/\xc6\x17gB0Qim\x82u\x0fZ\xa9\x14\xf5\xc7X\xa9\x00\xb7\xaf\xcfouN\xbd\xb2\t^\xbe&~\xa7l\xfa\x036\x1c\"\x80\xfc/\x9b\x95\xf1!K\xc5{\xe7\xfdB[\xca\x87\x9bc\x98dg\x1a\xa1\xaa\xb4\x19\x7f\xa7\x90y\x9fq\xf5\x8a\xa9 \xa6\xdd\xf0+gb\xa6g\\\xec\tz\x06\xdf\x1a\x9c\xc9\xf7\xcc\x85\xb4G\xe9\xd3D\xf4\x8c\n\x17\xd5\x00\xf18\xb3T', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000280)='@\x90\x9a\x7fl\x00\x00\x00\x00p\xc4S\x9ch\xceH9\x88\xf3c\xb4\xabz#\xa8\xbb5\xd3\xc8\x9b\x00\x00 \x00\x00\x00\x00\x00', 0x0, &(0x7f0000000a00)='\x009\x1c\xaf\x14\xe6\xeb\xe9\xf1\xccO@\xbd\xfc\xbdN\xfa\x93Z\x94\xfd\xc6]\xc3\x81g\x95\'\xb7\xf2\xe8\xbf\xd3\xf3\"\xf0Z\x93T\xa1\xc6\x10\x01\xba\xf0\x11\x01 \x94X\x7fQ\xa6\v\xfa\xc2\\$\xad\x96A\xd6\xdf|\x0e,c\xc4\x13\xfb\x91\xc5|{\xde\'xb\xcd\xb2\x177\x83\'\xdb\xf6y_\x10\x87\x01\xd4\xb1\x9b\xe4\xac\xf0D4\xe6v\x86\x02^bt\xbf!b\xd4k\x11\xf5Nj\x97P\b\xf2\xdd\r\xaa,g\xfc\x8f*\bq\x10wl\xe0\x02HG)\xa0\xb9%\x12\x9fx]\xf8Gz`\xfd\x00l\xe9<\xa5\xbd\x9f\x80\xa5\x0f\xd3\xf7\xc8\x98'], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000440)='\x00', &(0x7f0000000740)='\x10', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) 02:15:34 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x80000, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) [ 1969.522055] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 02:15:34 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x7, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:15:34 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101042, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000000000000038"], 0xaf2) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) mount$9p_rdma(0x0, 0x0, 0x0, 0x0, 0x0) 02:15:34 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0xf000000, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 02:15:34 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', 0x0, &(0x7f0000000300)='security.capability\x00'], 0x0, 0x1000) ftruncate(r0, 0x1000003) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) write(0xffffffffffffffff, &(0x7f0000000200)="8b7876f31d04c964fa152d1f0d027a59e65dcc3a4fadec7a224e944bf39adf7d75e5163d473e1008f7300e2ffdcbcd73b569090e80415268326395e509a1cb3935a83c558bdcd0fa56006a5a3debe3c3c90ff414baa9bd893de667905d4c2b254b9475fbc380b4d96412cd1a", 0x6c) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x3, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@ipv4={'\x00', '\xff\xff', @dev}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0xa, @in, 0x0, 0x4, 0x0, 0xfc}}, 0xe8) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) accept(r2, 0x0, &(0x7f0000000100)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x9a) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x8000, 0x10) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0xe, 0x0, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xed14, 0xffffffff80000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 02:15:34 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x400300, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:15:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r0}}, './file0\x00'}) ioctl$TUNSETOWNER(r2, 0x400454cc, 0xee00) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {0x7}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x14, 0x5, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) 02:15:47 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', 0x0, &(0x7f0000000300)='security.capability\x00'], 0x0, 0x1000) ftruncate(r0, 0x1000003) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) write(0xffffffffffffffff, &(0x7f0000000200)="8b7876f31d04c964fa152d1f0d027a59e65dcc3a4fadec7a224e944bf39adf7d75e5163d473e1008f7300e2ffdcbcd73b569090e80415268326395e509a1cb3935a83c558bdcd0fa56006a5a3debe3c3c90ff414baa9bd893de667905d4c2b254b9475fbc380b4d96412cd1a", 0x6c) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x3, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@ipv4={'\x00', '\xff\xff', @dev}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0xa, @in, 0x0, 0x4, 0x0, 0xfc}}, 0xe8) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) accept(r2, 0x0, &(0x7f0000000100)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x9a) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x8000, 0x10) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0xe, 0x0, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xed14, 0xffffffff80000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1982.115316] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 1982.142006] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 02:15:47 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x8, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:15:47 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="3400000010000100cc680000000000000000000005000000000000001532336740e46387f800008064dcdc6ca616ef0dd0179be149f83265ff000ad022cea3b5906ed71efbac71604114ae634a1d3f5b42332fdb1ddff6c996d594f336ad93897a4c7c7d052c951ff3b19a2ae8dfe7daae4433b91e5be24f079e43a9066a68a1d63857237b3704f14d41e4376c1319a3cb91015718c602f3acaab637ceb7852dafdf71f385cfa97aa0b4888bc38b88bda6372e3668ad38b7f74f5579af15595a0c30e5611c48d698f5ab174fbc688112a84b0e6b16587fe1cca80147b9e1c0f1ed5b30c723ba82fe7b97990c195cdd6e5a3ec6986122d762e9182637b26db43c9871a7e08e00a222e27bb9eb35ce4745ffeda794f8f9b433cfaf77a5c151481692b680c9217e78cf5b4a110e4cf58a2481900e9ee69cdf0b73241206255494d36aa01416f7d0d0620f0b8526ca8484f212079b26fe05a315317995f2e147c5246ec242cda7921facafba1cf981b778d7b9333c9f88b53bf8b3a1c472d9869179a5d75ccaa1fa65e00d0b492e89e54f4d9ef4d61d2d7315ac264ed102185b46eef868a43ff0c84a79ac7dedfe21843442cfa03ab8fdf2c4a9967b518d211ddceeca7cce24735f1daf18a359c87c7c89a2011187f1b8d95f288434370c44a92d4dda3151ae0c5bb732e4baa5994bbe49e76eb2277e38c8f867d4a099cb00d9d38ca7bca38999cd3fc3b3ecb356302feed4b34c"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x8) execveat(r8, &(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000400)='\x00', &(0x7f0000000bc0)='\x00\x80C\x107\xa64\xee\xbd*\xd4o\x8a?[\x98\xf29\xee\xc7\x90\x97\xaa\xc3\xc8Zq\xf3\x91\x04[S\\B2m=V\x89\x99\x96Q\xcaA\x18\xaf\xaf:\xf1\xab\x80\"\x7f\xb3\x18\xfe\xd7\xbd\xcd\xcdIf\xae\xb5\x87\xb8#\xe1\xbe\xec\xf0\t\xa1\xf7\xa7\xb1\x9d\xc7\xc2\xf0\x02\xaf\xc4\xd0@\xc2\x12\'\xb9\x9a\xea\x90e%\xe6\xd2E\x19E/\xc6\x17gB0Qim\x82u\x0fZ\xa9\x14\xf5\xc7X\xa9\x00\xb7\xaf\xcfouN\xbd\xb2\t^\xbe&~\xa7l\xfa\x036\x1c\"\x80\xfc/\x9b\x95\xf1!K\xc5{\xe7\xfdB[\xca\x87\x9bc\x98dg\x1a\xa1\xaa\xb4\x19\x7f\xa7\x90y\x9fq\xf5\x8a\xa9 \xa6\xdd\xf0+gb\xa6g\\\xec\tz\x06\xdf\x1a\x9c\xc9\xf7\xcc\x85\xb4G\xe9\xd3D\xf4\x8c\n\x17\xd5\x00\xf18\xb3T', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000280)='@\x90\x9a\x7fl\x00\x00\x00\x00p\xc4S\x9ch\xceH9\x88\xf3c\xb4\xabz#\xa8\xbb5\xd3\xc8\x9b\x00\x00 \x00\x00\x00\x00\x00', 0x0, &(0x7f0000000a00)='\x009\x1c\xaf\x14\xe6\xeb\xe9\xf1\xccO@\xbd\xfc\xbdN\xfa\x93Z\x94\xfd\xc6]\xc3\x81g\x95\'\xb7\xf2\xe8\xbf\xd3\xf3\"\xf0Z\x93T\xa1\xc6\x10\x01\xba\xf0\x11\x01 \x94X\x7fQ\xa6\v\xfa\xc2\\$\xad\x96A\xd6\xdf|\x0e,c\xc4\x13\xfb\x91\xc5|{\xde\'xb\xcd\xb2\x177\x83\'\xdb\xf6y_\x10\x87\x01\xd4\xb1\x9b\xe4\xac\xf0D4\xe6v\x86\x02^bt\xbf!b\xd4k\x11\xf5Nj\x97P\b\xf2\xdd\r\xaa,g\xfc\x8f*\bq\x10wl\xe0\x02HG)\xa0\xb9%\x12\x9fx]\xf8Gz`\xfd\x00l\xe9<\xa5\xbd\x9f\x80\xa5\x0f\xd3\xf7\xc8\x98'], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000440)='\x00', &(0x7f0000000740)='\x10', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) 02:15:47 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x10000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000000100), 0xb}, 0x1c210, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x4}, 0x0, 0xd, 0xffffffffffffffff, 0x9) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5, r0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 02:15:47 executing program 5: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) 02:15:47 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x9effffff, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 02:15:47 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x1000000, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:15:47 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x9, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:15:47 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0xc00e0000, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 02:15:47 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', 0x0, &(0x7f0000000300)='security.capability\x00'], 0x0, 0x1000) ftruncate(r0, 0x1000003) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) write(0xffffffffffffffff, &(0x7f0000000200)="8b7876f31d04c964fa152d1f0d027a59e65dcc3a4fadec7a224e944bf39adf7d75e5163d473e1008f7300e2ffdcbcd73b569090e80415268326395e509a1cb3935a83c558bdcd0fa56006a5a3debe3c3c90ff414baa9bd893de667905d4c2b254b9475fbc380b4d96412cd1a", 0x6c) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x3, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@ipv4={'\x00', '\xff\xff', @dev}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0xa, @in, 0x0, 0x4, 0x0, 0xfc}}, 0xe8) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) accept(r2, 0x0, &(0x7f0000000100)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x9a) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x8000, 0x10) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0xe, 0x0, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) 02:15:47 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x8) execveat(r8, &(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000400)='\x00', &(0x7f0000000bc0)='\x00\x80C\x107\xa64\xee\xbd*\xd4o\x8a?[\x98\xf29\xee\xc7\x90\x97\xaa\xc3\xc8Zq\xf3\x91\x04[S\\B2m=V\x89\x99\x96Q\xcaA\x18\xaf\xaf:\xf1\xab\x80\"\x7f\xb3\x18\xfe\xd7\xbd\xcd\xcdIf\xae\xb5\x87\xb8#\xe1\xbe\xec\xf0\t\xa1\xf7\xa7\xb1\x9d\xc7\xc2\xf0\x02\xaf\xc4\xd0@\xc2\x12\'\xb9\x9a\xea\x90e%\xe6\xd2E\x19E/\xc6\x17gB0Qim\x82u\x0fZ\xa9\x14\xf5\xc7X\xa9\x00\xb7\xaf\xcfouN\xbd\xb2\t^\xbe&~\xa7l\xfa\x036\x1c\"\x80\xfc/\x9b\x95\xf1!K\xc5{\xe7\xfdB[\xca\x87\x9bc\x98dg\x1a\xa1\xaa\xb4\x19\x7f\xa7\x90y\x9fq\xf5\x8a\xa9 \xa6\xdd\xf0+gb\xa6g\\\xec\tz\x06\xdf\x1a\x9c\xc9\xf7\xcc\x85\xb4G\xe9\xd3D\xf4\x8c\n\x17\xd5\x00\xf18\xb3T', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000280)='@\x90\x9a\x7fl\x00\x00\x00\x00p\xc4S\x9ch\xceH9\x88\xf3c\xb4\xabz#\xa8\xbb5\xd3\xc8\x9b\x00\x00 \x00\x00\x00\x00\x00', 0x0, &(0x7f0000000a00)='\x009\x1c\xaf\x14\xe6\xeb\xe9\xf1\xccO@\xbd\xfc\xbdN\xfa\x93Z\x94\xfd\xc6]\xc3\x81g\x95\'\xb7\xf2\xe8\xbf\xd3\xf3\"\xf0Z\x93T\xa1\xc6\x10\x01\xba\xf0\x11\x01 \x94X\x7fQ\xa6\v\xfa\xc2\\$\xad\x96A\xd6\xdf|\x0e,c\xc4\x13\xfb\x91\xc5|{\xde\'xb\xcd\xb2\x177\x83\'\xdb\xf6y_\x10\x87\x01\xd4\xb1\x9b\xe4\xac\xf0D4\xe6v\x86\x02^bt\xbf!b\xd4k\x11\xf5Nj\x97P\b\xf2\xdd\r\xaa,g\xfc\x8f*\bq\x10wl\xe0\x02HG)\xa0\xb9%\x12\x9fx]\xf8Gz`\xfd\x00l\xe9<\xa5\xbd\x9f\x80\xa5\x0f\xd3\xf7\xc8\x98'], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000440)='\x00', &(0x7f0000000740)='\x10', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) [ 1982.350138] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 02:16:00 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x10000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={0x0, 0xb}, 0x1c210, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x4}, 0x0, 0xd, 0xffffffffffffffff, 0x9) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5, r0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 02:16:00 executing program 1: ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000140)) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x0, 0xee00}}, './file0\x00'}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r4 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x2) ioctl$FS_IOC_SETVERSION(r4, 0x40087602, &(0x7f0000000180)=0x8000) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, 0x0) fallocate(r3, 0x0, 0x10001, 0x100) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0x0, r3, 0x2}) openat(r2, &(0x7f0000000040)='./file0\x00', 0x20801, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 02:16:00 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x8) execveat(r8, &(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000400)='\x00', &(0x7f0000000bc0)='\x00\x80C\x107\xa64\xee\xbd*\xd4o\x8a?[\x98\xf29\xee\xc7\x90\x97\xaa\xc3\xc8Zq\xf3\x91\x04[S\\B2m=V\x89\x99\x96Q\xcaA\x18\xaf\xaf:\xf1\xab\x80\"\x7f\xb3\x18\xfe\xd7\xbd\xcd\xcdIf\xae\xb5\x87\xb8#\xe1\xbe\xec\xf0\t\xa1\xf7\xa7\xb1\x9d\xc7\xc2\xf0\x02\xaf\xc4\xd0@\xc2\x12\'\xb9\x9a\xea\x90e%\xe6\xd2E\x19E/\xc6\x17gB0Qim\x82u\x0fZ\xa9\x14\xf5\xc7X\xa9\x00\xb7\xaf\xcfouN\xbd\xb2\t^\xbe&~\xa7l\xfa\x036\x1c\"\x80\xfc/\x9b\x95\xf1!K\xc5{\xe7\xfdB[\xca\x87\x9bc\x98dg\x1a\xa1\xaa\xb4\x19\x7f\xa7\x90y\x9fq\xf5\x8a\xa9 \xa6\xdd\xf0+gb\xa6g\\\xec\tz\x06\xdf\x1a\x9c\xc9\xf7\xcc\x85\xb4G\xe9\xd3D\xf4\x8c\n\x17\xd5\x00\xf18\xb3T', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000540)='\x00', &(0x7f0000000a00)='\x009\x1c\xaf\x14\xe6\xeb\xe9\xf1\xccO@\xbd\xfc\xbdN\xfa\x93Z\x94\xfd\xc6]\xc3\x81g\x95\'\xb7\xf2\xe8\xbf\xd3\xf3\"\xf0Z\x93T\xa1\xc6\x10\x01\xba\xf0\x11\x01 \x94X\x7fQ\xa6\v\xfa\xc2\\$\xad\x96A\xd6\xdf|\x0e,c\xc4\x13\xfb\x91\xc5|{\xde\'xb\xcd\xb2\x177\x83\'\xdb\xf6y_\x10\x87\x01\xd4\xb1\x9b\xe4\xac\xf0D4\xe6v\x86\x02^bt\xbf!b\xd4k\x11\xf5Nj\x97P\b\xf2\xdd\r\xaa,g\xfc\x8f*\bq\x10wl\xe0\x02HG)\xa0\xb9%\x12\x9fx]\xf8Gz`\xfd\x00l\xe9<\xa5\xbd\x9f\x80\xa5\x0f\xd3\xf7\xc8\x98'], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000440)='\x00', &(0x7f0000000740)='\x10', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) 02:16:00 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0xc4020000, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 02:16:00 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', 0x0, &(0x7f0000000300)='security.capability\x00'], 0x0, 0x1000) ftruncate(r0, 0x1000003) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) write(0xffffffffffffffff, &(0x7f0000000200)="8b7876f31d04c964fa152d1f0d027a59e65dcc3a4fadec7a224e944bf39adf7d75e5163d473e1008f7300e2ffdcbcd73b569090e80415268326395e509a1cb3935a83c558bdcd0fa56006a5a3debe3c3c90ff414baa9bd893de667905d4c2b254b9475fbc380b4d96412cd1a", 0x6c) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x3, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@ipv4={'\x00', '\xff\xff', @dev}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0xa, @in, 0x0, 0x4, 0x0, 0xfc}}, 0xe8) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) accept(r2, 0x0, &(0x7f0000000100)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x9a) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x8000, 0x10) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0xe, 0x0, 0x0) 02:16:00 executing program 5: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) 02:16:00 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0xf, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:16:00 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x2000000, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) [ 1995.868642] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 02:16:01 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', 0x0, &(0x7f0000000300)='security.capability\x00'], 0x0, 0x1000) ftruncate(r0, 0x1000003) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) write(0xffffffffffffffff, &(0x7f0000000200)="8b7876f31d04c964fa152d1f0d027a59e65dcc3a4fadec7a224e944bf39adf7d75e5163d473e1008f7300e2ffdcbcd73b569090e80415268326395e509a1cb3935a83c558bdcd0fa56006a5a3debe3c3c90ff414baa9bd893de667905d4c2b254b9475fbc380b4d96412cd1a", 0x6c) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x3, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@ipv4={'\x00', '\xff\xff', @dev}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0xa, @in, 0x0, 0x4, 0x0, 0xfc}}, 0xe8) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) accept(r2, 0x0, &(0x7f0000000100)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x9a) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x8000, 0x10) 02:16:16 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x3000000, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:16:16 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x300, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:16:16 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x10000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={0x0, 0xb}, 0x1c210, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x4}, 0x0, 0xd, 0xffffffffffffffff, 0x9) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5, r0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 02:16:16 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) inotify_add_watch(r4, &(0x7f0000000000)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r4, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffffffffffffffff, 0xee01}}, './file0\x00'}) ioctl$EXT4_IOC_GROUP_EXTEND(r5, 0x40086607, &(0x7f0000000080)=0xc0) fsetxattr$security_ima(r1, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="0b00001b2f8d6f26d8b8ecce294f1adeb23413980931d3c606b15e27cd7ce7447a22fa5fbe96f51ca7e9c5ec5929a4c3d1ea59913339612d12148bfe565d20feef6ca8455b751964dbdc66b25c2fb8f6d37751761bd0c6d61c99d7543dfec332cef460218575f5b6ea45bf8ebea427937ec800d10dad1e4dcf6294204b59a239d0999467ca8b5983985c6c4eef7d7a58b30cedef573b22ca77"], 0x3, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x15, &(0x7f00000005c0)=0x6, 0x4) ioctl$F2FS_IOC_GET_FEATURES(r5, 0x8004f50c, &(0x7f0000000100)) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$HIDIOCINITREPORT(r6, 0x550c, 0x20000000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) stat(&(0x7f0000001cc0)='.\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB=',access=', @ANYRESDEC=0x0, @ANYBLOB=',afid=0x00000000000001,\x00']) 02:16:16 executing program 5: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) (fail_nth: 1) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) 02:16:16 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', 0x0, &(0x7f0000000300)='security.capability\x00'], 0x0, 0x1000) ftruncate(r0, 0x1000003) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) write(0xffffffffffffffff, &(0x7f0000000200)="8b7876f31d04c964fa152d1f0d027a59e65dcc3a4fadec7a224e944bf39adf7d75e5163d473e1008f7300e2ffdcbcd73b569090e80415268326395e509a1cb3935a83c558bdcd0fa56006a5a3debe3c3c90ff414baa9bd893de667905d4c2b254b9475fbc380b4d96412cd1a", 0x6c) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x3, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@ipv4={'\x00', '\xff\xff', @dev}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0xa, @in, 0x0, 0x4, 0x0, 0xfc}}, 0xe8) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) accept(r2, 0x0, &(0x7f0000000100)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x9a) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) 02:16:16 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x8) execveat(r8, &(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000400)='\x00', &(0x7f0000000bc0)='\x00\x80C\x107\xa64\xee\xbd*\xd4o\x8a?[\x98\xf29\xee\xc7\x90\x97\xaa\xc3\xc8Zq\xf3\x91\x04[S\\B2m=V\x89\x99\x96Q\xcaA\x18\xaf\xaf:\xf1\xab\x80\"\x7f\xb3\x18\xfe\xd7\xbd\xcd\xcdIf\xae\xb5\x87\xb8#\xe1\xbe\xec\xf0\t\xa1\xf7\xa7\xb1\x9d\xc7\xc2\xf0\x02\xaf\xc4\xd0@\xc2\x12\'\xb9\x9a\xea\x90e%\xe6\xd2E\x19E/\xc6\x17gB0Qim\x82u\x0fZ\xa9\x14\xf5\xc7X\xa9\x00\xb7\xaf\xcfouN\xbd\xb2\t^\xbe&~\xa7l\xfa\x036\x1c\"\x80\xfc/\x9b\x95\xf1!K\xc5{\xe7\xfdB[\xca\x87\x9bc\x98dg\x1a\xa1\xaa\xb4\x19\x7f\xa7\x90y\x9fq\xf5\x8a\xa9 \xa6\xdd\xf0+gb\xa6g\\\xec\tz\x06\xdf\x1a\x9c\xc9\xf7\xcc\x85\xb4G\xe9\xd3D\xf4\x8c\n\x17\xd5\x00\xf18\xb3T', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000540)='\x00', &(0x7f0000000a00)='\x009\x1c\xaf\x14\xe6\xeb\xe9\xf1\xccO@\xbd\xfc\xbdN\xfa\x93Z\x94\xfd\xc6]\xc3\x81g\x95\'\xb7\xf2\xe8\xbf\xd3\xf3\"\xf0Z\x93T\xa1\xc6\x10\x01\xba\xf0\x11\x01 \x94X\x7fQ\xa6\v\xfa\xc2\\$\xad\x96A\xd6\xdf|\x0e,c\xc4\x13\xfb\x91\xc5|{\xde\'xb\xcd\xb2\x177\x83\'\xdb\xf6y_\x10\x87\x01\xd4\xb1\x9b\xe4\xac\xf0D4\xe6v\x86\x02^bt\xbf!b\xd4k\x11\xf5Nj\x97P\b\xf2\xdd\r\xaa,g\xfc\x8f*\bq\x10wl\xe0\x02HG)\xa0\xb9%\x12\x9fx]\xf8Gz`\xfd\x00l\xe9<\xa5\xbd\x9f\x80\xa5\x0f\xd3\xf7\xc8\x98'], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000440)='\x00', &(0x7f0000000740)='\x10', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) 02:16:16 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0xf0ffffff, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) [ 2010.944053] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2010.963250] FAULT_INJECTION: forcing a failure. [ 2010.963250] name failslab, interval 1, probability 0, space 0, times 0 [ 2010.965187] CPU: 0 PID: 12106 Comm: syz-executor.5 Not tainted 5.10.226 #1 [ 2010.966174] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2010.967377] Call Trace: [ 2010.967779] dump_stack+0x107/0x167 [ 2010.968310] should_fail.cold+0x5/0xa [ 2010.968876] should_failslab+0x5/0x20 [ 2010.969434] __kmalloc_track_caller+0x79/0x370 [ 2010.970101] ? strndup_user+0x74/0xe0 [ 2010.970659] memdup_user+0x22/0xd0 [ 2010.971184] strndup_user+0x74/0xe0 [ 2010.971733] __x64_sys_mount+0x133/0x300 [ 2010.972317] ? copy_mnt_ns+0xa00/0xa00 [ 2010.972899] do_syscall_64+0x33/0x40 [ 2010.973431] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2010.974168] RIP: 0033:0x7f6142476b19 [ 2010.974705] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2010.977370] RSP: 002b:00007f613f9ec188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2010.978481] RAX: ffffffffffffffda RBX: 00007f6142589f60 RCX: 00007f6142476b19 [ 2010.979528] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 0000000000000000 [ 2010.980569] RBP: 00007f613f9ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2010.981607] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2010.982641] R13: 00007ffcef2b488f R14: 00007f613f9ec300 R15: 0000000000022000 02:16:16 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', 0x0, &(0x7f0000000300)='security.capability\x00'], 0x0, 0x1000) ftruncate(r0, 0x1000003) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) write(0xffffffffffffffff, &(0x7f0000000200)="8b7876f31d04c964fa152d1f0d027a59e65dcc3a4fadec7a224e944bf39adf7d75e5163d473e1008f7300e2ffdcbcd73b569090e80415268326395e509a1cb3935a83c558bdcd0fa56006a5a3debe3c3c90ff414baa9bd893de667905d4c2b254b9475fbc380b4d96412cd1a", 0x6c) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x3, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@ipv4={'\x00', '\xff\xff', @dev}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0xa, @in, 0x0, 0x4, 0x0, 0xfc}}, 0xe8) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) accept(r2, 0x0, &(0x7f0000000100)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x9a) 02:16:16 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x4000000, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:16:16 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x500, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:16:16 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0xfffff000, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 02:16:16 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="3400000010000100cc680000000000000000000005000000000000001532336740e46387f800008064dcdc6ca616ef0dd0179be149f83265ff000ad022cea3b5906ed71efbac71604114ae634a1d3f5b42332fdb1ddff6c996d594f336ad93897a4c7c7d052c951ff3b19a2ae8dfe7daae4433b91e5be24f079e43a9066a68a1d63857237b3704f14d41e4376c1319a3cb91015718c602f3acaab637ceb7852dafdf71f385cfa97aa0b4888bc38b88bda6372e3668ad38b7f74f5579af15595a0c30e5611c48d698f5ab174fbc688112a84b0e6b16587fe1cca80147b9e1c0f1ed5b30c723ba82fe7b97990c195cdd6e5a3ec6986122d762e9182637b26db43c9871a7e08e00a222e27bb9eb35ce4745ffeda794f8f9b433cfaf77a5c151481692b680c9217e78cf5b4a110e4cf58a2481900e9ee69cdf0b73241206255494d36aa01416f7d0d0620f0b8526ca8484f212079b26fe05a315317995f2e147c5246ec242cda7921facafba1cf981b778d7b9333c9f88b53bf8b3a1c472d9869179a5d75ccaa1fa65e00d0b492e89e54f4d9ef4d61d2d7315ac264ed102185b46eef868a43ff0c84a79ac7dedfe21843442cfa03ab8fdf2c4a9967b518d211ddceeca7cce24735f1daf18a359c87c7c89a2011187f1b8d95f288434370c44a92d4dda3151ae0c5bb732e4baa5994bbe49e76eb2277e38c8f867d4a099cb00d9d38ca7bca38999cd3fc3b3ecb356302feed4b34c"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x8) execveat(r8, &(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000400)='\x00', &(0x7f0000000bc0)='\x00\x80C\x107\xa64\xee\xbd*\xd4o\x8a?[\x98\xf29\xee\xc7\x90\x97\xaa\xc3\xc8Zq\xf3\x91\x04[S\\B2m=V\x89\x99\x96Q\xcaA\x18\xaf\xaf:\xf1\xab\x80\"\x7f\xb3\x18\xfe\xd7\xbd\xcd\xcdIf\xae\xb5\x87\xb8#\xe1\xbe\xec\xf0\t\xa1\xf7\xa7\xb1\x9d\xc7\xc2\xf0\x02\xaf\xc4\xd0@\xc2\x12\'\xb9\x9a\xea\x90e%\xe6\xd2E\x19E/\xc6\x17gB0Qim\x82u\x0fZ\xa9\x14\xf5\xc7X\xa9\x00\xb7\xaf\xcfouN\xbd\xb2\t^\xbe&~\xa7l\xfa\x036\x1c\"\x80\xfc/\x9b\x95\xf1!K\xc5{\xe7\xfdB[\xca\x87\x9bc\x98dg\x1a\xa1\xaa\xb4\x19\x7f\xa7\x90y\x9fq\xf5\x8a\xa9 \xa6\xdd\xf0+gb\xa6g\\\xec\tz\x06\xdf\x1a\x9c\xc9\xf7\xcc\x85\xb4G\xe9\xd3D\xf4\x8c\n\x17\xd5\x00\xf18\xb3T', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000540)='\x00', &(0x7f0000000a00)='\x009\x1c\xaf\x14\xe6\xeb\xe9\xf1\xccO@\xbd\xfc\xbdN\xfa\x93Z\x94\xfd\xc6]\xc3\x81g\x95\'\xb7\xf2\xe8\xbf\xd3\xf3\"\xf0Z\x93T\xa1\xc6\x10\x01\xba\xf0\x11\x01 \x94X\x7fQ\xa6\v\xfa\xc2\\$\xad\x96A\xd6\xdf|\x0e,c\xc4\x13\xfb\x91\xc5|{\xde\'xb\xcd\xb2\x177\x83\'\xdb\xf6y_\x10\x87\x01\xd4\xb1\x9b\xe4\xac\xf0D4\xe6v\x86\x02^bt\xbf!b\xd4k\x11\xf5Nj\x97P\b\xf2\xdd\r\xaa,g\xfc\x8f*\bq\x10wl\xe0\x02HG)\xa0\xb9%\x12\x9fx]\xf8Gz`\xfd\x00l\xe9<\xa5\xbd\x9f\x80\xa5\x0f\xd3\xf7\xc8\x98'], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000440)='\x00', &(0x7f0000000740)='\x10', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) 02:16:16 executing program 5: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) (fail_nth: 2) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) [ 2011.191946] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 02:16:16 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x10000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={0x0, 0xb}, 0x1c210, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x4}, 0x0, 0xd, 0xffffffffffffffff, 0x9) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5, r0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 02:16:16 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x5000000, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:16:16 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', 0x0, &(0x7f0000000300)='security.capability\x00'], 0x0, 0x1000) ftruncate(r0, 0x1000003) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) write(0xffffffffffffffff, &(0x7f0000000200)="8b7876f31d04c964fa152d1f0d027a59e65dcc3a4fadec7a224e944bf39adf7d75e5163d473e1008f7300e2ffdcbcd73b569090e80415268326395e509a1cb3935a83c558bdcd0fa56006a5a3debe3c3c90ff414baa9bd893de667905d4c2b254b9475fbc380b4d96412cd1a", 0x6c) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x3, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@ipv4={'\x00', '\xff\xff', @dev}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0xa, @in, 0x0, 0x4, 0x0, 0xfc}}, 0xe8) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) accept(r2, 0x0, &(0x7f0000000100)) 02:16:16 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x600, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:16:16 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0xffffff7f, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) [ 2011.298261] FAULT_INJECTION: forcing a failure. [ 2011.298261] name failslab, interval 1, probability 0, space 0, times 0 [ 2011.300185] CPU: 0 PID: 12157 Comm: syz-executor.5 Not tainted 5.10.226 #1 [ 2011.301201] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2011.302402] Call Trace: [ 2011.302811] dump_stack+0x107/0x167 [ 2011.303351] should_fail.cold+0x5/0xa [ 2011.303943] ? create_object.isra.0+0x3a/0xa20 [ 2011.304620] should_failslab+0x5/0x20 [ 2011.305183] kmem_cache_alloc+0x5b/0x310 [ 2011.305777] create_object.isra.0+0x3a/0xa20 [ 2011.306410] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2011.307152] __kmalloc_track_caller+0x177/0x370 [ 2011.307814] ? strndup_user+0x74/0xe0 [ 2011.308369] memdup_user+0x22/0xd0 [ 2011.308890] strndup_user+0x74/0xe0 [ 2011.309416] __x64_sys_mount+0x133/0x300 [ 2011.310007] ? copy_mnt_ns+0xa00/0xa00 [ 2011.310580] do_syscall_64+0x33/0x40 [ 2011.311117] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2011.311861] RIP: 0033:0x7f6142476b19 [ 2011.312400] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2011.314955] RSP: 002b:00007f613f9ec188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2011.316054] RAX: ffffffffffffffda RBX: 00007f6142589f60 RCX: 00007f6142476b19 [ 2011.317043] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 0000000000000000 [ 2011.318063] RBP: 00007f613f9ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2011.319059] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2011.320094] R13: 00007ffcef2b488f R14: 00007f613f9ec300 R15: 0000000000022000 02:16:16 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', 0x0, &(0x7f0000000300)='security.capability\x00'], 0x0, 0x1000) ftruncate(r0, 0x1000003) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) write(0xffffffffffffffff, &(0x7f0000000200)="8b7876f31d04c964fa152d1f0d027a59e65dcc3a4fadec7a224e944bf39adf7d75e5163d473e1008f7300e2ffdcbcd73b569090e80415268326395e509a1cb3935a83c558bdcd0fa56006a5a3debe3c3c90ff414baa9bd893de667905d4c2b254b9475fbc380b4d96412cd1a", 0x6c) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x3, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@ipv4={'\x00', '\xff\xff', @dev}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0xa, @in, 0x0, 0x4, 0x0, 0xfc}}, 0xe8) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 02:16:16 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="3400000010000100cc680000000000000000000005000000000000001532336740e46387f800008064dcdc6ca616ef0dd0179be149f83265ff000ad022cea3b5906ed71efbac71604114ae634a1d3f5b42332fdb1ddff6c996d594f336ad93897a4c7c7d052c951ff3b19a2ae8dfe7daae4433b91e5be24f079e43a9066a68a1d63857237b3704f14d41e4376c1319a3cb91015718c602f3acaab637ceb7852dafdf71f385cfa97aa0b4888bc38b88bda6372e3668ad38b7f74f5579af15595a0c30e5611c48d698f5ab174fbc688112a84b0e6b16587fe1cca80147b9e1c0f1ed5b30c723ba82fe7b97990c195cdd6e5a3ec6986122d762e9182637b26db43c9871a7e08e00a222e27bb9eb35ce4745ffeda794f8f9b433cfaf77a5c151481692b680c9217e78cf5b4a110e4cf58a2481900e9ee69cdf0b73241206255494d36aa01416f7d0d0620f0b8526ca8484f212079b26fe05a315317995f2e147c5246ec242cda7921facafba1cf981b778d7b9333c9f88b53bf8b3a1c472d9869179a5d75ccaa1fa65e00d0b492e89e54f4d9ef4d61d2d7315ac264ed102185b46eef868a43ff0c84a79ac7dedfe21843442cfa03ab8fdf2c4a9967b518d211ddceeca7cce24735f1daf18a359c87c7c89a2011187f1b8d95f288434370c44a92d4dda3151ae0c5bb732e4baa5994bbe49e76eb2277e38c8f867d4a099cb00d9d38ca7bca38999cd3fc3b3ecb356302feed4b34c"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x8) execveat(r8, &(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000400)='\x00', &(0x7f0000000bc0)='\x00\x80C\x107\xa64\xee\xbd*\xd4o\x8a?[\x98\xf29\xee\xc7\x90\x97\xaa\xc3\xc8Zq\xf3\x91\x04[S\\B2m=V\x89\x99\x96Q\xcaA\x18\xaf\xaf:\xf1\xab\x80\"\x7f\xb3\x18\xfe\xd7\xbd\xcd\xcdIf\xae\xb5\x87\xb8#\xe1\xbe\xec\xf0\t\xa1\xf7\xa7\xb1\x9d\xc7\xc2\xf0\x02\xaf\xc4\xd0@\xc2\x12\'\xb9\x9a\xea\x90e%\xe6\xd2E\x19E/\xc6\x17gB0Qim\x82u\x0fZ\xa9\x14\xf5\xc7X\xa9\x00\xb7\xaf\xcfouN\xbd\xb2\t^\xbe&~\xa7l\xfa\x036\x1c\"\x80\xfc/\x9b\x95\xf1!K\xc5{\xe7\xfdB[\xca\x87\x9bc\x98dg\x1a\xa1\xaa\xb4\x19\x7f\xa7\x90y\x9fq\xf5\x8a\xa9 \xa6\xdd\xf0+gb\xa6g\\\xec\tz\x06\xdf\x1a\x9c\xc9\xf7\xcc\x85\xb4G\xe9\xd3D\xf4\x8c\n\x17\xd5\x00\xf18\xb3T', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='\x00', 0x0, &(0x7f0000000540)='\x00', &(0x7f0000000a00)='\x009\x1c\xaf\x14\xe6\xeb\xe9\xf1\xccO@\xbd\xfc\xbdN\xfa\x93Z\x94\xfd\xc6]\xc3\x81g\x95\'\xb7\xf2\xe8\xbf\xd3\xf3\"\xf0Z\x93T\xa1\xc6\x10\x01\xba\xf0\x11\x01 \x94X\x7fQ\xa6\v\xfa\xc2\\$\xad\x96A\xd6\xdf|\x0e,c\xc4\x13\xfb\x91\xc5|{\xde\'xb\xcd\xb2\x177\x83\'\xdb\xf6y_\x10\x87\x01\xd4\xb1\x9b\xe4\xac\xf0D4\xe6v\x86\x02^bt\xbf!b\xd4k\x11\xf5Nj\x97P\b\xf2\xdd\r\xaa,g\xfc\x8f*\bq\x10wl\xe0\x02HG)\xa0\xb9%\x12\x9fx]\xf8Gz`\xfd\x00l\xe9<\xa5\xbd\x9f\x80\xa5\x0f\xd3\xf7\xc8\x98'], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000440)='\x00', &(0x7f0000000740)='\x10', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) 02:16:16 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x700, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:16:16 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x6000000, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) [ 2011.433269] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 02:16:16 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x0, 0x0) fsetxattr$system_posix_acl(r1, &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="020000000800000000000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), &(0x7f0000000100), 0x2, 0x1) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)={0x18, r3, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x4}]}, 0x18}}, 0x0) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0xf0, r3, 0x100, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_EEE_TX_LPI_TIMER={0x8}, @ETHTOOL_A_EEE_MODES_OURS={0xd4, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0xc7, 0x5, "c4cf801a0473812baff58aa50b8a57916a230fe0c4bfb8445e35caac2a904b2ea1fd57994dd39bef8b4ed1e4d0e3d1e28222f8e3ac41c7c5b0e54ac50533be8e6dbc653215643b916330d65de9b3a23042ec8716229613c7979c60fc5639f7760f1f6fd71d7b13cec481b58119a2f77a986e278d7576d780d6eb3591f2af11868d538aada9b66f2c1d85cfe48079f4c37f5d038e6da1fc6f3bc61eba39701beea7092c6daddb26fcbbd1e7774b295f6d4778b381efb03fd42edd4944578f2b3477ead3"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xd180908}]}]}, 0xf0}, 0x1, 0x0, 0x0, 0x8000}, 0x40) 02:16:16 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0xffffff9e, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 02:16:30 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0xfffffff0, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 02:16:30 executing program 5: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) (fail_nth: 3) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) 02:16:30 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x10000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100)}, 0x1c210, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x4}, 0x0, 0xd, 0xffffffffffffffff, 0x9) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5, r0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) [ 2024.999414] FAULT_INJECTION: forcing a failure. 02:16:30 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='hugetlbfs\x00', 0x0, 0x0) mkdir(&(0x7f00000008c0)='./mnt/file0\x00', 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='freezer.state\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt/file0\x00', 0x2) r1 = openat2(r0, &(0x7f00000001c0)='./mnt\x00', &(0x7f0000000200)={0x189200, 0x1c0, 0x19}, 0x18) openat$cgroup_int(r1, &(0x7f0000000300)='pids.max\x00', 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r2) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_START_AP(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x88, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@beacon=[@NL80211_ATTR_BEACON_HEAD={0x28, 0xe, {@wo_ht={{}, {}, @broadcast, @device_a, @from_mac}, 0x0, @default, 0x1, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void}}], @NL80211_ATTR_HE_OBSS_PD={0x1c, 0x117, 0x0, 0x1, [@NL80211_HE_OBSS_PD_ATTR_MIN_OFFSET={0x5, 0x1, 0x3}, @NL80211_HE_OBSS_PD_ATTR_MAX_OFFSET={0x5, 0x2, 0x6}, @NL80211_HE_OBSS_PD_ATTR_MIN_OFFSET={0x5, 0x1, 0x3}]}, @NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_DTIM_PERIOD={0x8}, @NL80211_ATTR_SSID={0xa, 0x34, @default_ap_ssid}, @NL80211_ATTR_AUTH_TYPE={0x8}, @NL80211_ATTR_EXTERNAL_AUTH_SUPPORT={0x4}]}, 0x88}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000380)=ANY=[@ANYBLOB="0100000001000000180000005162dfdf5247259fa8576af2d12bc5a3c6fa790ee4b7bc8989cbfb4aa3ee72f2681735b1ff6cc6c940b40d86f8000b245a52f93e8a4d88f9342f64d449598caa6376eaae650207b04cab6bb85adfc178494627f305fe7e79ab3624214e98dad60a70d686f851d820e68e199caf176f96caa1cd7ba0abc5f05c7a9682a55117b1c27f3e100ac5e291b5672b9cbb3d0d4320c245c28718635e1e87b5cba2da5c88eb98fe4c1468c0cdcb3d1e1759e0000000", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./mnt\x00']) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x2868c3, 0x180) 02:16:30 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="3400000010000100cc680000000000000000000005000000000000001532336740e46387f800008064dcdc6ca616ef0dd0179be149f83265ff000ad022cea3b5906ed71efbac71604114ae634a1d3f5b42332fdb1ddff6c996d594f336ad93897a4c7c7d052c951ff3b19a2ae8dfe7daae4433b91e5be24f079e43a9066a68a1d63857237b3704f14d41e4376c1319a3cb91015718c602f3acaab637ceb7852dafdf71f385cfa97aa0b4888bc38b88bda6372e3668ad38b7f74f5579af15595a0c30e5611c48d698f5ab174fbc688112a84b0e6b16587fe1cca80147b9e1c0f1ed5b30c723ba82fe7b97990c195cdd6e5a3ec6986122d762e9182637b26db43c9871a7e08e00a222e27bb9eb35ce4745ffeda794f8f9b433cfaf77a5c151481692b680c9217e78cf5b4a110e4cf58a2481900e9ee69cdf0b73241206255494d36aa01416f7d0d0620f0b8526ca8484f212079b26fe05a315317995f2e147c5246ec242cda7921facafba1cf981b778d7b9333c9f88b53bf8b3a1c472d9869179a5d75ccaa1fa65e00d0b492e89e54f4d9ef4d61d2d7315ac264ed102185b46eef868a43ff0c84a79ac7dedfe21843442cfa03ab8fdf2c4a9967b518d211ddceeca7cce24735f1daf18a359c87c7c89a2011187f1b8d95f288434370c44a92d4dda3151ae0c5bb732e4baa5994bbe49e76eb2277e38c8f867d4a099cb00d9d38ca7bca38999cd3fc3b3ecb356302feed4b34c"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x8) execveat(r8, &(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000400)='\x00', &(0x7f0000000bc0)='\x00\x80C\x107\xa64\xee\xbd*\xd4o\x8a?[\x98\xf29\xee\xc7\x90\x97\xaa\xc3\xc8Zq\xf3\x91\x04[S\\B2m=V\x89\x99\x96Q\xcaA\x18\xaf\xaf:\xf1\xab\x80\"\x7f\xb3\x18\xfe\xd7\xbd\xcd\xcdIf\xae\xb5\x87\xb8#\xe1\xbe\xec\xf0\t\xa1\xf7\xa7\xb1\x9d\xc7\xc2\xf0\x02\xaf\xc4\xd0@\xc2\x12\'\xb9\x9a\xea\x90e%\xe6\xd2E\x19E/\xc6\x17gB0Qim\x82u\x0fZ\xa9\x14\xf5\xc7X\xa9\x00\xb7\xaf\xcfouN\xbd\xb2\t^\xbe&~\xa7l\xfa\x036\x1c\"\x80\xfc/\x9b\x95\xf1!K\xc5{\xe7\xfdB[\xca\x87\x9bc\x98dg\x1a\xa1\xaa\xb4\x19\x7f\xa7\x90y\x9fq\xf5\x8a\xa9 \xa6\xdd\xf0+gb\xa6g\\\xec\tz\x06\xdf\x1a\x9c\xc9\xf7\xcc\x85\xb4G\xe9\xd3D\xf4\x8c\n\x17\xd5\x00\xf18\xb3T', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='\x00', 0x0, &(0x7f0000000540)='\x00', &(0x7f0000000a00)='\x009\x1c\xaf\x14\xe6\xeb\xe9\xf1\xccO@\xbd\xfc\xbdN\xfa\x93Z\x94\xfd\xc6]\xc3\x81g\x95\'\xb7\xf2\xe8\xbf\xd3\xf3\"\xf0Z\x93T\xa1\xc6\x10\x01\xba\xf0\x11\x01 \x94X\x7fQ\xa6\v\xfa\xc2\\$\xad\x96A\xd6\xdf|\x0e,c\xc4\x13\xfb\x91\xc5|{\xde\'xb\xcd\xb2\x177\x83\'\xdb\xf6y_\x10\x87\x01\xd4\xb1\x9b\xe4\xac\xf0D4\xe6v\x86\x02^bt\xbf!b\xd4k\x11\xf5Nj\x97P\b\xf2\xdd\r\xaa,g\xfc\x8f*\bq\x10wl\xe0\x02HG)\xa0\xb9%\x12\x9fx]\xf8Gz`\xfd\x00l\xe9<\xa5\xbd\x9f\x80\xa5\x0f\xd3\xf7\xc8\x98'], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000440)='\x00', &(0x7f0000000740)='\x10', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) 02:16:30 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x7000000, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:16:30 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', 0x0, &(0x7f0000000300)='security.capability\x00'], 0x0, 0x1000) ftruncate(r0, 0x1000003) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) write(0xffffffffffffffff, &(0x7f0000000200)="8b7876f31d04c964fa152d1f0d027a59e65dcc3a4fadec7a224e944bf39adf7d75e5163d473e1008f7300e2ffdcbcd73b569090e80415268326395e509a1cb3935a83c558bdcd0fa56006a5a3debe3c3c90ff414baa9bd893de667905d4c2b254b9475fbc380b4d96412cd1a", 0x6c) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x3, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 02:16:30 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x900, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) [ 2024.999414] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2025.001848] CPU: 1 PID: 12374 Comm: syz-executor.5 Not tainted 5.10.226 #1 [ 2025.002923] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2025.004153] Call Trace: [ 2025.004575] dump_stack+0x107/0x167 [ 2025.005115] should_fail.cold+0x5/0xa [ 2025.005704] _copy_from_user+0x2e/0x1b0 [ 2025.006313] memdup_user+0x65/0xd0 [ 2025.006849] strndup_user+0x74/0xe0 [ 2025.007421] __x64_sys_mount+0x133/0x300 [ 2025.008044] ? copy_mnt_ns+0xa00/0xa00 [ 2025.008657] do_syscall_64+0x33/0x40 [ 2025.009204] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2025.009953] RIP: 0033:0x7f6142476b19 [ 2025.010505] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2025.013280] RSP: 002b:00007f613f9ec188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2025.014402] RAX: ffffffffffffffda RBX: 00007f6142589f60 RCX: 00007f6142476b19 [ 2025.015482] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 0000000000000000 [ 2025.016575] RBP: 00007f613f9ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2025.017651] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2025.018705] R13: 00007ffcef2b488f R14: 00007f613f9ec300 R15: 0000000000022000 [ 2025.040956] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 02:16:30 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', 0x0, &(0x7f0000000300)='security.capability\x00'], 0x0, 0x1000) ftruncate(r0, 0x1000003) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) write(0xffffffffffffffff, &(0x7f0000000200)="8b7876f31d04c964fa152d1f0d027a59e65dcc3a4fadec7a224e944bf39adf7d75e5163d473e1008f7300e2ffdcbcd73b569090e80415268326395e509a1cb3935a83c558bdcd0fa56006a5a3debe3c3c90ff414baa9bd893de667905d4c2b254b9475fbc380b4d96412cd1a", 0x6c) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x3, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 02:16:30 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x9000000, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:16:30 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0xffffffff, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 02:16:30 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', 0x0, &(0x7f0000000300)='security.capability\x00'], 0x0, 0x1000) ftruncate(r0, 0x1000003) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) write(0xffffffffffffffff, &(0x7f0000000200)="8b7876f31d04c964fa152d1f0d027a59e65dcc3a4fadec7a224e944bf39adf7d75e5163d473e1008f7300e2ffdcbcd73b569090e80415268326395e509a1cb3935a83c558bdcd0fa56006a5a3debe3c3c90ff414baa9bd893de667905d4c2b254b9475fbc380b4d96412cd1a", 0x6c) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x3, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 02:16:30 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0xf00, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:16:30 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0xf000000, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:16:30 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0xf, r1, 0xd8499488957a772f, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 02:16:30 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', 0x0, &(0x7f0000000300)='security.capability\x00'], 0x0, 0x1000) ftruncate(r0, 0x1000003) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) write(0xffffffffffffffff, &(0x7f0000000200)="8b7876f31d04c964fa152d1f0d027a59e65dcc3a4fadec7a224e944bf39adf7d75e5163d473e1008f7300e2ffdcbcd73b569090e80415268326395e509a1cb3935a83c558bdcd0fa56006a5a3debe3c3c90ff414baa9bd893de667905d4c2b254b9475fbc380b4d96412cd1a", 0x6c) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x3, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@ipv4={'\x00', '\xff\xff', @dev}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0xa, @in, 0x0, 0x4, 0x0, 0xfc}}, 0xe8) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 02:16:45 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', 0x0, &(0x7f0000000300)='security.capability\x00'], 0x0, 0x1000) ftruncate(r0, 0x1000003) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) write(0xffffffffffffffff, &(0x7f0000000200)="8b7876f31d04c964fa152d1f0d027a59e65dcc3a4fadec7a224e944bf39adf7d75e5163d473e1008f7300e2ffdcbcd73b569090e80415268326395e509a1cb3935a83c558bdcd0fa56006a5a3debe3c3c90ff414baa9bd893de667905d4c2b254b9475fbc380b4d96412cd1a", 0x6c) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x3, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@ipv4={'\x00', '\xff\xff', @dev}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0xa, @in, 0x0, 0x4, 0x0, 0xfc}}, 0xe8) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 02:16:45 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0xffffff7f, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:16:45 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x8) execveat(r8, &(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000400)='\x00', &(0x7f0000000bc0)='\x00\x80C\x107\xa64\xee\xbd*\xd4o\x8a?[\x98\xf29\xee\xc7\x90\x97\xaa\xc3\xc8Zq\xf3\x91\x04[S\\B2m=V\x89\x99\x96Q\xcaA\x18\xaf\xaf:\xf1\xab\x80\"\x7f\xb3\x18\xfe\xd7\xbd\xcd\xcdIf\xae\xb5\x87\xb8#\xe1\xbe\xec\xf0\t\xa1\xf7\xa7\xb1\x9d\xc7\xc2\xf0\x02\xaf\xc4\xd0@\xc2\x12\'\xb9\x9a\xea\x90e%\xe6\xd2E\x19E/\xc6\x17gB0Qim\x82u\x0fZ\xa9\x14\xf5\xc7X\xa9\x00\xb7\xaf\xcfouN\xbd\xb2\t^\xbe&~\xa7l\xfa\x036\x1c\"\x80\xfc/\x9b\x95\xf1!K\xc5{\xe7\xfdB[\xca\x87\x9bc\x98dg\x1a\xa1\xaa\xb4\x19\x7f\xa7\x90y\x9fq\xf5\x8a\xa9 \xa6\xdd\xf0+gb\xa6g\\\xec\tz\x06\xdf\x1a\x9c\xc9\xf7\xcc\x85\xb4G\xe9\xd3D\xf4\x8c\n\x17\xd5\x00\xf18\xb3T', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='\x00', 0x0, &(0x7f0000000540)='\x00', &(0x7f0000000a00)='\x009\x1c\xaf\x14\xe6\xeb\xe9\xf1\xccO@\xbd\xfc\xbdN\xfa\x93Z\x94\xfd\xc6]\xc3\x81g\x95\'\xb7\xf2\xe8\xbf\xd3\xf3\"\xf0Z\x93T\xa1\xc6\x10\x01\xba\xf0\x11\x01 \x94X\x7fQ\xa6\v\xfa\xc2\\$\xad\x96A\xd6\xdf|\x0e,c\xc4\x13\xfb\x91\xc5|{\xde\'xb\xcd\xb2\x177\x83\'\xdb\xf6y_\x10\x87\x01\xd4\xb1\x9b\xe4\xac\xf0D4\xe6v\x86\x02^bt\xbf!b\xd4k\x11\xf5Nj\x97P\b\xf2\xdd\r\xaa,g\xfc\x8f*\bq\x10wl\xe0\x02HG)\xa0\xb9%\x12\x9fx]\xf8Gz`\xfd\x00l\xe9<\xa5\xbd\x9f\x80\xa5\x0f\xd3\xf7\xc8\x98'], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000440)='\x00', &(0x7f0000000740)='\x10', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) 02:16:45 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x30000, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:16:45 executing program 5: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) (fail_nth: 4) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) 02:16:45 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x89b0, &(0x7f0000000180)={'syz_tun\x00', &(0x7f0000000200)=@ethtool_coalesce}) fadvise64(r0, 0x5, 0x6, 0x5) 02:16:45 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x10000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100)}, 0x1c210, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x4}, 0x0, 0xd, 0xffffffffffffffff, 0x9) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5, r0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 02:16:45 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x14, r1, 0xd8499488957a772f, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) [ 2040.020428] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2040.036470] FAULT_INJECTION: forcing a failure. [ 2040.036470] name failslab, interval 1, probability 0, space 0, times 0 [ 2040.038411] CPU: 1 PID: 12526 Comm: syz-executor.5 Not tainted 5.10.226 #1 [ 2040.039414] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2040.040626] Call Trace: [ 2040.041024] dump_stack+0x107/0x167 [ 2040.041550] should_fail.cold+0x5/0xa [ 2040.042114] ? getname_flags.part.0+0x50/0x4f0 [ 2040.042772] should_failslab+0x5/0x20 [ 2040.043368] kmem_cache_alloc+0x5b/0x310 [ 2040.043988] getname_flags.part.0+0x50/0x4f0 [ 2040.044623] user_path_at_empty+0xa1/0x100 [ 2040.045246] __x64_sys_mount+0x1e9/0x300 [ 2040.045849] ? copy_mnt_ns+0xa00/0xa00 [ 2040.046421] do_syscall_64+0x33/0x40 [ 2040.046959] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2040.047707] RIP: 0033:0x7f6142476b19 [ 2040.048253] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2040.050903] RSP: 002b:00007f613f9ec188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2040.052002] RAX: ffffffffffffffda RBX: 00007f6142589f60 RCX: 00007f6142476b19 [ 2040.053056] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 0000000000000000 [ 2040.054065] RBP: 00007f613f9ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2040.055107] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2040.056141] R13: 00007ffcef2b488f R14: 00007f613f9ec300 R15: 0000000000022000 02:16:45 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', 0x0, &(0x7f0000000300)='security.capability\x00'], 0x0, 0x1000) ftruncate(r0, 0x1000003) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) write(0xffffffffffffffff, &(0x7f0000000200)="8b7876f31d04c964fa152d1f0d027a59e65dcc3a4fadec7a224e944bf39adf7d75e5163d473e1008f7300e2ffdcbcd73b569090e80415268326395e509a1cb3935a83c558bdcd0fa56006a5a3debe3c3c90ff414baa9bd893de667905d4c2b254b9475fbc380b4d96412cd1a", 0x6c) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x3, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@ipv4={'\x00', '\xff\xff', @dev}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0xa, @in, 0x0, 0x4, 0x0, 0xfc}}, 0xe8) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 02:16:45 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x34000, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:16:45 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0xc0, r1, 0xd8499488957a772f, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 02:16:45 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:16:45 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="3400000010000100cc680000000000000000000005000000000000001532336740e46387f800008064dcdc6ca616ef0dd0179be149f83265ff000ad022cea3b5906ed71efbac71604114ae634a1d3f5b42332fdb1ddff6c996d594f336ad93897a4c7c7d052c951ff3b19a2ae8dfe7daae4433b91e5be24f079e43a9066a68a1d63857237b3704f14d41e4376c1319a3cb91015718c602f3acaab637ceb7852dafdf71f385cfa97aa0b4888bc38b88bda6372e3668ad38b7f74f5579af15595a0c30e5611c48d698f5ab174fbc688112a84b0e6b16587fe1cca80147b9e1c0f1ed5b30c723ba82fe7b97990c195cdd6e5a3ec6986122d762e9182637b26db43c9871a7e08e00a222e27bb9eb35ce4745ffeda794f8f9b433cfaf77a5c151481692b680c9217e78cf5b4a110e4cf58a2481900e9ee69cdf0b73241206255494d36aa01416f7d0d0620f0b8526ca8484f212079b26fe05a315317995f2e147c5246ec242cda7921facafba1cf981b778d7b9333c9f88b53bf8b3a1c472d9869179a5d75ccaa1fa65e00d0b492e89e54f4d9ef4d61d2d7315ac264ed102185b46eef868a43ff0c84a79ac7dedfe21843442cfa03ab8fdf2c4a9967b518d211ddceeca7cce24735f1daf18a359c87c7c89a2011187f1b8d95f288434370c44a92d4dda3151ae0c5bb732e4baa5994bbe49e76eb2277e38c8f867d4a099cb00d9d38ca7bca38999cd3fc3b3ecb356302feed4b34c"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x8) execveat(r8, &(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000400)='\x00', &(0x7f0000000bc0)='\x00\x80C\x107\xa64\xee\xbd*\xd4o\x8a?[\x98\xf29\xee\xc7\x90\x97\xaa\xc3\xc8Zq\xf3\x91\x04[S\\B2m=V\x89\x99\x96Q\xcaA\x18\xaf\xaf:\xf1\xab\x80\"\x7f\xb3\x18\xfe\xd7\xbd\xcd\xcdIf\xae\xb5\x87\xb8#\xe1\xbe\xec\xf0\t\xa1\xf7\xa7\xb1\x9d\xc7\xc2\xf0\x02\xaf\xc4\xd0@\xc2\x12\'\xb9\x9a\xea\x90e%\xe6\xd2E\x19E/\xc6\x17gB0Qim\x82u\x0fZ\xa9\x14\xf5\xc7X\xa9\x00\xb7\xaf\xcfouN\xbd\xb2\t^\xbe&~\xa7l\xfa\x036\x1c\"\x80\xfc/\x9b\x95\xf1!K\xc5{\xe7\xfdB[\xca\x87\x9bc\x98dg\x1a\xa1\xaa\xb4\x19\x7f\xa7\x90y\x9fq\xf5\x8a\xa9 \xa6\xdd\xf0+gb\xa6g\\\xec\tz\x06\xdf\x1a\x9c\xc9\xf7\xcc\x85\xb4G\xe9\xd3D\xf4\x8c\n\x17\xd5\x00\xf18\xb3T', &(0x7f0000000480)='\x00', &(0x7f0000000280)='@\x90\x9a\x7fl\x00\x00\x00\x00p\xc4S\x9ch\xceH9\x88\xf3c\xb4\xabz#\xa8\xbb5\xd3\xc8\x9b\x00\x00 \x00\x00\x00\x00\x00', &(0x7f0000000540)='\x00', &(0x7f0000000a00)='\x009\x1c\xaf\x14\xe6\xeb\xe9\xf1\xccO@\xbd\xfc\xbdN\xfa\x93Z\x94\xfd\xc6]\xc3\x81g\x95\'\xb7\xf2\xe8\xbf\xd3\xf3\"\xf0Z\x93T\xa1\xc6\x10\x01\xba\xf0\x11\x01 \x94X\x7fQ\xa6\v\xfa\xc2\\$\xad\x96A\xd6\xdf|\x0e,c\xc4\x13\xfb\x91\xc5|{\xde\'xb\xcd\xb2\x177\x83\'\xdb\xf6y_\x10\x87\x01\xd4\xb1\x9b\xe4\xac\xf0D4\xe6v\x86\x02^bt\xbf!b\xd4k\x11\xf5Nj\x97P\b\xf2\xdd\r\xaa,g\xfc\x8f*\bq\x10wl\xe0\x02HG)\xa0\xb9%\x12\x9fx]\xf8Gz`\xfd\x00l\xe9<\xa5\xbd\x9f\x80\xa5\x0f\xd3\xf7\xc8\x98'], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000440)='\x00', &(0x7f0000000740)='\x10', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) 02:16:45 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x13bb, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x334}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_io_uring_submit(r1, r2, &(0x7f0000000180)=@IORING_OP_SEND={0x1a, 0x0, 0x0, r3, 0x0, 0x0, 0x3d}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r4, r2, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x5, 0x0, @fd, 0x2, 0x0}, 0x80000001) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) dup2(r5, r3) r6 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040), 0x4800, 0x0) fallocate(r6, 0x10, 0x143c, 0x4) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 02:16:45 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x10000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100)}, 0x1c210, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x4}, 0x0, 0xd, 0xffffffffffffffff, 0x9) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5, r0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 02:16:45 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', 0x0, &(0x7f0000000300)='security.capability\x00'], 0x0, 0x1000) ftruncate(r0, 0x1000003) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) write(0xffffffffffffffff, &(0x7f0000000200)="8b7876f31d04c964fa152d1f0d027a59e65dcc3a4fadec7a224e944bf39adf7d75e5163d473e1008f7300e2ffdcbcd73b569090e80415268326395e509a1cb3935a83c558bdcd0fa56006a5a3debe3c3c90ff414baa9bd893de667905d4c2b254b9475fbc380b4d96412cd1a", 0x6c) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@ipv4={'\x00', '\xff\xff', @dev}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0xa, @in, 0x0, 0x4, 0x0, 0xfc}}, 0xe8) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) [ 2040.224374] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 02:16:45 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x80000, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:16:59 executing program 5: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) (fail_nth: 5) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) 02:16:59 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x2, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:16:59 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0xec0, r1, 0xd8499488957a772f, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 02:16:59 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x8) execveat(r8, &(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000400)='\x00', &(0x7f0000000bc0)='\x00\x80C\x107\xa64\xee\xbd*\xd4o\x8a?[\x98\xf29\xee\xc7\x90\x97\xaa\xc3\xc8Zq\xf3\x91\x04[S\\B2m=V\x89\x99\x96Q\xcaA\x18\xaf\xaf:\xf1\xab\x80\"\x7f\xb3\x18\xfe\xd7\xbd\xcd\xcdIf\xae\xb5\x87\xb8#\xe1\xbe\xec\xf0\t\xa1\xf7\xa7\xb1\x9d\xc7\xc2\xf0\x02\xaf\xc4\xd0@\xc2\x12\'\xb9\x9a\xea\x90e%\xe6\xd2E\x19E/\xc6\x17gB0Qim\x82u\x0fZ\xa9\x14\xf5\xc7X\xa9\x00\xb7\xaf\xcfouN\xbd\xb2\t^\xbe&~\xa7l\xfa\x036\x1c\"\x80\xfc/\x9b\x95\xf1!K\xc5{\xe7\xfdB[\xca\x87\x9bc\x98dg\x1a\xa1\xaa\xb4\x19\x7f\xa7\x90y\x9fq\xf5\x8a\xa9 \xa6\xdd\xf0+gb\xa6g\\\xec\tz\x06\xdf\x1a\x9c\xc9\xf7\xcc\x85\xb4G\xe9\xd3D\xf4\x8c\n\x17\xd5\x00\xf18\xb3T', &(0x7f0000000480)='\x00', &(0x7f0000000280)='@\x90\x9a\x7fl\x00\x00\x00\x00p\xc4S\x9ch\xceH9\x88\xf3c\xb4\xabz#\xa8\xbb5\xd3\xc8\x9b\x00\x00 \x00\x00\x00\x00\x00', &(0x7f0000000540)='\x00', &(0x7f0000000a00)='\x009\x1c\xaf\x14\xe6\xeb\xe9\xf1\xccO@\xbd\xfc\xbdN\xfa\x93Z\x94\xfd\xc6]\xc3\x81g\x95\'\xb7\xf2\xe8\xbf\xd3\xf3\"\xf0Z\x93T\xa1\xc6\x10\x01\xba\xf0\x11\x01 \x94X\x7fQ\xa6\v\xfa\xc2\\$\xad\x96A\xd6\xdf|\x0e,c\xc4\x13\xfb\x91\xc5|{\xde\'xb\xcd\xb2\x177\x83\'\xdb\xf6y_\x10\x87\x01\xd4\xb1\x9b\xe4\xac\xf0D4\xe6v\x86\x02^bt\xbf!b\xd4k\x11\xf5Nj\x97P\b\xf2\xdd\r\xaa,g\xfc\x8f*\bq\x10wl\xe0\x02HG)\xa0\xb9%\x12\x9fx]\xf8Gz`\xfd\x00l\xe9<\xa5\xbd\x9f\x80\xa5\x0f\xd3\xf7\xc8\x98'], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000440)='\x00', &(0x7f0000000740)='\x10', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) 02:16:59 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', 0x0, &(0x7f0000000300)='security.capability\x00'], 0x0, 0x1000) ftruncate(r0, 0x1000003) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) write(0xffffffffffffffff, &(0x7f0000000200)="8b7876f31d04c964fa152d1f0d027a59e65dcc3a4fadec7a224e944bf39adf7d75e5163d473e1008f7300e2ffdcbcd73b569090e80415268326395e509a1cb3935a83c558bdcd0fa56006a5a3debe3c3c90ff414baa9bd893de667905d4c2b254b9475fbc380b4d96412cd1a", 0x6c) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@ipv4={'\x00', '\xff\xff', @dev}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0xa, @in, 0x0, 0x4, 0x0, 0xfc}}, 0xe8) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) [ 2054.107443] FAULT_INJECTION: forcing a failure. [ 2054.107443] name failslab, interval 1, probability 0, space 0, times 0 [ 2054.109050] CPU: 1 PID: 12771 Comm: syz-executor.5 Not tainted 5.10.226 #1 [ 2054.109812] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2054.110712] Call Trace: [ 2054.111011] dump_stack+0x107/0x167 [ 2054.111422] should_fail.cold+0x5/0xa [ 2054.111853] ? create_object.isra.0+0x3a/0xa20 [ 2054.112371] should_failslab+0x5/0x20 [ 2054.112795] kmem_cache_alloc+0x5b/0x310 [ 2054.113243] ? __might_fault+0xd3/0x180 [ 2054.113686] create_object.isra.0+0x3a/0xa20 [ 2054.114180] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2054.114746] kmem_cache_alloc+0x159/0x310 [ 2054.115214] getname_flags.part.0+0x50/0x4f0 [ 2054.115702] user_path_at_empty+0xa1/0x100 [ 2054.116189] __x64_sys_mount+0x1e9/0x300 [ 2054.116636] ? copy_mnt_ns+0xa00/0xa00 [ 2054.117085] do_syscall_64+0x33/0x40 [ 2054.117501] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2054.118068] RIP: 0033:0x7f6142476b19 [ 2054.118484] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2054.120521] RSP: 002b:00007f613f9ec188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2054.121366] RAX: ffffffffffffffda RBX: 00007f6142589f60 RCX: 00007f6142476b19 [ 2054.122141] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 0000000000000000 [ 2054.122924] RBP: 00007f613f9ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2054.123716] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2054.124512] R13: 00007ffcef2b488f R14: 00007f613f9ec300 R15: 0000000000022000 [ 2054.135409] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 02:16:59 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x10000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x4}, 0x0, 0xd, 0xffffffffffffffff, 0x9) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5, r0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 02:16:59 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x400300, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:16:59 executing program 1: r0 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) fadvise64(0xffffffffffffffff, 0x0, 0x81, 0x1) r3 = syz_genetlink_get_family_id$smc(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x40, r3, 0x20, 0x70bd25, 0x25dfdbff, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}]}, 0x40}}, 0x4000) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001680)={0x5, 0x80, 0x7, 0x40, 0xdd, 0xff, 0x0, 0xffff, 0x68298, 0x5, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x100000000, 0x10001}, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x6ec, 0x4, 0x8, 0x0, 0x7d, 0x0, 0x7}, 0x0, 0x6, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x20000000000081}}, 0x0, 0x0, r4, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_SPLICE={0x1e, 0x0, 0x0, @fd_index, 0x100, {}, 0x7}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) creat(&(0x7f0000000340)='./file0\x00', 0x20) syz_io_uring_submit(r5, r2, &(0x7f00000002c0)=@IORING_OP_CLOSE={0x13, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x80000001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 02:16:59 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x33fe0, r1, 0xd8499488957a772f, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 02:16:59 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', 0x0, &(0x7f0000000300)='security.capability\x00'], 0x0, 0x1000) ftruncate(r0, 0x1000003) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@ipv4={'\x00', '\xff\xff', @dev}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0xa, @in, 0x0, 0x4, 0x0, 0xfc}}, 0xe8) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 02:16:59 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x1000000, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:16:59 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x3, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:16:59 executing program 5: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) (fail_nth: 6) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) [ 2054.339417] FAULT_INJECTION: forcing a failure. [ 2054.339417] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2054.340949] CPU: 1 PID: 12814 Comm: syz-executor.5 Not tainted 5.10.226 #1 [ 2054.341669] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2054.342519] Call Trace: [ 2054.342800] dump_stack+0x107/0x167 [ 2054.343179] should_fail.cold+0x5/0xa [ 2054.343583] strncpy_from_user+0x34/0x470 [ 2054.344016] getname_flags.part.0+0x95/0x4f0 [ 2054.344479] user_path_at_empty+0xa1/0x100 [ 2054.344916] __x64_sys_mount+0x1e9/0x300 [ 2054.345331] ? copy_mnt_ns+0xa00/0xa00 [ 2054.345743] do_syscall_64+0x33/0x40 [ 2054.346128] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2054.346660] RIP: 0033:0x7f6142476b19 [ 2054.347047] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2054.348925] RSP: 002b:00007f613f9ec188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2054.349705] RAX: ffffffffffffffda RBX: 00007f6142589f60 RCX: 00007f6142476b19 [ 2054.350448] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 0000000000000000 [ 2054.351177] RBP: 00007f613f9ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2054.351904] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2054.352649] R13: 00007ffcef2b488f R14: 00007f613f9ec300 R15: 0000000000022000 02:17:12 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', 0x0, &(0x7f0000000300)='security.capability\x00'], 0x0, 0x1000) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@ipv4={'\x00', '\xff\xff', @dev}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0xa, @in, 0x0, 0x4, 0x0, 0xfc}}, 0xe8) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 02:17:12 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="3400000010000100cc680000000000000000000005000000000000001532336740e46387f800008064dcdc6ca616ef0dd0179be149f83265ff000ad022cea3b5906ed71efbac71604114ae634a1d3f5b42332fdb1ddff6c996d594f336ad93897a4c7c7d052c951ff3b19a2ae8dfe7daae4433b91e5be24f079e43a9066a68a1d63857237b3704f14d41e4376c1319a3cb91015718c602f3acaab637ceb7852dafdf71f385cfa97aa0b4888bc38b88bda6372e3668ad38b7f74f5579af15595a0c30e5611c48d698f5ab174fbc688112a84b0e6b16587fe1cca80147b9e1c0f1ed5b30c723ba82fe7b97990c195cdd6e5a3ec6986122d762e9182637b26db43c9871a7e08e00a222e27bb9eb35ce4745ffeda794f8f9b433cfaf77a5c151481692b680c9217e78cf5b4a110e4cf58a2481900e9ee69cdf0b73241206255494d36aa01416f7d0d0620f0b8526ca8484f212079b26fe05a315317995f2e147c5246ec242cda7921facafba1cf981b778d7b9333c9f88b53bf8b3a1c472d9869179a5d75ccaa1fa65e00d0b492e89e54f4d9ef4d61d2d7315ac264ed102185b46eef868a43ff0c84a79ac7dedfe21843442cfa03ab8fdf2c4a9967b518d211ddceeca7cce24735f1daf18a359c87c7c89a2011187f1b8d95f288434370c44a92d4dda3151ae0c5bb732e4baa5994bbe49e76eb2277e38c8f867d4a099cb00d9d38ca7bca38999cd3fc3b3ecb356302feed4b34c"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x8) execveat(r8, &(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000400)='\x00', &(0x7f0000000bc0)='\x00\x80C\x107\xa64\xee\xbd*\xd4o\x8a?[\x98\xf29\xee\xc7\x90\x97\xaa\xc3\xc8Zq\xf3\x91\x04[S\\B2m=V\x89\x99\x96Q\xcaA\x18\xaf\xaf:\xf1\xab\x80\"\x7f\xb3\x18\xfe\xd7\xbd\xcd\xcdIf\xae\xb5\x87\xb8#\xe1\xbe\xec\xf0\t\xa1\xf7\xa7\xb1\x9d\xc7\xc2\xf0\x02\xaf\xc4\xd0@\xc2\x12\'\xb9\x9a\xea\x90e%\xe6\xd2E\x19E/\xc6\x17gB0Qim\x82u\x0fZ\xa9\x14\xf5\xc7X\xa9\x00\xb7\xaf\xcfouN\xbd\xb2\t^\xbe&~\xa7l\xfa\x036\x1c\"\x80\xfc/\x9b\x95\xf1!K\xc5{\xe7\xfdB[\xca\x87\x9bc\x98dg\x1a\xa1\xaa\xb4\x19\x7f\xa7\x90y\x9fq\xf5\x8a\xa9 \xa6\xdd\xf0+gb\xa6g\\\xec\tz\x06\xdf\x1a\x9c\xc9\xf7\xcc\x85\xb4G\xe9\xd3D\xf4\x8c\n\x17\xd5\x00\xf18\xb3T', &(0x7f0000000480)='\x00', &(0x7f0000000280)='@\x90\x9a\x7fl\x00\x00\x00\x00p\xc4S\x9ch\xceH9\x88\xf3c\xb4\xabz#\xa8\xbb5\xd3\xc8\x9b\x00\x00 \x00\x00\x00\x00\x00', &(0x7f0000000540)='\x00', &(0x7f0000000a00)='\x009\x1c\xaf\x14\xe6\xeb\xe9\xf1\xccO@\xbd\xfc\xbdN\xfa\x93Z\x94\xfd\xc6]\xc3\x81g\x95\'\xb7\xf2\xe8\xbf\xd3\xf3\"\xf0Z\x93T\xa1\xc6\x10\x01\xba\xf0\x11\x01 \x94X\x7fQ\xa6\v\xfa\xc2\\$\xad\x96A\xd6\xdf|\x0e,c\xc4\x13\xfb\x91\xc5|{\xde\'xb\xcd\xb2\x177\x83\'\xdb\xf6y_\x10\x87\x01\xd4\xb1\x9b\xe4\xac\xf0D4\xe6v\x86\x02^bt\xbf!b\xd4k\x11\xf5Nj\x97P\b\xf2\xdd\r\xaa,g\xfc\x8f*\bq\x10wl\xe0\x02HG)\xa0\xb9%\x12\x9fx]\xf8Gz`\xfd\x00l\xe9<\xa5\xbd\x9f\x80\xa5\x0f\xd3\xf7\xc8\x98'], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000440)='\x00', &(0x7f0000000740)='\x10', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) [ 2067.428457] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 02:17:12 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="12956f6c3deba467b9a6696ec865726c656076652c00"]) openat(r0, &(0x7f0000000000)='./file0\x00', 0x151080, 0x80) r1 = creat(&(0x7f0000001680)='./file0/file0\x00', 0x0) pwrite64(r1, &(0x7f0000000140)="b2", 0x1, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x2) 02:17:12 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x4, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:17:12 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x2000000, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:17:12 executing program 5: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) (fail_nth: 7) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) 02:17:12 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x10000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x4}, 0x0, 0xd, 0xffffffffffffffff, 0x9) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5, r0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 02:17:12 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2000001c, r1, 0xd8499488957a772f, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) [ 2067.460140] tmpfs: Unknown parameter '•ol' [ 2067.481715] tmpfs: Unknown parameter '•ol' 02:17:12 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', 0x0, &(0x7f0000000300)='security.capability\x00'], 0x0, 0x1000) ftruncate(r0, 0x1000003) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@ipv4={'\x00', '\xff\xff', @dev}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0xa, @in, 0x0, 0x4, 0x0, 0xfc}}, 0xe8) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) [ 2067.487061] FAULT_INJECTION: forcing a failure. [ 2067.487061] name failslab, interval 1, probability 0, space 0, times 0 [ 2067.489240] CPU: 1 PID: 12927 Comm: syz-executor.5 Not tainted 5.10.226 #1 [ 2067.490404] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2067.491795] Call Trace: [ 2067.492253] dump_stack+0x107/0x167 [ 2067.492869] should_fail.cold+0x5/0xa [ 2067.493515] ? alloc_fs_context+0x57/0x840 [ 2067.494227] should_failslab+0x5/0x20 [ 2067.494870] kmem_cache_alloc_trace+0x55/0x320 [ 2067.495645] alloc_fs_context+0x57/0x840 [ 2067.496339] path_mount+0xaa3/0x2120 [ 2067.496976] ? strncpy_from_user+0x9e/0x470 [ 2067.497702] ? finish_automount+0xa90/0xa90 [ 2067.498424] ? getname_flags.part.0+0x1dd/0x4f0 [ 2067.499212] __x64_sys_mount+0x282/0x300 [ 2067.499893] ? copy_mnt_ns+0xa00/0xa00 [ 2067.500566] do_syscall_64+0x33/0x40 [ 2067.501191] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2067.502045] RIP: 0033:0x7f6142476b19 [ 2067.502667] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2067.505706] RSP: 002b:00007f613f9ec188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2067.506970] RAX: ffffffffffffffda RBX: 00007f6142589f60 RCX: 00007f6142476b19 [ 2067.508149] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 0000000000000000 [ 2067.509341] RBP: 00007f613f9ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2067.510522] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2067.511706] R13: 00007ffcef2b488f R14: 00007f613f9ec300 R15: 0000000000022000 02:17:12 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x3000000, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:17:12 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="3400000010000100cc680000000000000000000005000000000000001532336740e46387f800008064dcdc6ca616ef0dd0179be149f83265ff000ad022cea3b5906ed71efbac71604114ae634a1d3f5b42332fdb1ddff6c996d594f336ad93897a4c7c7d052c951ff3b19a2ae8dfe7daae4433b91e5be24f079e43a9066a68a1d63857237b3704f14d41e4376c1319a3cb91015718c602f3acaab637ceb7852dafdf71f385cfa97aa0b4888bc38b88bda6372e3668ad38b7f74f5579af15595a0c30e5611c48d698f5ab174fbc688112a84b0e6b16587fe1cca80147b9e1c0f1ed5b30c723ba82fe7b97990c195cdd6e5a3ec6986122d762e9182637b26db43c9871a7e08e00a222e27bb9eb35ce4745ffeda794f8f9b433cfaf77a5c151481692b680c9217e78cf5b4a110e4cf58a2481900e9ee69cdf0b73241206255494d36aa01416f7d0d0620f0b8526ca8484f212079b26fe05a315317995f2e147c5246ec242cda7921facafba1cf981b778d7b9333c9f88b53bf8b3a1c472d9869179a5d75ccaa1fa65e00d0b492e89e54f4d9ef4d61d2d7315ac264ed102185b46eef868a43ff0c84a79ac7dedfe21843442cfa03ab8fdf2c4a9967b518d211ddceeca7cce24735f1daf18a359c87c7c89a2011187f1b8d95f288434370c44a92d4dda3151ae0c5bb732e4baa5994bbe49e76eb2277e38c8f867d4a099cb00d9d38ca7bca38999cd3fc3b3ecb356302feed4b34c"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x8) execveat(r8, &(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000400)='\x00', &(0x7f0000000bc0)='\x00\x80C\x107\xa64\xee\xbd*\xd4o\x8a?[\x98\xf29\xee\xc7\x90\x97\xaa\xc3\xc8Zq\xf3\x91\x04[S\\B2m=V\x89\x99\x96Q\xcaA\x18\xaf\xaf:\xf1\xab\x80\"\x7f\xb3\x18\xfe\xd7\xbd\xcd\xcdIf\xae\xb5\x87\xb8#\xe1\xbe\xec\xf0\t\xa1\xf7\xa7\xb1\x9d\xc7\xc2\xf0\x02\xaf\xc4\xd0@\xc2\x12\'\xb9\x9a\xea\x90e%\xe6\xd2E\x19E/\xc6\x17gB0Qim\x82u\x0fZ\xa9\x14\xf5\xc7X\xa9\x00\xb7\xaf\xcfouN\xbd\xb2\t^\xbe&~\xa7l\xfa\x036\x1c\"\x80\xfc/\x9b\x95\xf1!K\xc5{\xe7\xfdB[\xca\x87\x9bc\x98dg\x1a\xa1\xaa\xb4\x19\x7f\xa7\x90y\x9fq\xf5\x8a\xa9 \xa6\xdd\xf0+gb\xa6g\\\xec\tz\x06\xdf\x1a\x9c\xc9\xf7\xcc\x85\xb4G\xe9\xd3D\xf4\x8c\n\x17\xd5\x00\xf18\xb3T', &(0x7f0000000480)='\x00', 0x0, &(0x7f0000000280)='@\x90\x9a\x7fl\x00\x00\x00\x00p\xc4S\x9ch\xceH9\x88\xf3c\xb4\xabz#\xa8\xbb5\xd3\xc8\x9b\x00\x00 \x00\x00\x00\x00\x00', &(0x7f0000000540)='\x00', &(0x7f0000000a00)='\x009\x1c\xaf\x14\xe6\xeb\xe9\xf1\xccO@\xbd\xfc\xbdN\xfa\x93Z\x94\xfd\xc6]\xc3\x81g\x95\'\xb7\xf2\xe8\xbf\xd3\xf3\"\xf0Z\x93T\xa1\xc6\x10\x01\xba\xf0\x11\x01 \x94X\x7fQ\xa6\v\xfa\xc2\\$\xad\x96A\xd6\xdf|\x0e,c\xc4\x13\xfb\x91\xc5|{\xde\'xb\xcd\xb2\x177\x83\'\xdb\xf6y_\x10\x87\x01\xd4\xb1\x9b\xe4\xac\xf0D4\xe6v\x86\x02^bt\xbf!b\xd4k\x11\xf5Nj\x97P\b\xf2\xdd\r\xaa,g\xfc\x8f*\bq\x10wl\xe0\x02HG)\xa0\xb9%\x12\x9fx]\xf8Gz`\xfd\x00l\xe9<\xa5\xbd\x9f\x80\xa5\x0f\xd3\xf7\xc8\x98'], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000440)='\x00', &(0x7f0000000740)='\x10', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) 02:17:12 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x5, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:17:12 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', 0x0, &(0x7f0000000300)='security.capability\x00'], 0x0, 0x1000) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@ipv4={'\x00', '\xff\xff', @dev}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0xa, @in, 0x0, 0x4, 0x0, 0xfc}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 02:17:12 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x7ffff000, r1, 0xd8499488957a772f, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) [ 2067.620848] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 02:17:26 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r3, 0x10e, 0x0, 0x0, &(0x7f0000000380)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r2) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000280)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c00000021e92563f15513fdcf7ffd89cf1d038f66918fd108eb476e7bd8a22fd9dcac983a6fa5d7bd9f1bc8672ac30b4930d05ce42cde66d9cd60e74e381b11cb8ca23693ad2bd99d4cb01edfe01671fe25fedba13e6ba75666ea4916aaca9d9362d52e400b0292c844bd12e352cbd874080f5b9e26a8bbb265db72a24fb33f64eb56c11f76db076993586896c088253a3a23420bbf19ef993a7600cf8c7b80fbd6b00407016d967f0f4f5f5d1235dcf7a25845eb40456f32290adae33bef8736e7b674634dcbe5e3057978b3fddf8210ac70d152ebb1b6", @ANYRES16=r4, @ANYBLOB="010027bd7000fcdbdf251a00000008009a0001000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4000010}, 0x2004c040) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, 0x0) lseek(r1, 0x0, 0x2) r5 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r6 = syz_mount_image$iso9660(&(0x7f0000000200), &(0x7f0000000240)='./file0/file0\x00', 0xff, 0x1, &(0x7f00000002c0)=[{&(0x7f00000003c0)="000931c48206da333e312fc8c89fc0d2bcb5eea574d2af0ead393536d1b5150ac86cb54c259e0e0f96d90cd6b3a985be21ef1cecb51751d0d3218d491c1f45974ca47e3ec268b03c037b7f8a1257877528949deec5644da4b8ef88af95f29d5995e20595b521cabeeaddb1a09a8b1c77e57d8c4245604633bf46c4f562774400a3e662f5f92df71de31eee2cc57e72b1bb9154b1d79cffa9ece83750d2fba16485e95db6fc0f6159ca96f8c8438f18566bb936725045bbb58185e1e3324bf1f0fd66726edc996d9e77f3c4df", 0xcc, 0x1000}], 0x100820, &(0x7f00000004c0)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}, {@session={'session', 0x3d, 0x4f}}, {@block}, {@map_acorn}, {@map_acorn}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, '\x00'}}, {@uid_gt={'uid>', 0xee01}}, {@permit_directio}, {@subj_user}, {@fsname={'fsname', 0x3d, '\''}}]}) signalfd(r6, &(0x7f0000000300)={[0x100]}, 0x8) copy_file_range(r5, 0x0, r1, 0x0, 0x200f5ef, 0x0) 02:17:26 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0xfffffdef, r1, 0xd8499488957a772f, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 02:17:26 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x6, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:17:26 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x10000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x4}, 0x0, 0xd, 0xffffffffffffffff, 0x9) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5, r0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 02:17:26 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x4000000, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:17:26 executing program 5: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) (fail_nth: 8) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) 02:17:26 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x8) execveat(r8, &(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000400)='\x00', &(0x7f0000000bc0)='\x00\x80C\x107\xa64\xee\xbd*\xd4o\x8a?[\x98\xf29\xee\xc7\x90\x97\xaa\xc3\xc8Zq\xf3\x91\x04[S\\B2m=V\x89\x99\x96Q\xcaA\x18\xaf\xaf:\xf1\xab\x80\"\x7f\xb3\x18\xfe\xd7\xbd\xcd\xcdIf\xae\xb5\x87\xb8#\xe1\xbe\xec\xf0\t\xa1\xf7\xa7\xb1\x9d\xc7\xc2\xf0\x02\xaf\xc4\xd0@\xc2\x12\'\xb9\x9a\xea\x90e%\xe6\xd2E\x19E/\xc6\x17gB0Qim\x82u\x0fZ\xa9\x14\xf5\xc7X\xa9\x00\xb7\xaf\xcfouN\xbd\xb2\t^\xbe&~\xa7l\xfa\x036\x1c\"\x80\xfc/\x9b\x95\xf1!K\xc5{\xe7\xfdB[\xca\x87\x9bc\x98dg\x1a\xa1\xaa\xb4\x19\x7f\xa7\x90y\x9fq\xf5\x8a\xa9 \xa6\xdd\xf0+gb\xa6g\\\xec\tz\x06\xdf\x1a\x9c\xc9\xf7\xcc\x85\xb4G\xe9\xd3D\xf4\x8c\n\x17\xd5\x00\xf18\xb3T', &(0x7f0000000480)='\x00', 0x0, &(0x7f0000000280)='@\x90\x9a\x7fl\x00\x00\x00\x00p\xc4S\x9ch\xceH9\x88\xf3c\xb4\xabz#\xa8\xbb5\xd3\xc8\x9b\x00\x00 \x00\x00\x00\x00\x00', &(0x7f0000000540)='\x00', &(0x7f0000000a00)='\x009\x1c\xaf\x14\xe6\xeb\xe9\xf1\xccO@\xbd\xfc\xbdN\xfa\x93Z\x94\xfd\xc6]\xc3\x81g\x95\'\xb7\xf2\xe8\xbf\xd3\xf3\"\xf0Z\x93T\xa1\xc6\x10\x01\xba\xf0\x11\x01 \x94X\x7fQ\xa6\v\xfa\xc2\\$\xad\x96A\xd6\xdf|\x0e,c\xc4\x13\xfb\x91\xc5|{\xde\'xb\xcd\xb2\x177\x83\'\xdb\xf6y_\x10\x87\x01\xd4\xb1\x9b\xe4\xac\xf0D4\xe6v\x86\x02^bt\xbf!b\xd4k\x11\xf5Nj\x97P\b\xf2\xdd\r\xaa,g\xfc\x8f*\bq\x10wl\xe0\x02HG)\xa0\xb9%\x12\x9fx]\xf8Gz`\xfd\x00l\xe9<\xa5\xbd\x9f\x80\xa5\x0f\xd3\xf7\xc8\x98'], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000440)='\x00', &(0x7f0000000740)='\x10', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) 02:17:26 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@ipv4={'\x00', '\xff\xff', @dev}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0xa, @in, 0x0, 0x4, 0x0, 0xfc}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) [ 2081.231392] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2081.237234] FAULT_INJECTION: forcing a failure. [ 2081.237234] name failslab, interval 1, probability 0, space 0, times 0 [ 2081.239313] CPU: 0 PID: 13063 Comm: syz-executor.5 Not tainted 5.10.226 #1 [ 2081.240371] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2081.241629] Call Trace: [ 2081.242040] dump_stack+0x107/0x167 [ 2081.242594] should_fail.cold+0x5/0xa [ 2081.243176] ? create_object.isra.0+0x3a/0xa20 [ 2081.243882] should_failslab+0x5/0x20 [ 2081.244467] kmem_cache_alloc+0x5b/0x310 [ 2081.245090] create_object.isra.0+0x3a/0xa20 [ 2081.245763] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2081.246544] kmem_cache_alloc_trace+0x151/0x320 [ 2081.247254] alloc_fs_context+0x57/0x840 [ 2081.247878] path_mount+0xaa3/0x2120 [ 2081.248458] ? strncpy_from_user+0x9e/0x470 [ 2081.249087] ? finish_automount+0xa90/0xa90 [ 2081.249743] ? getname_flags.part.0+0x1dd/0x4f0 [ 2081.250454] __x64_sys_mount+0x282/0x300 [ 2081.251067] ? copy_mnt_ns+0xa00/0xa00 [ 2081.251673] do_syscall_64+0x33/0x40 [ 2081.252238] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2081.253021] RIP: 0033:0x7f6142476b19 [ 2081.253589] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2081.256338] RSP: 002b:00007f613f9ec188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2081.257511] RAX: ffffffffffffffda RBX: 00007f6142589f60 RCX: 00007f6142476b19 [ 2081.258594] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 0000000000000000 [ 2081.259676] RBP: 00007f613f9ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2081.260757] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2081.261839] R13: 00007ffcef2b488f R14: 00007f613f9ec300 R15: 0000000000022000 [ 2081.270363] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=59681 sclass=netlink_route_socket pid=13060 comm=syz-executor.1 02:17:26 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x5000000, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:17:26 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x7, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:17:26 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@ipv4={'\x00', '\xff\xff', @dev}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0xa, @in, 0x0, 0x4, 0x0, 0xfc}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 02:17:26 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 02:17:26 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x8) execveat(r8, &(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000400)='\x00', &(0x7f0000000bc0)='\x00\x80C\x107\xa64\xee\xbd*\xd4o\x8a?[\x98\xf29\xee\xc7\x90\x97\xaa\xc3\xc8Zq\xf3\x91\x04[S\\B2m=V\x89\x99\x96Q\xcaA\x18\xaf\xaf:\xf1\xab\x80\"\x7f\xb3\x18\xfe\xd7\xbd\xcd\xcdIf\xae\xb5\x87\xb8#\xe1\xbe\xec\xf0\t\xa1\xf7\xa7\xb1\x9d\xc7\xc2\xf0\x02\xaf\xc4\xd0@\xc2\x12\'\xb9\x9a\xea\x90e%\xe6\xd2E\x19E/\xc6\x17gB0Qim\x82u\x0fZ\xa9\x14\xf5\xc7X\xa9\x00\xb7\xaf\xcfouN\xbd\xb2\t^\xbe&~\xa7l\xfa\x036\x1c\"\x80\xfc/\x9b\x95\xf1!K\xc5{\xe7\xfdB[\xca\x87\x9bc\x98dg\x1a\xa1\xaa\xb4\x19\x7f\xa7\x90y\x9fq\xf5\x8a\xa9 \xa6\xdd\xf0+gb\xa6g\\\xec\tz\x06\xdf\x1a\x9c\xc9\xf7\xcc\x85\xb4G\xe9\xd3D\xf4\x8c\n\x17\xd5\x00\xf18\xb3T', &(0x7f0000000480)='\x00', 0x0, &(0x7f0000000280)='@\x90\x9a\x7fl\x00\x00\x00\x00p\xc4S\x9ch\xceH9\x88\xf3c\xb4\xabz#\xa8\xbb5\xd3\xc8\x9b\x00\x00 \x00\x00\x00\x00\x00', &(0x7f0000000540)='\x00', &(0x7f0000000a00)='\x009\x1c\xaf\x14\xe6\xeb\xe9\xf1\xccO@\xbd\xfc\xbdN\xfa\x93Z\x94\xfd\xc6]\xc3\x81g\x95\'\xb7\xf2\xe8\xbf\xd3\xf3\"\xf0Z\x93T\xa1\xc6\x10\x01\xba\xf0\x11\x01 \x94X\x7fQ\xa6\v\xfa\xc2\\$\xad\x96A\xd6\xdf|\x0e,c\xc4\x13\xfb\x91\xc5|{\xde\'xb\xcd\xb2\x177\x83\'\xdb\xf6y_\x10\x87\x01\xd4\xb1\x9b\xe4\xac\xf0D4\xe6v\x86\x02^bt\xbf!b\xd4k\x11\xf5Nj\x97P\b\xf2\xdd\r\xaa,g\xfc\x8f*\bq\x10wl\xe0\x02HG)\xa0\xb9%\x12\x9fx]\xf8Gz`\xfd\x00l\xe9<\xa5\xbd\x9f\x80\xa5\x0f\xd3\xf7\xc8\x98'], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000440)='\x00', &(0x7f0000000740)='\x10', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) [ 2081.521132] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 02:17:39 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x8) execveat(r8, &(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000400)='\x00', &(0x7f0000000bc0)='\x00\x80C\x107\xa64\xee\xbd*\xd4o\x8a?[\x98\xf29\xee\xc7\x90\x97\xaa\xc3\xc8Zq\xf3\x91\x04[S\\B2m=V\x89\x99\x96Q\xcaA\x18\xaf\xaf:\xf1\xab\x80\"\x7f\xb3\x18\xfe\xd7\xbd\xcd\xcdIf\xae\xb5\x87\xb8#\xe1\xbe\xec\xf0\t\xa1\xf7\xa7\xb1\x9d\xc7\xc2\xf0\x02\xaf\xc4\xd0@\xc2\x12\'\xb9\x9a\xea\x90e%\xe6\xd2E\x19E/\xc6\x17gB0Qim\x82u\x0fZ\xa9\x14\xf5\xc7X\xa9\x00\xb7\xaf\xcfouN\xbd\xb2\t^\xbe&~\xa7l\xfa\x036\x1c\"\x80\xfc/\x9b\x95\xf1!K\xc5{\xe7\xfdB[\xca\x87\x9bc\x98dg\x1a\xa1\xaa\xb4\x19\x7f\xa7\x90y\x9fq\xf5\x8a\xa9 \xa6\xdd\xf0+gb\xa6g\\\xec\tz\x06\xdf\x1a\x9c\xc9\xf7\xcc\x85\xb4G\xe9\xd3D\xf4\x8c\n\x17\xd5\x00\xf18\xb3T', &(0x7f00000004c0)='\x00', &(0x7f0000000280)='@\x90\x9a\x7fl\x00\x00\x00\x00p\xc4S\x9ch\xceH9\x88\xf3c\xb4\xabz#\xa8\xbb5\xd3\xc8\x9b\x00\x00 \x00\x00\x00\x00\x00', &(0x7f0000000540)='\x00', &(0x7f0000000a00)='\x009\x1c\xaf\x14\xe6\xeb\xe9\xf1\xccO@\xbd\xfc\xbdN\xfa\x93Z\x94\xfd\xc6]\xc3\x81g\x95\'\xb7\xf2\xe8\xbf\xd3\xf3\"\xf0Z\x93T\xa1\xc6\x10\x01\xba\xf0\x11\x01 \x94X\x7fQ\xa6\v\xfa\xc2\\$\xad\x96A\xd6\xdf|\x0e,c\xc4\x13\xfb\x91\xc5|{\xde\'xb\xcd\xb2\x177\x83\'\xdb\xf6y_\x10\x87\x01\xd4\xb1\x9b\xe4\xac\xf0D4\xe6v\x86\x02^bt\xbf!b\xd4k\x11\xf5Nj\x97P\b\xf2\xdd\r\xaa,g\xfc\x8f*\bq\x10wl\xe0\x02HG)\xa0\xb9%\x12\x9fx]\xf8Gz`\xfd\x00l\xe9<\xa5\xbd\x9f\x80\xa5\x0f\xd3\xf7\xc8\x98'], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000440)='\x00', &(0x7f0000000740)='\x10', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) 02:17:39 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x6000000, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:17:39 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x53, 0x0, 0x3f, 0x0, 0x3ef, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x40277, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 02:17:39 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@ipv4={'\x00', '\xff\xff', @dev}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0xa, @in, 0x0, 0x4, 0x0, 0xfc}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 02:17:39 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x8, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:17:39 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x10000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0xb}, 0x1c210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xd, 0xffffffffffffffff, 0x9) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5, r0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 02:17:39 executing program 5: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) (fail_nth: 9) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) 02:17:39 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x2, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) [ 2094.610824] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2094.614220] FAULT_INJECTION: forcing a failure. [ 2094.614220] name failslab, interval 1, probability 0, space 0, times 0 [ 2094.616366] CPU: 0 PID: 13202 Comm: syz-executor.5 Not tainted 5.10.226 #1 [ 2094.617525] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 02:17:39 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x7000000, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) [ 2094.618885] Call Trace: [ 2094.619496] dump_stack+0x107/0x167 [ 2094.620080] should_fail.cold+0x5/0xa [ 2094.620708] ? legacy_init_fs_context+0x44/0xe0 [ 2094.621440] should_failslab+0x5/0x20 [ 2094.622030] kmem_cache_alloc_trace+0x55/0x320 [ 2094.622747] ? lockdep_init_map_type+0x2c7/0x780 [ 2094.623492] legacy_init_fs_context+0x44/0xe0 [ 2094.624185] ? generic_parse_monolithic+0x1f0/0x1f0 [ 2094.624975] alloc_fs_context+0x4fd/0x840 [ 2094.625633] path_mount+0xaa3/0x2120 [ 2094.626225] ? strncpy_from_user+0x9e/0x470 [ 2094.626898] ? finish_automount+0xa90/0xa90 [ 2094.627570] ? getname_flags.part.0+0x1dd/0x4f0 [ 2094.628306] __x64_sys_mount+0x282/0x300 [ 2094.628944] ? copy_mnt_ns+0xa00/0xa00 [ 2094.629564] do_syscall_64+0x33/0x40 [ 2094.630147] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2094.630941] RIP: 0033:0x7f6142476b19 [ 2094.631517] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2094.634352] RSP: 002b:00007f613f9ec188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2094.635516] RAX: ffffffffffffffda RBX: 00007f6142589f60 RCX: 00007f6142476b19 [ 2094.636615] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 0000000000000000 [ 2094.637723] RBP: 00007f613f9ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2094.638834] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2094.639930] R13: 00007ffcef2b488f R14: 00007f613f9ec300 R15: 0000000000022000 02:17:39 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) waitid(0x0, 0x0, 0x0, 0x1, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x100}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = mmap$IORING_OFF_CQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x100010, 0xffffffffffffffff, 0x8000000) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0xfa, 0x2, 0xf7, 0x20, 0x0, 0xa6e8, 0x26684, 0xe, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x6, 0x2}, 0x10800, 0x2, 0x6, 0x2, 0x7, 0x6, 0x1ff, 0x0, 0x5, 0x0, 0x1}, 0xffffffffffffffff, 0xf, r0, 0x2) r4 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) syz_io_uring_submit(r3, 0x0, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x4, 0x0, @fd=r4, 0x5, 0x0, 0x50, 0x4}, 0x4) sendto(r2, &(0x7f0000000040)="e74ed1bf", 0x4, 0x0, &(0x7f00000000c0)=@l2tp6={0xa, 0x0, 0x0, @mcast1}, 0x80) rt_tgsigqueueinfo(r1, 0xffffffffffffffff, 0x40, &(0x7f0000000280)={0x37, 0x7ff, 0x6}) setsockopt$inet6_int(r2, 0x29, 0x4a, &(0x7f0000000240)=0x8, 0x4) recvmmsg(r2, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0}}], 0x300, 0x10062, 0x0) 02:17:39 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x9000000, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:17:39 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x3, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 02:17:39 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@ipv4={'\x00', '\xff\xff', @dev}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0xa, @in, 0x0, 0x4, 0x0, 0xfc}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 02:17:39 executing program 5: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) (fail_nth: 10) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) 02:17:39 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x9, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) [ 2094.789410] FAULT_INJECTION: forcing a failure. [ 2094.789410] name failslab, interval 1, probability 0, space 0, times 0 [ 2094.790763] CPU: 1 PID: 13355 Comm: syz-executor.5 Not tainted 5.10.226 #1 [ 2094.791318] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2094.791993] Call Trace: [ 2094.792209] dump_stack+0x107/0x167 [ 2094.792512] should_fail.cold+0x5/0xa [ 2094.792834] ? create_object.isra.0+0x3a/0xa20 [ 2094.793202] should_failslab+0x5/0x20 [ 2094.793510] kmem_cache_alloc+0x5b/0x310 [ 2094.793847] create_object.isra.0+0x3a/0xa20 [ 2094.794201] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2094.794609] kmem_cache_alloc_trace+0x151/0x320 [ 2094.794995] ? lockdep_init_map_type+0x2c7/0x780 [ 2094.795383] legacy_init_fs_context+0x44/0xe0 [ 2094.795760] ? generic_parse_monolithic+0x1f0/0x1f0 [ 2094.796165] alloc_fs_context+0x4fd/0x840 [ 2094.796507] path_mount+0xaa3/0x2120 [ 2094.796818] ? strncpy_from_user+0x9e/0x470 [ 2094.797166] ? finish_automount+0xa90/0xa90 [ 2094.797516] ? getname_flags.part.0+0x1dd/0x4f0 [ 2094.797900] __x64_sys_mount+0x282/0x300 [ 2094.798226] ? copy_mnt_ns+0xa00/0xa00 [ 2094.798550] do_syscall_64+0x33/0x40 [ 2094.798853] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2094.799266] RIP: 0033:0x7f6142476b19 [ 2094.799578] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2094.801083] RSP: 002b:00007f613f9ec188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2094.801690] RAX: ffffffffffffffda RBX: 00007f6142589f60 RCX: 00007f6142476b19 [ 2094.802262] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 0000000000000000 [ 2094.802831] RBP: 00007f613f9ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2094.803403] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2094.803976] R13: 00007ffcef2b488f R14: 00007f613f9ec300 R15: 0000000000022000 02:17:39 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0xf000000, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:17:39 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x8) execveat(r8, &(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000400)='\x00', &(0x7f0000000bc0)='\x00\x80C\x107\xa64\xee\xbd*\xd4o\x8a?[\x98\xf29\xee\xc7\x90\x97\xaa\xc3\xc8Zq\xf3\x91\x04[S\\B2m=V\x89\x99\x96Q\xcaA\x18\xaf\xaf:\xf1\xab\x80\"\x7f\xb3\x18\xfe\xd7\xbd\xcd\xcdIf\xae\xb5\x87\xb8#\xe1\xbe\xec\xf0\t\xa1\xf7\xa7\xb1\x9d\xc7\xc2\xf0\x02\xaf\xc4\xd0@\xc2\x12\'\xb9\x9a\xea\x90e%\xe6\xd2E\x19E/\xc6\x17gB0Qim\x82u\x0fZ\xa9\x14\xf5\xc7X\xa9\x00\xb7\xaf\xcfouN\xbd\xb2\t^\xbe&~\xa7l\xfa\x036\x1c\"\x80\xfc/\x9b\x95\xf1!K\xc5{\xe7\xfdB[\xca\x87\x9bc\x98dg\x1a\xa1\xaa\xb4\x19\x7f\xa7\x90y\x9fq\xf5\x8a\xa9 \xa6\xdd\xf0+gb\xa6g\\\xec\tz\x06\xdf\x1a\x9c\xc9\xf7\xcc\x85\xb4G\xe9\xd3D\xf4\x8c\n\x17\xd5\x00\xf18\xb3T', &(0x7f00000004c0)='\x00', &(0x7f0000000280)='@\x90\x9a\x7fl\x00\x00\x00\x00p\xc4S\x9ch\xceH9\x88\xf3c\xb4\xabz#\xa8\xbb5\xd3\xc8\x9b\x00\x00 \x00\x00\x00\x00\x00', &(0x7f0000000540)='\x00', &(0x7f0000000a00)='\x009\x1c\xaf\x14\xe6\xeb\xe9\xf1\xccO@\xbd\xfc\xbdN\xfa\x93Z\x94\xfd\xc6]\xc3\x81g\x95\'\xb7\xf2\xe8\xbf\xd3\xf3\"\xf0Z\x93T\xa1\xc6\x10\x01\xba\xf0\x11\x01 \x94X\x7fQ\xa6\v\xfa\xc2\\$\xad\x96A\xd6\xdf|\x0e,c\xc4\x13\xfb\x91\xc5|{\xde\'xb\xcd\xb2\x177\x83\'\xdb\xf6y_\x10\x87\x01\xd4\xb1\x9b\xe4\xac\xf0D4\xe6v\x86\x02^bt\xbf!b\xd4k\x11\xf5Nj\x97P\b\xf2\xdd\r\xaa,g\xfc\x8f*\bq\x10wl\xe0\x02HG)\xa0\xb9%\x12\x9fx]\xf8Gz`\xfd\x00l\xe9<\xa5\xbd\x9f\x80\xa5\x0f\xd3\xf7\xc8\x98'], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000440)='\x00', &(0x7f0000000740)='\x10', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) [ 2094.847747] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2110.128159] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 02:17:55 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x4, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 02:17:55 executing program 5: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) (fail_nth: 11) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) 02:17:55 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0xffffff7f, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:17:55 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x10000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0xb}, 0x1c210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xd, 0xffffffffffffffff, 0x9) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5, r0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 02:17:55 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@ipv4={'\x00', '\xff\xff', @dev}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0xa, @in, 0x0, 0x4, 0x0, 0xfc}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 02:17:55 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_INTERFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=ANY=[@ANYBLOB="461000cf", @ANYRES16=r2, @ANYBLOB="050000000000000000000600000008000300", @ANYRES32=0x0, @ANYBLOB="0800050002000000"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x0) syz_80211_join_ibss(&(0x7f0000000040)='wlan1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2, 0x40) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="c71d3aa5570975eab7d3db3cb257fd18477ca44550a1d72613b64645a65992282dbe3c2e1949a26d017e6b79261e4dbae1e9b8654ddc343dec0e2afc4a27e62ab563ff0b4f1de794f77249a57867e078a09a012a6026623b47fadb6579006caa143553f6141d3521b09f9894b0d0cb42a96e2ba9ecdf189f8f4f25d135b3a8440b77a1"]}) 02:17:55 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0xf, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:17:55 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x8) execveat(r8, &(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000400)='\x00', &(0x7f0000000bc0)='\x00\x80C\x107\xa64\xee\xbd*\xd4o\x8a?[\x98\xf29\xee\xc7\x90\x97\xaa\xc3\xc8Zq\xf3\x91\x04[S\\B2m=V\x89\x99\x96Q\xcaA\x18\xaf\xaf:\xf1\xab\x80\"\x7f\xb3\x18\xfe\xd7\xbd\xcd\xcdIf\xae\xb5\x87\xb8#\xe1\xbe\xec\xf0\t\xa1\xf7\xa7\xb1\x9d\xc7\xc2\xf0\x02\xaf\xc4\xd0@\xc2\x12\'\xb9\x9a\xea\x90e%\xe6\xd2E\x19E/\xc6\x17gB0Qim\x82u\x0fZ\xa9\x14\xf5\xc7X\xa9\x00\xb7\xaf\xcfouN\xbd\xb2\t^\xbe&~\xa7l\xfa\x036\x1c\"\x80\xfc/\x9b\x95\xf1!K\xc5{\xe7\xfdB[\xca\x87\x9bc\x98dg\x1a\xa1\xaa\xb4\x19\x7f\xa7\x90y\x9fq\xf5\x8a\xa9 \xa6\xdd\xf0+gb\xa6g\\\xec\tz\x06\xdf\x1a\x9c\xc9\xf7\xcc\x85\xb4G\xe9\xd3D\xf4\x8c\n\x17\xd5\x00\xf18\xb3T', &(0x7f00000004c0)='\x00', &(0x7f0000000280)='@\x90\x9a\x7fl\x00\x00\x00\x00p\xc4S\x9ch\xceH9\x88\xf3c\xb4\xabz#\xa8\xbb5\xd3\xc8\x9b\x00\x00 \x00\x00\x00\x00\x00', &(0x7f0000000540)='\x00', &(0x7f0000000a00)='\x009\x1c\xaf\x14\xe6\xeb\xe9\xf1\xccO@\xbd\xfc\xbdN\xfa\x93Z\x94\xfd\xc6]\xc3\x81g\x95\'\xb7\xf2\xe8\xbf\xd3\xf3\"\xf0Z\x93T\xa1\xc6\x10\x01\xba\xf0\x11\x01 \x94X\x7fQ\xa6\v\xfa\xc2\\$\xad\x96A\xd6\xdf|\x0e,c\xc4\x13\xfb\x91\xc5|{\xde\'xb\xcd\xb2\x177\x83\'\xdb\xf6y_\x10\x87\x01\xd4\xb1\x9b\xe4\xac\xf0D4\xe6v\x86\x02^bt\xbf!b\xd4k\x11\xf5Nj\x97P\b\xf2\xdd\r\xaa,g\xfc\x8f*\bq\x10wl\xe0\x02HG)\xa0\xb9%\x12\x9fx]\xf8Gz`\xfd\x00l\xe9<\xa5\xbd\x9f\x80\xa5\x0f\xd3\xf7\xc8\x98'], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000440)='\x00', &(0x7f0000000740)='\x10', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) [ 2110.153140] FAULT_INJECTION: forcing a failure. [ 2110.153140] name failslab, interval 1, probability 0, space 0, times 0 [ 2110.155853] CPU: 1 PID: 13462 Comm: syz-executor.5 Not tainted 5.10.226 #1 [ 2110.156985] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2110.158334] Call Trace: [ 2110.158785] dump_stack+0x107/0x167 [ 2110.159385] should_fail.cold+0x5/0xa [ 2110.160018] ? alloc_fs_context+0x57/0x840 [ 2110.160715] should_failslab+0x5/0x20 [ 2110.161345] kmem_cache_alloc_trace+0x55/0x320 [ 2110.162109] ? _raw_spin_unlock+0x1a/0x30 [ 2110.162801] alloc_fs_context+0x57/0x840 [ 2110.163459] ? sget+0x124/0x510 [ 2110.164000] ? kill_litter_super+0xa0/0xa0 [ 2110.164695] ? tracefs_remount+0x90/0x90 [ 2110.165360] mount_single+0x9b/0x1f0 [ 2110.165980] ? remove_one+0x20/0x20 [ 2110.166586] legacy_get_tree+0x105/0x220 [ 2110.167253] vfs_get_tree+0x8e/0x300 [ 2110.167862] path_mount+0x1429/0x2120 [ 2110.168487] ? strncpy_from_user+0x9e/0x470 [ 2110.169193] ? finish_automount+0xa90/0xa90 [ 2110.169896] ? getname_flags.part.0+0x1dd/0x4f0 [ 2110.170693] __x64_sys_mount+0x282/0x300 [ 2110.171367] ? copy_mnt_ns+0xa00/0xa00 [ 2110.172018] do_syscall_64+0x33/0x40 [ 2110.172628] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2110.173476] RIP: 0033:0x7f6142476b19 [ 2110.174087] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2110.176896] RSP: 002b:00007f613f9ec188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2110.177997] RAX: ffffffffffffffda RBX: 00007f6142589f60 RCX: 00007f6142476b19 [ 2110.179011] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 0000000000000000 [ 2110.180029] RBP: 00007f613f9ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2110.181049] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2110.182076] R13: 00007ffcef2b488f R14: 00007f613f9ec300 R15: 0000000000022000 02:17:55 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x300, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:17:55 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x5, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 02:17:55 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 02:17:55 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:17:55 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x8) execveat(r8, &(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000400)='\x00', &(0x7f0000000bc0)='\x00\x80C\x107\xa64\xee\xbd*\xd4o\x8a?[\x98\xf29\xee\xc7\x90\x97\xaa\xc3\xc8Zq\xf3\x91\x04[S\\B2m=V\x89\x99\x96Q\xcaA\x18\xaf\xaf:\xf1\xab\x80\"\x7f\xb3\x18\xfe\xd7\xbd\xcd\xcdIf\xae\xb5\x87\xb8#\xe1\xbe\xec\xf0\t\xa1\xf7\xa7\xb1\x9d\xc7\xc2\xf0\x02\xaf\xc4\xd0@\xc2\x12\'\xb9\x9a\xea\x90e%\xe6\xd2E\x19E/\xc6\x17gB0Qim\x82u\x0fZ\xa9\x14\xf5\xc7X\xa9\x00\xb7\xaf\xcfouN\xbd\xb2\t^\xbe&~\xa7l\xfa\x036\x1c\"\x80\xfc/\x9b\x95\xf1!K\xc5{\xe7\xfdB[\xca\x87\x9bc\x98dg\x1a\xa1\xaa\xb4\x19\x7f\xa7\x90y\x9fq\xf5\x8a\xa9 \xa6\xdd\xf0+gb\xa6g\\\xec\tz\x06\xdf\x1a\x9c\xc9\xf7\xcc\x85\xb4G\xe9\xd3D\xf4\x8c\n\x17\xd5\x00\xf18\xb3T', 0x0, &(0x7f00000004c0)='\x00', &(0x7f0000000280)='@\x90\x9a\x7fl\x00\x00\x00\x00p\xc4S\x9ch\xceH9\x88\xf3c\xb4\xabz#\xa8\xbb5\xd3\xc8\x9b\x00\x00 \x00\x00\x00\x00\x00', &(0x7f0000000540)='\x00', &(0x7f0000000a00)='\x009\x1c\xaf\x14\xe6\xeb\xe9\xf1\xccO@\xbd\xfc\xbdN\xfa\x93Z\x94\xfd\xc6]\xc3\x81g\x95\'\xb7\xf2\xe8\xbf\xd3\xf3\"\xf0Z\x93T\xa1\xc6\x10\x01\xba\xf0\x11\x01 \x94X\x7fQ\xa6\v\xfa\xc2\\$\xad\x96A\xd6\xdf|\x0e,c\xc4\x13\xfb\x91\xc5|{\xde\'xb\xcd\xb2\x177\x83\'\xdb\xf6y_\x10\x87\x01\xd4\xb1\x9b\xe4\xac\xf0D4\xe6v\x86\x02^bt\xbf!b\xd4k\x11\xf5Nj\x97P\b\xf2\xdd\r\xaa,g\xfc\x8f*\bq\x10wl\xe0\x02HG)\xa0\xb9%\x12\x9fx]\xf8Gz`\xfd\x00l\xe9<\xa5\xbd\x9f\x80\xa5\x0f\xd3\xf7\xc8\x98'], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000440)='\x00', &(0x7f0000000740)='\x10', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) [ 2110.256587] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 02:18:11 executing program 5: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) (fail_nth: 12) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) 02:18:11 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 02:18:11 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x10000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0xb}, 0x1c210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xd, 0xffffffffffffffff, 0x9) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5, r0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 02:18:11 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x2, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:18:11 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x6, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 02:18:11 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x500, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:18:11 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x8) execveat(r8, &(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000400)='\x00', &(0x7f0000000bc0)='\x00\x80C\x107\xa64\xee\xbd*\xd4o\x8a?[\x98\xf29\xee\xc7\x90\x97\xaa\xc3\xc8Zq\xf3\x91\x04[S\\B2m=V\x89\x99\x96Q\xcaA\x18\xaf\xaf:\xf1\xab\x80\"\x7f\xb3\x18\xfe\xd7\xbd\xcd\xcdIf\xae\xb5\x87\xb8#\xe1\xbe\xec\xf0\t\xa1\xf7\xa7\xb1\x9d\xc7\xc2\xf0\x02\xaf\xc4\xd0@\xc2\x12\'\xb9\x9a\xea\x90e%\xe6\xd2E\x19E/\xc6\x17gB0Qim\x82u\x0fZ\xa9\x14\xf5\xc7X\xa9\x00\xb7\xaf\xcfouN\xbd\xb2\t^\xbe&~\xa7l\xfa\x036\x1c\"\x80\xfc/\x9b\x95\xf1!K\xc5{\xe7\xfdB[\xca\x87\x9bc\x98dg\x1a\xa1\xaa\xb4\x19\x7f\xa7\x90y\x9fq\xf5\x8a\xa9 \xa6\xdd\xf0+gb\xa6g\\\xec\tz\x06\xdf\x1a\x9c\xc9\xf7\xcc\x85\xb4G\xe9\xd3D\xf4\x8c\n\x17\xd5\x00\xf18\xb3T', 0x0, &(0x7f00000004c0)='\x00', &(0x7f0000000280)='@\x90\x9a\x7fl\x00\x00\x00\x00p\xc4S\x9ch\xceH9\x88\xf3c\xb4\xabz#\xa8\xbb5\xd3\xc8\x9b\x00\x00 \x00\x00\x00\x00\x00', &(0x7f0000000540)='\x00', &(0x7f0000000a00)='\x009\x1c\xaf\x14\xe6\xeb\xe9\xf1\xccO@\xbd\xfc\xbdN\xfa\x93Z\x94\xfd\xc6]\xc3\x81g\x95\'\xb7\xf2\xe8\xbf\xd3\xf3\"\xf0Z\x93T\xa1\xc6\x10\x01\xba\xf0\x11\x01 \x94X\x7fQ\xa6\v\xfa\xc2\\$\xad\x96A\xd6\xdf|\x0e,c\xc4\x13\xfb\x91\xc5|{\xde\'xb\xcd\xb2\x177\x83\'\xdb\xf6y_\x10\x87\x01\xd4\xb1\x9b\xe4\xac\xf0D4\xe6v\x86\x02^bt\xbf!b\xd4k\x11\xf5Nj\x97P\b\xf2\xdd\r\xaa,g\xfc\x8f*\bq\x10wl\xe0\x02HG)\xa0\xb9%\x12\x9fx]\xf8Gz`\xfd\x00l\xe9<\xa5\xbd\x9f\x80\xa5\x0f\xd3\xf7\xc8\x98'], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000440)='\x00', &(0x7f0000000740)='\x10', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) 02:18:11 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x8) execveat(r8, &(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000400)='\x00', &(0x7f0000000bc0)='\x00\x80C\x107\xa64\xee\xbd*\xd4o\x8a?[\x98\xf29\xee\xc7\x90\x97\xaa\xc3\xc8Zq\xf3\x91\x04[S\\B2m=V\x89\x99\x96Q\xcaA\x18\xaf\xaf:\xf1\xab\x80\"\x7f\xb3\x18\xfe\xd7\xbd\xcd\xcdIf\xae\xb5\x87\xb8#\xe1\xbe\xec\xf0\t\xa1\xf7\xa7\xb1\x9d\xc7\xc2\xf0\x02\xaf\xc4\xd0@\xc2\x12\'\xb9\x9a\xea\x90e%\xe6\xd2E\x19E/\xc6\x17gB0Qim\x82u\x0fZ\xa9\x14\xf5\xc7X\xa9\x00\xb7\xaf\xcfouN\xbd\xb2\t^\xbe&~\xa7l\xfa\x036\x1c\"\x80\xfc/\x9b\x95\xf1!K\xc5{\xe7\xfdB[\xca\x87\x9bc\x98dg\x1a\xa1\xaa\xb4\x19\x7f\xa7\x90y\x9fq\xf5\x8a\xa9 \xa6\xdd\xf0+gb\xa6g\\\xec\tz\x06\xdf\x1a\x9c\xc9\xf7\xcc\x85\xb4G\xe9\xd3D\xf4\x8c\n\x17\xd5\x00\xf18\xb3T', &(0x7f00000004c0)='\x00', &(0x7f0000000280)='@\x90\x9a\x7fl\x00\x00\x00\x00p\xc4S\x9ch\xceH9\x88\xf3c\xb4\xabz#\xa8\xbb5\xd3\xc8\x9b\x00\x00 \x00\x00\x00\x00\x00', &(0x7f0000000540)='\x00', &(0x7f0000000a00)='\x009\x1c\xaf\x14\xe6\xeb\xe9\xf1\xccO@\xbd\xfc\xbdN\xfa\x93Z\x94\xfd\xc6]\xc3\x81g\x95\'\xb7\xf2\xe8\xbf\xd3\xf3\"\xf0Z\x93T\xa1\xc6\x10\x01\xba\xf0\x11\x01 \x94X\x7fQ\xa6\v\xfa\xc2\\$\xad\x96A\xd6\xdf|\x0e,c\xc4\x13\xfb\x91\xc5|{\xde\'xb\xcd\xb2\x177\x83\'\xdb\xf6y_\x10\x87\x01\xd4\xb1\x9b\xe4\xac\xf0D4\xe6v\x86\x02^bt\xbf!b\xd4k\x11\xf5Nj\x97P\b\xf2\xdd\r\xaa,g\xfc\x8f*\bq\x10wl\xe0\x02HG)\xa0\xb9%\x12\x9fx]\xf8Gz`\xfd\x00l\xe9<\xa5\xbd\x9f\x80\xa5\x0f\xd3\xf7\xc8\x98'], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000440)='\x00', &(0x7f0000000740)='\x10', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) [ 2126.371897] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2126.410447] FAULT_INJECTION: forcing a failure. [ 2126.410447] name failslab, interval 1, probability 0, space 0, times 0 [ 2126.412458] CPU: 1 PID: 13589 Comm: syz-executor.5 Not tainted 5.10.226 #1 [ 2126.413506] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2126.414723] Call Trace: [ 2126.415141] dump_stack+0x107/0x167 [ 2126.415719] should_fail.cold+0x5/0xa [ 2126.416299] ? create_object.isra.0+0x3a/0xa20 [ 2126.416988] should_failslab+0x5/0x20 [ 2126.417568] kmem_cache_alloc+0x5b/0x310 [ 2126.418181] create_object.isra.0+0x3a/0xa20 [ 2126.418822] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2126.419567] kmem_cache_alloc_trace+0x151/0x320 [ 2126.420259] alloc_fs_context+0x57/0x840 [ 2126.420865] ? sget+0x124/0x510 [ 2126.421368] ? kill_litter_super+0xa0/0xa0 [ 2126.422007] ? tracefs_remount+0x90/0x90 [ 2126.422597] mount_single+0x9b/0x1f0 [ 2126.423146] ? remove_one+0x20/0x20 [ 2126.423700] legacy_get_tree+0x105/0x220 [ 2126.424298] vfs_get_tree+0x8e/0x300 [ 2126.424844] path_mount+0x1429/0x2120 [ 2126.425425] ? strncpy_from_user+0x9e/0x470 [ 2126.426052] ? finish_automount+0xa90/0xa90 [ 2126.426681] ? getname_flags.part.0+0x1dd/0x4f0 [ 2126.427377] __x64_sys_mount+0x282/0x300 [ 2126.427968] ? copy_mnt_ns+0xa00/0xa00 [ 2126.428550] do_syscall_64+0x33/0x40 [ 2126.429106] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2126.429864] RIP: 0033:0x7f6142476b19 [ 2126.430405] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2126.433053] RSP: 002b:00007f613f9ec188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2126.434151] RAX: ffffffffffffffda RBX: 00007f6142589f60 RCX: 00007f6142476b19 [ 2126.435173] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 0000000000000000 [ 2126.436197] RBP: 00007f613f9ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2126.437238] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2126.438256] R13: 00007ffcef2b488f R14: 00007f613f9ec300 R15: 0000000000022000 [ 2126.442486] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 02:18:11 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 02:18:11 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x7, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 02:18:11 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x3, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:18:11 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x600, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:18:11 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x8) execveat(r8, &(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000400)='\x00', &(0x7f0000000bc0)='\x00\x80C\x107\xa64\xee\xbd*\xd4o\x8a?[\x98\xf29\xee\xc7\x90\x97\xaa\xc3\xc8Zq\xf3\x91\x04[S\\B2m=V\x89\x99\x96Q\xcaA\x18\xaf\xaf:\xf1\xab\x80\"\x7f\xb3\x18\xfe\xd7\xbd\xcd\xcdIf\xae\xb5\x87\xb8#\xe1\xbe\xec\xf0\t\xa1\xf7\xa7\xb1\x9d\xc7\xc2\xf0\x02\xaf\xc4\xd0@\xc2\x12\'\xb9\x9a\xea\x90e%\xe6\xd2E\x19E/\xc6\x17gB0Qim\x82u\x0fZ\xa9\x14\xf5\xc7X\xa9\x00\xb7\xaf\xcfouN\xbd\xb2\t^\xbe&~\xa7l\xfa\x036\x1c\"\x80\xfc/\x9b\x95\xf1!K\xc5{\xe7\xfdB[\xca\x87\x9bc\x98dg\x1a\xa1\xaa\xb4\x19\x7f\xa7\x90y\x9fq\xf5\x8a\xa9 \xa6\xdd\xf0+gb\xa6g\\\xec\tz\x06\xdf\x1a\x9c\xc9\xf7\xcc\x85\xb4G\xe9\xd3D\xf4\x8c\n\x17\xd5\x00\xf18\xb3T', 0x0, &(0x7f00000004c0)='\x00', &(0x7f0000000280)='@\x90\x9a\x7fl\x00\x00\x00\x00p\xc4S\x9ch\xceH9\x88\xf3c\xb4\xabz#\xa8\xbb5\xd3\xc8\x9b\x00\x00 \x00\x00\x00\x00\x00', &(0x7f0000000540)='\x00', &(0x7f0000000a00)='\x009\x1c\xaf\x14\xe6\xeb\xe9\xf1\xccO@\xbd\xfc\xbdN\xfa\x93Z\x94\xfd\xc6]\xc3\x81g\x95\'\xb7\xf2\xe8\xbf\xd3\xf3\"\xf0Z\x93T\xa1\xc6\x10\x01\xba\xf0\x11\x01 \x94X\x7fQ\xa6\v\xfa\xc2\\$\xad\x96A\xd6\xdf|\x0e,c\xc4\x13\xfb\x91\xc5|{\xde\'xb\xcd\xb2\x177\x83\'\xdb\xf6y_\x10\x87\x01\xd4\xb1\x9b\xe4\xac\xf0D4\xe6v\x86\x02^bt\xbf!b\xd4k\x11\xf5Nj\x97P\b\xf2\xdd\r\xaa,g\xfc\x8f*\bq\x10wl\xe0\x02HG)\xa0\xb9%\x12\x9fx]\xf8Gz`\xfd\x00l\xe9<\xa5\xbd\x9f\x80\xa5\x0f\xd3\xf7\xc8\x98'], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000440)='\x00', &(0x7f0000000740)='\x10', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) 02:18:11 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="3400000010000100cc680000000000000000000005000000000000001532336740e46387f800008064dcdc6ca616ef0dd0179be149f83265ff000ad022cea3b5906ed71efbac71604114ae634a1d3f5b42332fdb1ddff6c996d594f336ad93897a4c7c7d052c951ff3b19a2ae8dfe7daae4433b91e5be24f079e43a9066a68a1d63857237b3704f14d41e4376c1319a3cb91015718c602f3acaab637ceb7852dafdf71f385cfa97aa0b4888bc38b88bda6372e3668ad38b7f74f5579af15595a0c30e5611c48d698f5ab174fbc688112a84b0e6b16587fe1cca80147b9e1c0f1ed5b30c723ba82fe7b97990c195cdd6e5a3ec6986122d762e9182637b26db43c9871a7e08e00a222e27bb9eb35ce4745ffeda794f8f9b433cfaf77a5c151481692b680c9217e78cf5b4a110e4cf58a2481900e9ee69cdf0b73241206255494d36aa01416f7d0d0620f0b8526ca8484f212079b26fe05a315317995f2e147c5246ec242cda7921facafba1cf981b778d7b9333c9f88b53bf8b3a1c472d9869179a5d75ccaa1fa65e00d0b492e89e54f4d9ef4d61d2d7315ac264ed102185b46eef868a43ff0c84a79ac7dedfe21843442cfa03ab8fdf2c4a9967b518d211ddceeca7cce24735f1daf18a359c87c7c89a2011187f1b8d95f288434370c44a92d4dda3151ae0c5bb732e4baa5994bbe49e76eb2277e38c8f867d4a099cb00d9d38ca7bca38999cd3fc3b3ecb356302feed4b34c"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x8) execveat(r8, &(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000400)='\x00', &(0x7f0000000bc0)='\x00\x80C\x107\xa64\xee\xbd*\xd4o\x8a?[\x98\xf29\xee\xc7\x90\x97\xaa\xc3\xc8Zq\xf3\x91\x04[S\\B2m=V\x89\x99\x96Q\xcaA\x18\xaf\xaf:\xf1\xab\x80\"\x7f\xb3\x18\xfe\xd7\xbd\xcd\xcdIf\xae\xb5\x87\xb8#\xe1\xbe\xec\xf0\t\xa1\xf7\xa7\xb1\x9d\xc7\xc2\xf0\x02\xaf\xc4\xd0@\xc2\x12\'\xb9\x9a\xea\x90e%\xe6\xd2E\x19E/\xc6\x17gB0Qim\x82u\x0fZ\xa9\x14\xf5\xc7X\xa9\x00\xb7\xaf\xcfouN\xbd\xb2\t^\xbe&~\xa7l\xfa\x036\x1c\"\x80\xfc/\x9b\x95\xf1!K\xc5{\xe7\xfdB[\xca\x87\x9bc\x98dg\x1a\xa1\xaa\xb4\x19\x7f\xa7\x90y\x9fq\xf5\x8a\xa9 \xa6\xdd\xf0+gb\xa6g\\\xec\tz\x06\xdf\x1a\x9c\xc9\xf7\xcc\x85\xb4G\xe9\xd3D\xf4\x8c\n\x17\xd5\x00\xf18\xb3T', &(0x7f00000004c0)='\x00', &(0x7f0000000280)='@\x90\x9a\x7fl\x00\x00\x00\x00p\xc4S\x9ch\xceH9\x88\xf3c\xb4\xabz#\xa8\xbb5\xd3\xc8\x9b\x00\x00 \x00\x00\x00\x00\x00', &(0x7f0000000540)='\x00', &(0x7f0000000a00)='\x009\x1c\xaf\x14\xe6\xeb\xe9\xf1\xccO@\xbd\xfc\xbdN\xfa\x93Z\x94\xfd\xc6]\xc3\x81g\x95\'\xb7\xf2\xe8\xbf\xd3\xf3\"\xf0Z\x93T\xa1\xc6\x10\x01\xba\xf0\x11\x01 \x94X\x7fQ\xa6\v\xfa\xc2\\$\xad\x96A\xd6\xdf|\x0e,c\xc4\x13\xfb\x91\xc5|{\xde\'xb\xcd\xb2\x177\x83\'\xdb\xf6y_\x10\x87\x01\xd4\xb1\x9b\xe4\xac\xf0D4\xe6v\x86\x02^bt\xbf!b\xd4k\x11\xf5Nj\x97P\b\xf2\xdd\r\xaa,g\xfc\x8f*\bq\x10wl\xe0\x02HG)\xa0\xb9%\x12\x9fx]\xf8Gz`\xfd\x00l\xe9<\xa5\xbd\x9f\x80\xa5\x0f\xd3\xf7\xc8\x98'], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000440)='\x00', &(0x7f0000000740)='\x10', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) 02:18:11 executing program 5: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) (fail_nth: 13) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) 02:18:11 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x10000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0xb}, 0x1c210, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xd, 0xffffffffffffffff, 0x9) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5, r0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 02:18:11 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x4, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) [ 2126.655914] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 02:18:11 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@ipv4={'\x00', '\xff\xff', @dev}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0xa, @in, 0x0, 0x4, 0x0, 0xfc}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) [ 2126.688092] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 02:18:11 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x8, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 02:18:11 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x700, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) [ 2126.775088] FAULT_INJECTION: forcing a failure. [ 2126.775088] name failslab, interval 1, probability 0, space 0, times 0 [ 2126.777065] CPU: 0 PID: 13727 Comm: syz-executor.5 Not tainted 5.10.226 #1 [ 2126.778085] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2126.779282] Call Trace: [ 2126.779687] dump_stack+0x107/0x167 [ 2126.780225] should_fail.cold+0x5/0xa [ 2126.780808] ? legacy_init_fs_context+0x44/0xe0 [ 2126.781501] should_failslab+0x5/0x20 [ 2126.782083] kmem_cache_alloc_trace+0x55/0x320 [ 2126.782753] ? lockdep_init_map_type+0x2c7/0x780 [ 2126.783476] legacy_init_fs_context+0x44/0xe0 [ 2126.784137] ? generic_parse_monolithic+0x1f0/0x1f0 [ 2126.784891] alloc_fs_context+0x4fd/0x840 [ 2126.785515] ? tracefs_remount+0x90/0x90 [ 2126.786137] mount_single+0x9b/0x1f0 [ 2126.786694] ? remove_one+0x20/0x20 [ 2126.787254] legacy_get_tree+0x105/0x220 [ 2126.787858] vfs_get_tree+0x8e/0x300 [ 2126.788414] path_mount+0x1429/0x2120 [ 2126.788974] ? strncpy_from_user+0x9e/0x470 [ 2126.789633] ? finish_automount+0xa90/0xa90 [ 2126.790266] ? getname_flags.part.0+0x1dd/0x4f0 [ 2126.790973] __x64_sys_mount+0x282/0x300 [ 2126.791564] ? copy_mnt_ns+0xa00/0xa00 [ 2126.792163] do_syscall_64+0x33/0x40 [ 2126.792706] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2126.793482] RIP: 0033:0x7f6142476b19 [ 2126.794029] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2126.796779] RSP: 002b:00007f613f9ec188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2126.797895] RAX: ffffffffffffffda RBX: 00007f6142589f60 RCX: 00007f6142476b19 [ 2126.798980] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 0000000000000000 [ 2126.800050] RBP: 00007f613f9ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2126.801128] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2126.802196] R13: 00007ffcef2b488f R14: 00007f613f9ec300 R15: 0000000000022000 02:18:11 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x5, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:18:11 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@ipv4={'\x00', '\xff\xff', @dev}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0xa, @in, 0x0, 0x4, 0x0, 0xfc}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 02:18:12 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="3400000010000100cc680000000000000000000005000000000000001532336740e46387f800008064dcdc6ca616ef0dd0179be149f83265ff000ad022cea3b5906ed71efbac71604114ae634a1d3f5b42332fdb1ddff6c996d594f336ad93897a4c7c7d052c951ff3b19a2ae8dfe7daae4433b91e5be24f079e43a9066a68a1d63857237b3704f14d41e4376c1319a3cb91015718c602f3acaab637ceb7852dafdf71f385cfa97aa0b4888bc38b88bda6372e3668ad38b7f74f5579af15595a0c30e5611c48d698f5ab174fbc688112a84b0e6b16587fe1cca80147b9e1c0f1ed5b30c723ba82fe7b97990c195cdd6e5a3ec6986122d762e9182637b26db43c9871a7e08e00a222e27bb9eb35ce4745ffeda794f8f9b433cfaf77a5c151481692b680c9217e78cf5b4a110e4cf58a2481900e9ee69cdf0b73241206255494d36aa01416f7d0d0620f0b8526ca8484f212079b26fe05a315317995f2e147c5246ec242cda7921facafba1cf981b778d7b9333c9f88b53bf8b3a1c472d9869179a5d75ccaa1fa65e00d0b492e89e54f4d9ef4d61d2d7315ac264ed102185b46eef868a43ff0c84a79ac7dedfe21843442cfa03ab8fdf2c4a9967b518d211ddceeca7cce24735f1daf18a359c87c7c89a2011187f1b8d95f288434370c44a92d4dda3151ae0c5bb732e4baa5994bbe49e76eb2277e38c8f867d4a099cb00d9d38ca7bca38999cd3fc3b3ecb356302feed4b34c"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x8) execveat(r8, &(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000400)='\x00', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000280)='@\x90\x9a\x7fl\x00\x00\x00\x00p\xc4S\x9ch\xceH9\x88\xf3c\xb4\xabz#\xa8\xbb5\xd3\xc8\x9b\x00\x00 \x00\x00\x00\x00\x00', &(0x7f0000000540)='\x00', &(0x7f0000000a00)='\x009\x1c\xaf\x14\xe6\xeb\xe9\xf1\xccO@\xbd\xfc\xbdN\xfa\x93Z\x94\xfd\xc6]\xc3\x81g\x95\'\xb7\xf2\xe8\xbf\xd3\xf3\"\xf0Z\x93T\xa1\xc6\x10\x01\xba\xf0\x11\x01 \x94X\x7fQ\xa6\v\xfa\xc2\\$\xad\x96A\xd6\xdf|\x0e,c\xc4\x13\xfb\x91\xc5|{\xde\'xb\xcd\xb2\x177\x83\'\xdb\xf6y_\x10\x87\x01\xd4\xb1\x9b\xe4\xac\xf0D4\xe6v\x86\x02^bt\xbf!b\xd4k\x11\xf5Nj\x97P\b\xf2\xdd\r\xaa,g\xfc\x8f*\bq\x10wl\xe0\x02HG)\xa0\xb9%\x12\x9fx]\xf8Gz`\xfd\x00l\xe9<\xa5\xbd\x9f\x80\xa5\x0f\xd3\xf7\xc8\x98'], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000440)='\x00', &(0x7f0000000740)='\x10', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) [ 2126.934008] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 02:18:24 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x9, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 02:18:24 executing program 1: rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xffffffffffffff7d, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xb800}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="ee"]) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = accept4(r0, &(0x7f0000000080)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000140)=0x80, 0x80000) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000001c0)) getsockopt$netlink(r1, 0x10e, 0x0, 0x0, &(0x7f0000000380)) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r0) sendmsg$NL80211_CMD_SET_REG(r1, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r3, 0x1, 0x70bd27, 0x25dfdbfc, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000010}, 0x2004c040) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) 02:18:24 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x8) execveat(r8, &(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000400)='\x00', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000280)='@\x90\x9a\x7fl\x00\x00\x00\x00p\xc4S\x9ch\xceH9\x88\xf3c\xb4\xabz#\xa8\xbb5\xd3\xc8\x9b\x00\x00 \x00\x00\x00\x00\x00', &(0x7f0000000540)='\x00', &(0x7f0000000a00)='\x009\x1c\xaf\x14\xe6\xeb\xe9\xf1\xccO@\xbd\xfc\xbdN\xfa\x93Z\x94\xfd\xc6]\xc3\x81g\x95\'\xb7\xf2\xe8\xbf\xd3\xf3\"\xf0Z\x93T\xa1\xc6\x10\x01\xba\xf0\x11\x01 \x94X\x7fQ\xa6\v\xfa\xc2\\$\xad\x96A\xd6\xdf|\x0e,c\xc4\x13\xfb\x91\xc5|{\xde\'xb\xcd\xb2\x177\x83\'\xdb\xf6y_\x10\x87\x01\xd4\xb1\x9b\xe4\xac\xf0D4\xe6v\x86\x02^bt\xbf!b\xd4k\x11\xf5Nj\x97P\b\xf2\xdd\r\xaa,g\xfc\x8f*\bq\x10wl\xe0\x02HG)\xa0\xb9%\x12\x9fx]\xf8Gz`\xfd\x00l\xe9<\xa5\xbd\x9f\x80\xa5\x0f\xd3\xf7\xc8\x98'], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000440)='\x00', &(0x7f0000000740)='\x10', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) 02:18:24 executing program 5: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) (fail_nth: 14) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) 02:18:24 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x6, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:18:24 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@ipv4={'\x00', '\xff\xff', @dev}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0xa, @in, 0x0, 0x4, 0x0, 0xfc}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 02:18:24 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x10000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0xb}, 0x1c210, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xd, 0xffffffffffffffff, 0x9) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5, r0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 02:18:24 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x900, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) [ 2139.511059] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2139.550923] FAULT_INJECTION: forcing a failure. [ 2139.550923] name failslab, interval 1, probability 0, space 0, times 0 [ 2139.552827] CPU: 1 PID: 13766 Comm: syz-executor.5 Not tainted 5.10.226 #1 [ 2139.553830] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2139.555006] Call Trace: [ 2139.555399] dump_stack+0x107/0x167 [ 2139.555919] should_fail.cold+0x5/0xa [ 2139.556487] ? create_object.isra.0+0x3a/0xa20 [ 2139.557141] should_failslab+0x5/0x20 [ 2139.557708] kmem_cache_alloc+0x5b/0x310 [ 2139.558300] create_object.isra.0+0x3a/0xa20 [ 2139.558918] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2139.559650] kmem_cache_alloc_trace+0x151/0x320 [ 2139.560360] legacy_init_fs_context+0x44/0xe0 [ 2139.560988] ? generic_parse_monolithic+0x1f0/0x1f0 [ 2139.561709] alloc_fs_context+0x4fd/0x840 [ 2139.562321] ? tracefs_remount+0x90/0x90 [ 2139.562894] mount_single+0x9b/0x1f0 [ 2139.563433] ? remove_one+0x20/0x20 [ 2139.563963] legacy_get_tree+0x105/0x220 [ 2139.564549] vfs_get_tree+0x8e/0x300 [ 2139.565088] path_mount+0x1429/0x2120 [ 2139.565670] ? strncpy_from_user+0x9e/0x470 [ 2139.566296] ? finish_automount+0xa90/0xa90 [ 2139.566901] ? getname_flags.part.0+0x1dd/0x4f0 [ 2139.567584] __x64_sys_mount+0x282/0x300 [ 2139.568173] ? copy_mnt_ns+0xa00/0xa00 [ 2139.568741] do_syscall_64+0x33/0x40 [ 2139.569300] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2139.570021] RIP: 0033:0x7f6142476b19 [ 2139.570560] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2139.573229] RSP: 002b:00007f613f9ec188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2139.574326] RAX: ffffffffffffffda RBX: 00007f6142589f60 RCX: 00007f6142476b19 [ 2139.575363] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 0000000000000000 [ 2139.576393] RBP: 00007f613f9ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2139.577453] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2139.578486] R13: 00007ffcef2b488f R14: 00007f613f9ec300 R15: 0000000000022000 02:18:24 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@ipv4={'\x00', '\xff\xff', @dev}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}}, {{@in=@multicast1, 0x0, 0x6c}, 0xa, @in, 0x0, 0x4, 0x0, 0xfc}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 02:18:24 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x7, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:18:24 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0xf00, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:18:24 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0xf, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 02:18:38 executing program 5: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) (fail_nth: 15) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) [ 2153.624915] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 02:18:38 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x10000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0xb}, 0x1c210, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xd, 0xffffffffffffffff, 0x9) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5, r0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 02:18:38 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x30000, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:18:38 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x8, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:18:38 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="3400000010000100cc680000000000000000000005000000000000001532336740e46387f800008064dcdc6ca616ef0dd0179be149f83265ff000ad022cea3b5906ed71efbac71604114ae634a1d3f5b42332fdb1ddff6c996d594f336ad93897a4c7c7d052c951ff3b19a2ae8dfe7daae4433b91e5be24f079e43a9066a68a1d63857237b3704f14d41e4376c1319a3cb91015718c602f3acaab637ceb7852dafdf71f385cfa97aa0b4888bc38b88bda6372e3668ad38b7f74f5579af15595a0c30e5611c48d698f5ab174fbc688112a84b0e6b16587fe1cca80147b9e1c0f1ed5b30c723ba82fe7b97990c195cdd6e5a3ec6986122d762e9182637b26db43c9871a7e08e00a222e27bb9eb35ce4745ffeda794f8f9b433cfaf77a5c151481692b680c9217e78cf5b4a110e4cf58a2481900e9ee69cdf0b73241206255494d36aa01416f7d0d0620f0b8526ca8484f212079b26fe05a315317995f2e147c5246ec242cda7921facafba1cf981b778d7b9333c9f88b53bf8b3a1c472d9869179a5d75ccaa1fa65e00d0b492e89e54f4d9ef4d61d2d7315ac264ed102185b46eef868a43ff0c84a79ac7dedfe21843442cfa03ab8fdf2c4a9967b518d211ddceeca7cce24735f1daf18a359c87c7c89a2011187f1b8d95f288434370c44a92d4dda3151ae0c5bb732e4baa5994bbe49e76eb2277e38c8f867d4a099cb00d9d38ca7bca38999cd3fc3b3ecb356302feed4b34c"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x8) execveat(r8, &(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000400)='\x00', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000280)='@\x90\x9a\x7fl\x00\x00\x00\x00p\xc4S\x9ch\xceH9\x88\xf3c\xb4\xabz#\xa8\xbb5\xd3\xc8\x9b\x00\x00 \x00\x00\x00\x00\x00', &(0x7f0000000540)='\x00', &(0x7f0000000a00)='\x009\x1c\xaf\x14\xe6\xeb\xe9\xf1\xccO@\xbd\xfc\xbdN\xfa\x93Z\x94\xfd\xc6]\xc3\x81g\x95\'\xb7\xf2\xe8\xbf\xd3\xf3\"\xf0Z\x93T\xa1\xc6\x10\x01\xba\xf0\x11\x01 \x94X\x7fQ\xa6\v\xfa\xc2\\$\xad\x96A\xd6\xdf|\x0e,c\xc4\x13\xfb\x91\xc5|{\xde\'xb\xcd\xb2\x177\x83\'\xdb\xf6y_\x10\x87\x01\xd4\xb1\x9b\xe4\xac\xf0D4\xe6v\x86\x02^bt\xbf!b\xd4k\x11\xf5Nj\x97P\b\xf2\xdd\r\xaa,g\xfc\x8f*\bq\x10wl\xe0\x02HG)\xa0\xb9%\x12\x9fx]\xf8Gz`\xfd\x00l\xe9<\xa5\xbd\x9f\x80\xa5\x0f\xd3\xf7\xc8\x98'], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000440)='\x00', &(0x7f0000000740)='\x10', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) 02:18:38 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@ipv4={'\x00', '\xff\xff', @dev}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}}, {{@in=@multicast1, 0x0, 0x6c}, 0xa, @in, 0x0, 0x4, 0x0, 0xfc}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 02:18:38 executing program 1: connect$inet6(0xffffffffffffffff, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x8000}, 0x4) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0xff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) r5 = fork() ptrace(0x10, r5) ptrace$getregset(0x4204, r5, 0x200, &(0x7f0000000100)={&(0x7f00000000c0)=""/63, 0x3f}) syz_open_procfs(r5, &(0x7f0000000000)='loginuid\x00') listen(r0, 0x4) sendmmsg$inet(r2, &(0x7f0000002040)=[{{&(0x7f0000000380)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000001600)=[{&(0x7f00000003c0)="db9c", 0xffe7}], 0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="14000000000000000000000007000000c4048f01000000001c000000000000000027a900000008000000", @ANYRES32=r4], 0x38}}], 0x1, 0x0) 02:18:38 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0xf0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) [ 2153.655165] FAULT_INJECTION: forcing a failure. [ 2153.655165] name failslab, interval 1, probability 0, space 0, times 0 [ 2153.657030] CPU: 0 PID: 13899 Comm: syz-executor.5 Not tainted 5.10.226 #1 [ 2153.658055] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2153.659265] Call Trace: [ 2153.659664] dump_stack+0x107/0x167 [ 2153.660197] should_fail.cold+0x5/0xa [ 2153.660765] ? alloc_vfsmnt+0x23/0x680 [ 2153.661337] should_failslab+0x5/0x20 [ 2153.661905] kmem_cache_alloc+0x5b/0x310 [ 2153.662496] ? up_write+0x245/0x550 [ 2153.663039] alloc_vfsmnt+0x23/0x680 [ 2153.663587] vfs_create_mount+0x8b/0x480 [ 2153.664186] path_mount+0x17b5/0x2120 [ 2153.664754] ? strncpy_from_user+0x9e/0x470 [ 2153.665374] ? finish_automount+0xa90/0xa90 [ 2153.666021] __x64_sys_mount+0x282/0x300 [ 2153.666622] ? copy_mnt_ns+0xa00/0xa00 [ 2153.667188] do_syscall_64+0x33/0x40 [ 2153.667735] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2153.668470] RIP: 0033:0x7f6142476b19 [ 2153.669015] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2153.671601] RSP: 002b:00007f613f9ec188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2153.672686] RAX: ffffffffffffffda RBX: 00007f6142589f60 RCX: 00007f6142476b19 [ 2153.673688] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 0000000000000000 [ 2153.674672] RBP: 00007f613f9ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2153.675674] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2153.676657] R13: 00007ffcef2b488f R14: 00007f613f9ec300 R15: 0000000000022000 02:18:38 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x9, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:18:38 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@ipv4={'\x00', '\xff\xff', @dev}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}}, {{@in=@multicast1, 0x0, 0x6c}, 0xa, @in, 0x0, 0x4, 0x0, 0xfc}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 02:18:38 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x34000, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:18:38 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x2c4, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 02:18:38 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x8) execveat(r8, &(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000400)='\x00', 0x0, &(0x7f0000000480)='\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000280)='@\x90\x9a\x7fl\x00\x00\x00\x00p\xc4S\x9ch\xceH9\x88\xf3c\xb4\xabz#\xa8\xbb5\xd3\xc8\x9b\x00\x00 \x00\x00\x00\x00\x00', &(0x7f0000000540)='\x00', &(0x7f0000000a00)='\x009\x1c\xaf\x14\xe6\xeb\xe9\xf1\xccO@\xbd\xfc\xbdN\xfa\x93Z\x94\xfd\xc6]\xc3\x81g\x95\'\xb7\xf2\xe8\xbf\xd3\xf3\"\xf0Z\x93T\xa1\xc6\x10\x01\xba\xf0\x11\x01 \x94X\x7fQ\xa6\v\xfa\xc2\\$\xad\x96A\xd6\xdf|\x0e,c\xc4\x13\xfb\x91\xc5|{\xde\'xb\xcd\xb2\x177\x83\'\xdb\xf6y_\x10\x87\x01\xd4\xb1\x9b\xe4\xac\xf0D4\xe6v\x86\x02^bt\xbf!b\xd4k\x11\xf5Nj\x97P\b\xf2\xdd\r\xaa,g\xfc\x8f*\bq\x10wl\xe0\x02HG)\xa0\xb9%\x12\x9fx]\xf8Gz`\xfd\x00l\xe9<\xa5\xbd\x9f\x80\xa5\x0f\xd3\xf7\xc8\x98'], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000440)='\x00', &(0x7f0000000740)='\x10', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) 02:18:39 executing program 5: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) (fail_nth: 16) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) 02:18:39 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@ipv4={'\x00', '\xff\xff', @dev}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1}, 0xa, @in, 0x0, 0x4, 0x0, 0xfc}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 02:18:39 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x10000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0xb}, 0x1c210, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x9) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5, r0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 02:18:39 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0xf, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) [ 2153.920207] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2153.957244] FAULT_INJECTION: forcing a failure. [ 2153.957244] name failslab, interval 1, probability 0, space 0, times 0 [ 2153.959181] CPU: 1 PID: 14030 Comm: syz-executor.5 Not tainted 5.10.226 #1 [ 2153.960164] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2153.961347] Call Trace: [ 2153.961741] dump_stack+0x107/0x167 [ 2153.962274] should_fail.cold+0x5/0xa [ 2153.962840] ? create_object.isra.0+0x3a/0xa20 [ 2153.963512] should_failslab+0x5/0x20 [ 2153.964051] kmem_cache_alloc+0x5b/0x310 [ 2153.964644] create_object.isra.0+0x3a/0xa20 [ 2153.965262] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2153.966006] kmem_cache_alloc_trace+0x151/0x320 [ 2153.966677] ? lockdep_init_map_type+0x2c7/0x780 [ 2153.967371] legacy_init_fs_context+0x44/0xe0 [ 2153.968047] ? generic_parse_monolithic+0x1f0/0x1f0 [ 2153.968771] alloc_fs_context+0x4fd/0x840 [ 2153.969388] ? tracefs_remount+0x90/0x90 [ 2153.969984] mount_single+0x9b/0x1f0 [ 2153.970540] ? remove_one+0x20/0x20 [ 2153.971076] legacy_get_tree+0x105/0x220 [ 2153.971670] vfs_get_tree+0x8e/0x300 [ 2153.972222] path_mount+0x1429/0x2120 [ 2153.972806] ? strncpy_from_user+0x9e/0x470 [ 2153.973452] ? finish_automount+0xa90/0xa90 [ 2153.974098] ? getname_flags.part.0+0x1dd/0x4f0 [ 2153.974792] __x64_sys_mount+0x282/0x300 [ 2153.975378] ? copy_mnt_ns+0xa00/0xa00 [ 2153.975969] do_syscall_64+0x33/0x40 [ 2153.976516] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2153.977268] RIP: 0033:0x7f6142476b19 [ 2153.977822] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2153.980504] RSP: 002b:00007f613f9ec188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2153.981634] RAX: ffffffffffffffda RBX: 00007f6142589f60 RCX: 00007f6142476b19 [ 2153.982684] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 0000000000000000 [ 2153.983719] RBP: 00007f613f9ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2153.984752] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2153.985781] R13: 00007ffcef2b488f R14: 00007f613f9ec300 R15: 0000000000022000 02:18:54 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x300, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 02:18:54 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x80000, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:18:54 executing program 5: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) (fail_nth: 17) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) 02:18:54 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x10000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0xb}, 0x1c210, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x9) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5, r0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 02:18:54 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@ipv4={'\x00', '\xff\xff', @dev}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1}, 0xa, @in, 0x0, 0x4, 0x0, 0xfc}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 02:18:54 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x300, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:18:54 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x8) execveat(r8, &(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000400)='\x00', 0x0, &(0x7f0000000480)='\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000280)='@\x90\x9a\x7fl\x00\x00\x00\x00p\xc4S\x9ch\xceH9\x88\xf3c\xb4\xabz#\xa8\xbb5\xd3\xc8\x9b\x00\x00 \x00\x00\x00\x00\x00', &(0x7f0000000540)='\x00', &(0x7f0000000a00)='\x009\x1c\xaf\x14\xe6\xeb\xe9\xf1\xccO@\xbd\xfc\xbdN\xfa\x93Z\x94\xfd\xc6]\xc3\x81g\x95\'\xb7\xf2\xe8\xbf\xd3\xf3\"\xf0Z\x93T\xa1\xc6\x10\x01\xba\xf0\x11\x01 \x94X\x7fQ\xa6\v\xfa\xc2\\$\xad\x96A\xd6\xdf|\x0e,c\xc4\x13\xfb\x91\xc5|{\xde\'xb\xcd\xb2\x177\x83\'\xdb\xf6y_\x10\x87\x01\xd4\xb1\x9b\xe4\xac\xf0D4\xe6v\x86\x02^bt\xbf!b\xd4k\x11\xf5Nj\x97P\b\xf2\xdd\r\xaa,g\xfc\x8f*\bq\x10wl\xe0\x02HG)\xa0\xb9%\x12\x9fx]\xf8Gz`\xfd\x00l\xe9<\xa5\xbd\x9f\x80\xa5\x0f\xd3\xf7\xc8\x98'], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000440)='\x00', &(0x7f0000000740)='\x10', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) 02:18:54 executing program 1: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x8, 0x13, r0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) r2 = fsopen(&(0x7f00000000c0)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000540)='/sys/kernel/oops_count', 0x28000, 0x8) r4 = fsmount(r3, 0x0, 0x8b) syz_open_dev$evdev(&(0x7f0000000040), 0x61d, 0x2) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r6 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r5, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, 0x0) fallocate(r6, 0x0, 0x10001, 0x100) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000040)={0x0, r6, 0x2}) perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x80, 0xa5, 0x1, 0xff, 0x6, 0x0, 0x20, 0x4, 0x5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x200, 0x1, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x6, 0x5, 0x9, 0x4, 0x7fffffff, 0xd997, 0x0, 0x7f3a64bd, 0x0, 0xffffffffffffffc1}, r4, 0xffffffffffffffff, r5, 0x0) [ 2169.245212] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2169.272324] FAULT_INJECTION: forcing a failure. [ 2169.272324] name failslab, interval 1, probability 0, space 0, times 0 [ 2169.274437] CPU: 1 PID: 14056 Comm: syz-executor.5 Not tainted 5.10.226 #1 [ 2169.275499] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2169.276738] Call Trace: [ 2169.277235] dump_stack+0x107/0x167 [ 2169.277921] should_fail.cold+0x5/0xa [ 2169.278505] ? alloc_vfsmnt+0x23/0x680 [ 2169.279081] should_failslab+0x5/0x20 [ 2169.279657] kmem_cache_alloc+0x5b/0x310 [ 2169.280285] ? up_write+0x191/0x550 [ 2169.280873] alloc_vfsmnt+0x23/0x680 [ 2169.281469] vfs_create_mount+0x8b/0x480 [ 2169.282129] path_mount+0x17b5/0x2120 [ 2169.282743] ? strncpy_from_user+0x9e/0x470 [ 2169.283546] ? finish_automount+0xa90/0xa90 [ 2169.284214] __x64_sys_mount+0x282/0x300 [ 2169.284962] ? copy_mnt_ns+0xa00/0xa00 [ 2169.285588] do_syscall_64+0x33/0x40 [ 2169.286238] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2169.287018] RIP: 0033:0x7f6142476b19 [ 2169.287681] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2169.290387] RSP: 002b:00007f613f9ec188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2169.291499] RAX: ffffffffffffffda RBX: 00007f6142589f60 RCX: 00007f6142476b19 [ 2169.292646] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 0000000000000000 [ 2169.293677] RBP: 00007f613f9ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2169.294840] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2169.295849] R13: 00007ffcef2b488f R14: 00007f613f9ec300 R15: 0000000000022000 02:18:54 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@ipv4={'\x00', '\xff\xff', @dev}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1}, 0xa, @in, 0x0, 0x4, 0x0, 0xfc}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 02:18:54 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x500, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:18:54 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x500, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 02:18:54 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x400300, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:18:54 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="3400000010000100cc680000000000000000000005000000000000001532336740e46387f800008064dcdc6ca616ef0dd0179be149f83265ff000ad022cea3b5906ed71efbac71604114ae634a1d3f5b42332fdb1ddff6c996d594f336ad93897a4c7c7d052c951ff3b19a2ae8dfe7daae4433b91e5be24f079e43a9066a68a1d63857237b3704f14d41e4376c1319a3cb91015718c602f3acaab637ceb7852dafdf71f385cfa97aa0b4888bc38b88bda6372e3668ad38b7f74f5579af15595a0c30e5611c48d698f5ab174fbc688112a84b0e6b16587fe1cca80147b9e1c0f1ed5b30c723ba82fe7b97990c195cdd6e5a3ec6986122d762e9182637b26db43c9871a7e08e00a222e27bb9eb35ce4745ffeda794f8f9b433cfaf77a5c151481692b680c9217e78cf5b4a110e4cf58a2481900e9ee69cdf0b73241206255494d36aa01416f7d0d0620f0b8526ca8484f212079b26fe05a315317995f2e147c5246ec242cda7921facafba1cf981b778d7b9333c9f88b53bf8b3a1c472d9869179a5d75ccaa1fa65e00d0b492e89e54f4d9ef4d61d2d7315ac264ed102185b46eef868a43ff0c84a79ac7dedfe21843442cfa03ab8fdf2c4a9967b518d211ddceeca7cce24735f1daf18a359c87c7c89a2011187f1b8d95f288434370c44a92d4dda3151ae0c5bb732e4baa5994bbe49e76eb2277e38c8f867d4a099cb00d9d38ca7bca38999cd3fc3b3ecb356302feed4b34c"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x8) execveat(r8, &(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000400)='\x00', 0x0, &(0x7f0000000480)='\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000280)='@\x90\x9a\x7fl\x00\x00\x00\x00p\xc4S\x9ch\xceH9\x88\xf3c\xb4\xabz#\xa8\xbb5\xd3\xc8\x9b\x00\x00 \x00\x00\x00\x00\x00', &(0x7f0000000540)='\x00', &(0x7f0000000a00)='\x009\x1c\xaf\x14\xe6\xeb\xe9\xf1\xccO@\xbd\xfc\xbdN\xfa\x93Z\x94\xfd\xc6]\xc3\x81g\x95\'\xb7\xf2\xe8\xbf\xd3\xf3\"\xf0Z\x93T\xa1\xc6\x10\x01\xba\xf0\x11\x01 \x94X\x7fQ\xa6\v\xfa\xc2\\$\xad\x96A\xd6\xdf|\x0e,c\xc4\x13\xfb\x91\xc5|{\xde\'xb\xcd\xb2\x177\x83\'\xdb\xf6y_\x10\x87\x01\xd4\xb1\x9b\xe4\xac\xf0D4\xe6v\x86\x02^bt\xbf!b\xd4k\x11\xf5Nj\x97P\b\xf2\xdd\r\xaa,g\xfc\x8f*\bq\x10wl\xe0\x02HG)\xa0\xb9%\x12\x9fx]\xf8Gz`\xfd\x00l\xe9<\xa5\xbd\x9f\x80\xa5\x0f\xd3\xf7\xc8\x98'], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000440)='\x00', &(0x7f0000000740)='\x10', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) 02:18:54 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@ipv4={'\x00', '\xff\xff', @dev}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in, 0x0, 0x4, 0x0, 0xfc}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 02:18:54 executing program 5: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) (fail_nth: 18) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) 02:18:54 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x8) execveat(r8, &(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000400)='\x00', 0x0, &(0x7f0000000480)='\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000280)='@\x90\x9a\x7fl\x00\x00\x00\x00p\xc4S\x9ch\xceH9\x88\xf3c\xb4\xabz#\xa8\xbb5\xd3\xc8\x9b\x00\x00 \x00\x00\x00\x00\x00', &(0x7f0000000540)='\x00', &(0x7f0000000a00)='\x009\x1c\xaf\x14\xe6\xeb\xe9\xf1\xccO@\xbd\xfc\xbdN\xfa\x93Z\x94\xfd\xc6]\xc3\x81g\x95\'\xb7\xf2\xe8\xbf\xd3\xf3\"\xf0Z\x93T\xa1\xc6\x10\x01\xba\xf0\x11\x01 \x94X\x7fQ\xa6\v\xfa\xc2\\$\xad\x96A\xd6\xdf|\x0e,c\xc4\x13\xfb\x91\xc5|{\xde\'xb\xcd\xb2\x177\x83\'\xdb\xf6y_\x10\x87\x01\xd4\xb1\x9b\xe4\xac\xf0D4\xe6v\x86\x02^bt\xbf!b\xd4k\x11\xf5Nj\x97P\b\xf2\xdd\r\xaa,g\xfc\x8f*\bq\x10wl\xe0\x02HG)\xa0\xb9%\x12\x9fx]\xf8Gz`\xfd\x00l\xe9<\xa5\xbd\x9f\x80\xa5\x0f\xd3\xf7\xc8\x98'], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000440)='\x00', &(0x7f0000000740)='\x10', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) 02:18:54 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x10000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0xb}, 0x1c210, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x9) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5, r0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) [ 2169.543932] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2169.562471] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2169.581405] FAULT_INJECTION: forcing a failure. [ 2169.581405] name failslab, interval 1, probability 0, space 0, times 0 [ 2169.583375] CPU: 0 PID: 14180 Comm: syz-executor.5 Not tainted 5.10.226 #1 [ 2169.584441] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2169.585725] Call Trace: [ 2169.586146] dump_stack+0x107/0x167 [ 2169.586719] should_fail.cold+0x5/0xa [ 2169.587318] ? create_object.isra.0+0x3a/0xa20 [ 2169.588034] should_failslab+0x5/0x20 [ 2169.588633] kmem_cache_alloc+0x5b/0x310 [ 2169.589269] create_object.isra.0+0x3a/0xa20 [ 2169.589969] kmemleak_alloc_percpu+0xa0/0x100 [ 2169.590677] pcpu_alloc+0x4e2/0x1240 [ 2169.591277] alloc_vfsmnt+0xfd/0x680 [ 2169.591861] vfs_create_mount+0x8b/0x480 [ 2169.592494] path_mount+0x17b5/0x2120 [ 2169.593096] ? strncpy_from_user+0x9e/0x470 [ 2169.593779] ? finish_automount+0xa90/0xa90 [ 2169.594466] __x64_sys_mount+0x282/0x300 [ 2169.595096] ? copy_mnt_ns+0xa00/0xa00 [ 2169.595722] do_syscall_64+0x33/0x40 [ 2169.596301] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2169.597104] RIP: 0033:0x7f6142476b19 [ 2169.597694] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2169.600553] RSP: 002b:00007f613f9ec188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2169.601745] RAX: ffffffffffffffda RBX: 00007f6142589f60 RCX: 00007f6142476b19 [ 2169.602847] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 0000000000000000 [ 2169.603945] RBP: 00007f613f9ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2169.605057] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2169.606168] R13: 00007ffcef2b488f R14: 00007f613f9ec300 R15: 0000000000022000 02:19:12 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x600, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 02:19:12 executing program 5: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) (fail_nth: 19) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) 02:19:12 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x10400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff89}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f00000002c0)=""/225, 0xe1) creat(0x0, 0x0) getpid() r0 = syz_io_uring_setup(0x4d4f, &(0x7f0000000040)={0x0, 0x0, 0x1, 0xfffffffd}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd_index=0x2, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x80004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x7fff, 0x0, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) setsockopt$inet6_IPV6_DSTOPTS(r3, 0x29, 0x3b, &(0x7f0000000400)=ANY=[@ANYBLOB="8a0000b4f1be4bc09143e41b472b1d8fd159af0d2088fa949ccb470c25e42e6153c02b02110d7a4271cf18f48e2684c2598f3a6fbcded5633f9b381583de95d6bdd2f2d7acbe735a175fd01b6a3a70d2bf3329caf80bac3cc37af2b49b91bd999935"], 0x8) sendmmsg$inet6(r3, &(0x7f0000000080)=[{{0x0, 0x90, &(0x7f00000004c0)=[{&(0x7f00000001c0)="4bc702854e3954b59347985ccc868289d3fe483d2c0900a2a1d12e33a66529e1f276fef452632dfa3c004ce3be84a5f66c29cd4ec39ae5206562fbc9ea3c0dbbebc22e628e147b0e9631f19b0ce0a48e0e675b2da3442226b898f1ddf8eabf133ab4a9cb0999c2ee1d3bd36d089b0d8e97ea00d4c5f6ad14dce058d595aacba2d587ff5eacd81b71a73f53ed276d1f3b3384bb2bfba4e0f37302e690df9e7024378ac754ac0576f996f3ee53d1034c7720767ddf2625817532f7ae89103367b73a36152b84c38bc227ba9e9ff48bcfe027585cf14bff37a888", 0xff41}], 0x1}}], 0x1, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 02:19:12 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x600, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:19:12 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@ipv4={'\x00', '\xff\xff', @dev}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in, 0x0, 0x4, 0x0, 0xfc}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 02:19:12 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x8) execveat(r8, &(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000bc0)='\x00\x80C\x107\xa64\xee\xbd*\xd4o\x8a?[\x98\xf29\xee\xc7\x90\x97\xaa\xc3\xc8Zq\xf3\x91\x04[S\\B2m=V\x89\x99\x96Q\xcaA\x18\xaf\xaf:\xf1\xab\x80\"\x7f\xb3\x18\xfe\xd7\xbd\xcd\xcdIf\xae\xb5\x87\xb8#\xe1\xbe\xec\xf0\t\xa1\xf7\xa7\xb1\x9d\xc7\xc2\xf0\x02\xaf\xc4\xd0@\xc2\x12\'\xb9\x9a\xea\x90e%\xe6\xd2E\x19E/\xc6\x17gB0Qim\x82u\x0fZ\xa9\x14\xf5\xc7X\xa9\x00\xb7\xaf\xcfouN\xbd\xb2\t^\xbe&~\xa7l\xfa\x036\x1c\"\x80\xfc/\x9b\x95\xf1!K\xc5{\xe7\xfdB[\xca\x87\x9bc\x98dg\x1a\xa1\xaa\xb4\x19\x7f\xa7\x90y\x9fq\xf5\x8a\xa9 \xa6\xdd\xf0+gb\xa6g\\\xec\tz\x06\xdf\x1a\x9c\xc9\xf7\xcc\x85\xb4G\xe9\xd3D\xf4\x8c\n\x17\xd5\x00\xf18\xb3T', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000280)='@\x90\x9a\x7fl\x00\x00\x00\x00p\xc4S\x9ch\xceH9\x88\xf3c\xb4\xabz#\xa8\xbb5\xd3\xc8\x9b\x00\x00 \x00\x00\x00\x00\x00', &(0x7f0000000540)='\x00', &(0x7f0000000a00)='\x009\x1c\xaf\x14\xe6\xeb\xe9\xf1\xccO@\xbd\xfc\xbdN\xfa\x93Z\x94\xfd\xc6]\xc3\x81g\x95\'\xb7\xf2\xe8\xbf\xd3\xf3\"\xf0Z\x93T\xa1\xc6\x10\x01\xba\xf0\x11\x01 \x94X\x7fQ\xa6\v\xfa\xc2\\$\xad\x96A\xd6\xdf|\x0e,c\xc4\x13\xfb\x91\xc5|{\xde\'xb\xcd\xb2\x177\x83\'\xdb\xf6y_\x10\x87\x01\xd4\xb1\x9b\xe4\xac\xf0D4\xe6v\x86\x02^bt\xbf!b\xd4k\x11\xf5Nj\x97P\b\xf2\xdd\r\xaa,g\xfc\x8f*\bq\x10wl\xe0\x02HG)\xa0\xb9%\x12\x9fx]\xf8Gz`\xfd\x00l\xe9<\xa5\xbd\x9f\x80\xa5\x0f\xd3\xf7\xc8\x98'], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000440)='\x00', &(0x7f0000000740)='\x10', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) 02:19:12 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x10000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0xb}, 0x1c210, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x4}, 0x0, 0xd, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5, r0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 02:19:12 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x1000000, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) [ 2187.009045] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2187.041201] FAULT_INJECTION: forcing a failure. [ 2187.041201] name failslab, interval 1, probability 0, space 0, times 0 [ 2187.043875] CPU: 0 PID: 14193 Comm: syz-executor.5 Not tainted 5.10.226 #1 [ 2187.045246] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2187.046901] Call Trace: [ 2187.047443] dump_stack+0x107/0x167 [ 2187.048161] should_fail.cold+0x5/0xa [ 2187.048801] ? create_object.isra.0+0x3a/0xa20 [ 2187.049516] should_failslab+0x5/0x20 [ 2187.050138] kmem_cache_alloc+0x5b/0x310 [ 2187.050881] create_object.isra.0+0x3a/0xa20 [ 2187.051579] kmemleak_alloc_percpu+0xa0/0x100 [ 2187.052310] pcpu_alloc+0x4e2/0x1240 [ 2187.052918] alloc_vfsmnt+0xfd/0x680 [ 2187.053522] vfs_create_mount+0x8b/0x480 [ 2187.054177] path_mount+0x17b5/0x2120 [ 2187.054799] ? strncpy_from_user+0x9e/0x470 [ 2187.055474] ? finish_automount+0xa90/0xa90 [ 2187.056185] __x64_sys_mount+0x282/0x300 [ 2187.056822] ? copy_mnt_ns+0xa00/0xa00 [ 2187.057463] do_syscall_64+0x33/0x40 [ 2187.058057] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2187.058879] RIP: 0033:0x7f6142476b19 [ 2187.059460] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2187.062413] RSP: 002b:00007f613f9ec188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2187.063604] RAX: ffffffffffffffda RBX: 00007f6142589f60 RCX: 00007f6142476b19 [ 2187.064716] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 0000000000000000 [ 2187.065826] RBP: 00007f613f9ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2187.066945] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2187.068051] R13: 00007ffcef2b488f R14: 00007f613f9ec300 R15: 0000000000022000 02:19:12 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@ipv4={'\x00', '\xff\xff', @dev}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in, 0x0, 0x4, 0x0, 0xfc}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 02:19:12 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x700, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:19:12 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x700, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 02:19:12 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x2000000, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:19:12 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="3400000010000100cc680000000000000000000005000000000000001532336740e46387f800008064dcdc6ca616ef0dd0179be149f83265ff000ad022cea3b5906ed71efbac71604114ae634a1d3f5b42332fdb1ddff6c996d594f336ad93897a4c7c7d052c951ff3b19a2ae8dfe7daae4433b91e5be24f079e43a9066a68a1d63857237b3704f14d41e4376c1319a3cb91015718c602f3acaab637ceb7852dafdf71f385cfa97aa0b4888bc38b88bda6372e3668ad38b7f74f5579af15595a0c30e5611c48d698f5ab174fbc688112a84b0e6b16587fe1cca80147b9e1c0f1ed5b30c723ba82fe7b97990c195cdd6e5a3ec6986122d762e9182637b26db43c9871a7e08e00a222e27bb9eb35ce4745ffeda794f8f9b433cfaf77a5c151481692b680c9217e78cf5b4a110e4cf58a2481900e9ee69cdf0b73241206255494d36aa01416f7d0d0620f0b8526ca8484f212079b26fe05a315317995f2e147c5246ec242cda7921facafba1cf981b778d7b9333c9f88b53bf8b3a1c472d9869179a5d75ccaa1fa65e00d0b492e89e54f4d9ef4d61d2d7315ac264ed102185b46eef868a43ff0c84a79ac7dedfe21843442cfa03ab8fdf2c4a9967b518d211ddceeca7cce24735f1daf18a359c87c7c89a2011187f1b8d95f288434370c44a92d4dda3151ae0c5bb732e4baa5994bbe49e76eb2277e38c8f867d4a099cb00d9d38ca7bca38999cd3fc3b3ecb356302feed4b34c"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x8) execveat(r8, &(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000bc0)='\x00\x80C\x107\xa64\xee\xbd*\xd4o\x8a?[\x98\xf29\xee\xc7\x90\x97\xaa\xc3\xc8Zq\xf3\x91\x04[S\\B2m=V\x89\x99\x96Q\xcaA\x18\xaf\xaf:\xf1\xab\x80\"\x7f\xb3\x18\xfe\xd7\xbd\xcd\xcdIf\xae\xb5\x87\xb8#\xe1\xbe\xec\xf0\t\xa1\xf7\xa7\xb1\x9d\xc7\xc2\xf0\x02\xaf\xc4\xd0@\xc2\x12\'\xb9\x9a\xea\x90e%\xe6\xd2E\x19E/\xc6\x17gB0Qim\x82u\x0fZ\xa9\x14\xf5\xc7X\xa9\x00\xb7\xaf\xcfouN\xbd\xb2\t^\xbe&~\xa7l\xfa\x036\x1c\"\x80\xfc/\x9b\x95\xf1!K\xc5{\xe7\xfdB[\xca\x87\x9bc\x98dg\x1a\xa1\xaa\xb4\x19\x7f\xa7\x90y\x9fq\xf5\x8a\xa9 \xa6\xdd\xf0+gb\xa6g\\\xec\tz\x06\xdf\x1a\x9c\xc9\xf7\xcc\x85\xb4G\xe9\xd3D\xf4\x8c\n\x17\xd5\x00\xf18\xb3T', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000280)='@\x90\x9a\x7fl\x00\x00\x00\x00p\xc4S\x9ch\xceH9\x88\xf3c\xb4\xabz#\xa8\xbb5\xd3\xc8\x9b\x00\x00 \x00\x00\x00\x00\x00', &(0x7f0000000540)='\x00', &(0x7f0000000a00)='\x009\x1c\xaf\x14\xe6\xeb\xe9\xf1\xccO@\xbd\xfc\xbdN\xfa\x93Z\x94\xfd\xc6]\xc3\x81g\x95\'\xb7\xf2\xe8\xbf\xd3\xf3\"\xf0Z\x93T\xa1\xc6\x10\x01\xba\xf0\x11\x01 \x94X\x7fQ\xa6\v\xfa\xc2\\$\xad\x96A\xd6\xdf|\x0e,c\xc4\x13\xfb\x91\xc5|{\xde\'xb\xcd\xb2\x177\x83\'\xdb\xf6y_\x10\x87\x01\xd4\xb1\x9b\xe4\xac\xf0D4\xe6v\x86\x02^bt\xbf!b\xd4k\x11\xf5Nj\x97P\b\xf2\xdd\r\xaa,g\xfc\x8f*\bq\x10wl\xe0\x02HG)\xa0\xb9%\x12\x9fx]\xf8Gz`\xfd\x00l\xe9<\xa5\xbd\x9f\x80\xa5\x0f\xd3\xf7\xc8\x98'], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000440)='\x00', &(0x7f0000000740)='\x10', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) [ 2187.279333] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 02:19:12 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x10000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0xb}, 0x1c210, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x4}, 0x0, 0xd, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5, r0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 02:19:12 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x900, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:19:28 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x900, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 02:19:28 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@ipv4={'\x00', '\xff\xff', @dev}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0xa, @in, 0x0, 0x0, 0x0, 0xfc}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 02:19:28 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x10000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0xb}, 0x1c210, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x4}, 0x0, 0xd, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5, r0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 02:19:28 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0xf00, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:19:28 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup(r0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_WIPHY(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, r2, 0x325, 0x0, 0x0, {{}, {@void, @val={0x8, 0x10}, @val={0xc}}}}, 0x28}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0), r1) syz_genetlink_get_family_id$fou(&(0x7f0000000700), r1) 02:19:28 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x3000000, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:19:28 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="3400000010000100cc680000000000000000000005000000000000001532336740e46387f800008064dcdc6ca616ef0dd0179be149f83265ff000ad022cea3b5906ed71efbac71604114ae634a1d3f5b42332fdb1ddff6c996d594f336ad93897a4c7c7d052c951ff3b19a2ae8dfe7daae4433b91e5be24f079e43a9066a68a1d63857237b3704f14d41e4376c1319a3cb91015718c602f3acaab637ceb7852dafdf71f385cfa97aa0b4888bc38b88bda6372e3668ad38b7f74f5579af15595a0c30e5611c48d698f5ab174fbc688112a84b0e6b16587fe1cca80147b9e1c0f1ed5b30c723ba82fe7b97990c195cdd6e5a3ec6986122d762e9182637b26db43c9871a7e08e00a222e27bb9eb35ce4745ffeda794f8f9b433cfaf77a5c151481692b680c9217e78cf5b4a110e4cf58a2481900e9ee69cdf0b73241206255494d36aa01416f7d0d0620f0b8526ca8484f212079b26fe05a315317995f2e147c5246ec242cda7921facafba1cf981b778d7b9333c9f88b53bf8b3a1c472d9869179a5d75ccaa1fa65e00d0b492e89e54f4d9ef4d61d2d7315ac264ed102185b46eef868a43ff0c84a79ac7dedfe21843442cfa03ab8fdf2c4a9967b518d211ddceeca7cce24735f1daf18a359c87c7c89a2011187f1b8d95f288434370c44a92d4dda3151ae0c5bb732e4baa5994bbe49e76eb2277e38c8f867d4a099cb00d9d38ca7bca38999cd3fc3b3ecb356302feed4b34c"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x8) execveat(r8, &(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000bc0)='\x00\x80C\x107\xa64\xee\xbd*\xd4o\x8a?[\x98\xf29\xee\xc7\x90\x97\xaa\xc3\xc8Zq\xf3\x91\x04[S\\B2m=V\x89\x99\x96Q\xcaA\x18\xaf\xaf:\xf1\xab\x80\"\x7f\xb3\x18\xfe\xd7\xbd\xcd\xcdIf\xae\xb5\x87\xb8#\xe1\xbe\xec\xf0\t\xa1\xf7\xa7\xb1\x9d\xc7\xc2\xf0\x02\xaf\xc4\xd0@\xc2\x12\'\xb9\x9a\xea\x90e%\xe6\xd2E\x19E/\xc6\x17gB0Qim\x82u\x0fZ\xa9\x14\xf5\xc7X\xa9\x00\xb7\xaf\xcfouN\xbd\xb2\t^\xbe&~\xa7l\xfa\x036\x1c\"\x80\xfc/\x9b\x95\xf1!K\xc5{\xe7\xfdB[\xca\x87\x9bc\x98dg\x1a\xa1\xaa\xb4\x19\x7f\xa7\x90y\x9fq\xf5\x8a\xa9 \xa6\xdd\xf0+gb\xa6g\\\xec\tz\x06\xdf\x1a\x9c\xc9\xf7\xcc\x85\xb4G\xe9\xd3D\xf4\x8c\n\x17\xd5\x00\xf18\xb3T', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000280)='@\x90\x9a\x7fl\x00\x00\x00\x00p\xc4S\x9ch\xceH9\x88\xf3c\xb4\xabz#\xa8\xbb5\xd3\xc8\x9b\x00\x00 \x00\x00\x00\x00\x00', &(0x7f0000000540)='\x00', &(0x7f0000000a00)='\x009\x1c\xaf\x14\xe6\xeb\xe9\xf1\xccO@\xbd\xfc\xbdN\xfa\x93Z\x94\xfd\xc6]\xc3\x81g\x95\'\xb7\xf2\xe8\xbf\xd3\xf3\"\xf0Z\x93T\xa1\xc6\x10\x01\xba\xf0\x11\x01 \x94X\x7fQ\xa6\v\xfa\xc2\\$\xad\x96A\xd6\xdf|\x0e,c\xc4\x13\xfb\x91\xc5|{\xde\'xb\xcd\xb2\x177\x83\'\xdb\xf6y_\x10\x87\x01\xd4\xb1\x9b\xe4\xac\xf0D4\xe6v\x86\x02^bt\xbf!b\xd4k\x11\xf5Nj\x97P\b\xf2\xdd\r\xaa,g\xfc\x8f*\bq\x10wl\xe0\x02HG)\xa0\xb9%\x12\x9fx]\xf8Gz`\xfd\x00l\xe9<\xa5\xbd\x9f\x80\xa5\x0f\xd3\xf7\xc8\x98'], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000440)='\x00', &(0x7f0000000740)='\x10', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) 02:19:28 executing program 5: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) (fail_nth: 20) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) [ 2203.477839] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2203.504306] netlink: 'syz-executor.1': attribute type 16 has an invalid length. [ 2203.512983] FAULT_INJECTION: forcing a failure. [ 2203.512983] name failslab, interval 1, probability 0, space 0, times 0 [ 2203.514942] CPU: 0 PID: 14351 Comm: syz-executor.5 Not tainted 5.10.226 #1 [ 2203.515963] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2203.517186] Call Trace: [ 2203.517590] dump_stack+0x107/0x167 [ 2203.518139] should_fail.cold+0x5/0xa [ 2203.518718] ? create_object.isra.0+0x3a/0xa20 [ 2203.519396] should_failslab+0x5/0x20 [ 2203.519965] kmem_cache_alloc+0x5b/0x310 [ 2203.520587] create_object.isra.0+0x3a/0xa20 [ 2203.521250] kmemleak_alloc_percpu+0xa0/0x100 [ 2203.521920] pcpu_alloc+0x4e2/0x1240 [ 2203.522554] alloc_vfsmnt+0xfd/0x680 [ 2203.523121] vfs_create_mount+0x8b/0x480 [ 2203.523787] path_mount+0x17b5/0x2120 [ 2203.524373] ? strncpy_from_user+0x9e/0x470 [ 2203.525019] ? finish_automount+0xa90/0xa90 [ 2203.525695] __x64_sys_mount+0x282/0x300 [ 2203.526319] ? copy_mnt_ns+0xa00/0xa00 [ 2203.526910] do_syscall_64+0x33/0x40 [ 2203.527460] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2203.528221] RIP: 0033:0x7f6142476b19 [ 2203.528774] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2203.531518] RSP: 002b:00007f613f9ec188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2203.532643] RAX: ffffffffffffffda RBX: 00007f6142589f60 RCX: 00007f6142476b19 [ 2203.533717] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 0000000000000000 [ 2203.534805] RBP: 00007f613f9ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2203.535882] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2203.536958] R13: 00007ffcef2b488f R14: 00007f613f9ec300 R15: 0000000000022000 02:19:28 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@ipv4={'\x00', '\xff\xff', @dev}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0xa, @in, 0x0, 0x0, 0x0, 0xfc}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 02:19:28 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x4000000, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:19:28 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x30000, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:19:28 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0xec0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 02:19:28 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x8) execveat(r8, &(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)=[0x0, &(0x7f0000000bc0)='\x00\x80C\x107\xa64\xee\xbd*\xd4o\x8a?[\x98\xf29\xee\xc7\x90\x97\xaa\xc3\xc8Zq\xf3\x91\x04[S\\B2m=V\x89\x99\x96Q\xcaA\x18\xaf\xaf:\xf1\xab\x80\"\x7f\xb3\x18\xfe\xd7\xbd\xcd\xcdIf\xae\xb5\x87\xb8#\xe1\xbe\xec\xf0\t\xa1\xf7\xa7\xb1\x9d\xc7\xc2\xf0\x02\xaf\xc4\xd0@\xc2\x12\'\xb9\x9a\xea\x90e%\xe6\xd2E\x19E/\xc6\x17gB0Qim\x82u\x0fZ\xa9\x14\xf5\xc7X\xa9\x00\xb7\xaf\xcfouN\xbd\xb2\t^\xbe&~\xa7l\xfa\x036\x1c\"\x80\xfc/\x9b\x95\xf1!K\xc5{\xe7\xfdB[\xca\x87\x9bc\x98dg\x1a\xa1\xaa\xb4\x19\x7f\xa7\x90y\x9fq\xf5\x8a\xa9 \xa6\xdd\xf0+gb\xa6g\\\xec\tz\x06\xdf\x1a\x9c\xc9\xf7\xcc\x85\xb4G\xe9\xd3D\xf4\x8c\n\x17\xd5\x00\xf18\xb3T', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000280)='@\x90\x9a\x7fl\x00\x00\x00\x00p\xc4S\x9ch\xceH9\x88\xf3c\xb4\xabz#\xa8\xbb5\xd3\xc8\x9b\x00\x00 \x00\x00\x00\x00\x00', &(0x7f0000000540)='\x00', &(0x7f0000000a00)='\x009\x1c\xaf\x14\xe6\xeb\xe9\xf1\xccO@\xbd\xfc\xbdN\xfa\x93Z\x94\xfd\xc6]\xc3\x81g\x95\'\xb7\xf2\xe8\xbf\xd3\xf3\"\xf0Z\x93T\xa1\xc6\x10\x01\xba\xf0\x11\x01 \x94X\x7fQ\xa6\v\xfa\xc2\\$\xad\x96A\xd6\xdf|\x0e,c\xc4\x13\xfb\x91\xc5|{\xde\'xb\xcd\xb2\x177\x83\'\xdb\xf6y_\x10\x87\x01\xd4\xb1\x9b\xe4\xac\xf0D4\xe6v\x86\x02^bt\xbf!b\xd4k\x11\xf5Nj\x97P\b\xf2\xdd\r\xaa,g\xfc\x8f*\bq\x10wl\xe0\x02HG)\xa0\xb9%\x12\x9fx]\xf8Gz`\xfd\x00l\xe9<\xa5\xbd\x9f\x80\xa5\x0f\xd3\xf7\xc8\x98'], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000440)='\x00', &(0x7f0000000740)='\x10', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) 02:19:28 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x10000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0xb}, 0x1c210, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x4}, 0x0, 0xd, 0xffffffffffffffff, 0x9) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5, r0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 02:19:28 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@ipv4={'\x00', '\xff\xff', @dev}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0xa, @in, 0x0, 0x0, 0x0, 0xfc}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 02:19:28 executing program 5: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) (fail_nth: 21) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) [ 2203.764885] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 02:19:28 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x34000, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) [ 2203.844934] FAULT_INJECTION: forcing a failure. [ 2203.844934] name failslab, interval 1, probability 0, space 0, times 0 [ 2203.846866] CPU: 0 PID: 14477 Comm: syz-executor.5 Not tainted 5.10.226 #1 [ 2203.847862] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2203.849039] Call Trace: [ 2203.849427] dump_stack+0x107/0x167 [ 2203.849950] should_fail.cold+0x5/0xa [ 2203.850512] ? create_object.isra.0+0x3a/0xa20 [ 2203.851207] should_failslab+0x5/0x20 [ 2203.851782] kmem_cache_alloc+0x5b/0x310 [ 2203.852395] create_object.isra.0+0x3a/0xa20 [ 2203.853028] kmemleak_alloc_percpu+0xa0/0x100 [ 2203.853675] pcpu_alloc+0x4e2/0x1240 [ 2203.854234] alloc_vfsmnt+0xfd/0x680 [ 2203.854772] vfs_create_mount+0x8b/0x480 [ 2203.855355] path_mount+0x17b5/0x2120 [ 2203.855910] ? strncpy_from_user+0x9e/0x470 [ 2203.856526] ? finish_automount+0xa90/0xa90 [ 2203.857154] __x64_sys_mount+0x282/0x300 [ 2203.857736] ? copy_mnt_ns+0xa00/0xa00 [ 2203.858312] do_syscall_64+0x33/0x40 [ 2203.858846] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2203.859573] RIP: 0033:0x7f6142476b19 [ 2203.860107] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2203.862728] RSP: 002b:00007f613f9ec188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2203.863811] RAX: ffffffffffffffda RBX: 00007f6142589f60 RCX: 00007f6142476b19 [ 2203.864817] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 0000000000000000 [ 2203.865822] RBP: 00007f613f9ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2203.866839] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2203.867851] R13: 00007ffcef2b488f R14: 00007f613f9ec300 R15: 0000000000022000 [ 2217.067366] netlink: 'syz-executor.1': attribute type 12 has an invalid length. [ 2217.069249] netlink: 'syz-executor.1': attribute type 12 has an invalid length. 02:19:42 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x222040, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)={0xd4, 0x3e, 0x402, 0x70bd2b, 0x25dfdbfb, {0x1}, [@generic="c944e07a69438131ec064b3338ca87fb76bc85712943d211b4d7eed1f03fc9aee364186b800cf53855ccbe3aee80ad6b7fdfaf834cd3f9d1aa0625d69d565b157b02415ccb81dd5567b40fb4358013060cbea4212922bac93cfa5eda35fc716e83db72330b2fb32b473b8c8d7c8bebdbb02368068fa3bfe3926340c4dd6e4f2e703f32f6293a44fb0db94c66fede619c1635b54edfc4fee389ea95d1aed2e8a123199ff1d6ee96d7ee0e4384f507084cfe81efda320d595f9ff3c1ae1470"]}, 0xd4}, 0x1, 0x0, 0x0, 0x40c0}, 0x10) r2 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)={0x24, 0x1e, 0xc0b12afe4b722e85, 0x0, 0x0, {}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0xc, 0x0, 0x0, @pid}, @generic]}, 0x24}, 0x1, 0x0, 0x0, 0x24040080}, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/93, 0x5d}, {0x0}], 0x2) 02:19:42 executing program 5: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) (fail_nth: 22) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) 02:19:42 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x10000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0xb}, 0x1c210, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x4}, 0x0, 0xd, 0xffffffffffffffff, 0x9) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5, r0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 02:19:42 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@ipv4={'\x00', '\xff\xff', @dev}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0xa, @in, 0x0, 0x4}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 02:19:42 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x5000000, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:19:42 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x80000, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:19:42 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x8) execveat(r8, &(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)=[0x0, &(0x7f0000000bc0)='\x00\x80C\x107\xa64\xee\xbd*\xd4o\x8a?[\x98\xf29\xee\xc7\x90\x97\xaa\xc3\xc8Zq\xf3\x91\x04[S\\B2m=V\x89\x99\x96Q\xcaA\x18\xaf\xaf:\xf1\xab\x80\"\x7f\xb3\x18\xfe\xd7\xbd\xcd\xcdIf\xae\xb5\x87\xb8#\xe1\xbe\xec\xf0\t\xa1\xf7\xa7\xb1\x9d\xc7\xc2\xf0\x02\xaf\xc4\xd0@\xc2\x12\'\xb9\x9a\xea\x90e%\xe6\xd2E\x19E/\xc6\x17gB0Qim\x82u\x0fZ\xa9\x14\xf5\xc7X\xa9\x00\xb7\xaf\xcfouN\xbd\xb2\t^\xbe&~\xa7l\xfa\x036\x1c\"\x80\xfc/\x9b\x95\xf1!K\xc5{\xe7\xfdB[\xca\x87\x9bc\x98dg\x1a\xa1\xaa\xb4\x19\x7f\xa7\x90y\x9fq\xf5\x8a\xa9 \xa6\xdd\xf0+gb\xa6g\\\xec\tz\x06\xdf\x1a\x9c\xc9\xf7\xcc\x85\xb4G\xe9\xd3D\xf4\x8c\n\x17\xd5\x00\xf18\xb3T', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000280)='@\x90\x9a\x7fl\x00\x00\x00\x00p\xc4S\x9ch\xceH9\x88\xf3c\xb4\xabz#\xa8\xbb5\xd3\xc8\x9b\x00\x00 \x00\x00\x00\x00\x00', &(0x7f0000000540)='\x00', &(0x7f0000000a00)='\x009\x1c\xaf\x14\xe6\xeb\xe9\xf1\xccO@\xbd\xfc\xbdN\xfa\x93Z\x94\xfd\xc6]\xc3\x81g\x95\'\xb7\xf2\xe8\xbf\xd3\xf3\"\xf0Z\x93T\xa1\xc6\x10\x01\xba\xf0\x11\x01 \x94X\x7fQ\xa6\v\xfa\xc2\\$\xad\x96A\xd6\xdf|\x0e,c\xc4\x13\xfb\x91\xc5|{\xde\'xb\xcd\xb2\x177\x83\'\xdb\xf6y_\x10\x87\x01\xd4\xb1\x9b\xe4\xac\xf0D4\xe6v\x86\x02^bt\xbf!b\xd4k\x11\xf5Nj\x97P\b\xf2\xdd\r\xaa,g\xfc\x8f*\bq\x10wl\xe0\x02HG)\xa0\xb9%\x12\x9fx]\xf8Gz`\xfd\x00l\xe9<\xa5\xbd\x9f\x80\xa5\x0f\xd3\xf7\xc8\x98'], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000440)='\x00', &(0x7f0000000740)='\x10', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) 02:19:42 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0xf00, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) [ 2217.107461] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2217.116739] FAULT_INJECTION: forcing a failure. [ 2217.116739] name failslab, interval 1, probability 0, space 0, times 0 [ 2217.119537] CPU: 1 PID: 14494 Comm: syz-executor.5 Not tainted 5.10.226 #1 [ 2217.120780] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2217.122424] Call Trace: [ 2217.122907] dump_stack+0x107/0x167 [ 2217.123569] should_fail.cold+0x5/0xa [ 2217.124255] ? create_object.isra.0+0x3a/0xa20 [ 2217.125065] ? create_object.isra.0+0x3a/0xa20 [ 2217.125874] should_failslab+0x5/0x20 [ 2217.126556] kmem_cache_alloc+0x5b/0x310 [ 2217.127158] create_object.isra.0+0x3a/0xa20 [ 2217.127799] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2217.128542] kmem_cache_alloc_trace+0x151/0x320 [ 2217.129234] get_mountpoint+0x14b/0x3e0 [ 2217.129816] attach_recursive_mnt+0x148/0xd40 [ 2217.130484] ? count_mounts+0x210/0x210 [ 2217.131063] ? kfree+0x1ab/0x340 [ 2217.131559] graft_tree+0x186/0x220 [ 2217.132085] do_add_mount+0x1cc/0x330 [ 2217.132644] path_mount+0x182b/0x2120 [ 2217.133206] ? strncpy_from_user+0x9e/0x470 [ 2217.133829] ? finish_automount+0xa90/0xa90 [ 2217.134477] __x64_sys_mount+0x282/0x300 [ 2217.135070] ? copy_mnt_ns+0xa00/0xa00 [ 2217.135651] do_syscall_64+0x33/0x40 [ 2217.136188] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2217.136924] RIP: 0033:0x7f6142476b19 [ 2217.137462] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2217.140076] RSP: 002b:00007f613f9ec188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2217.141169] RAX: ffffffffffffffda RBX: 00007f6142589f60 RCX: 00007f6142476b19 [ 2217.142190] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 0000000000000000 [ 2217.143215] RBP: 00007f613f9ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2217.144236] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2217.145254] R13: 00007ffcef2b488f R14: 00007f613f9ec300 R15: 0000000000022000 02:19:42 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@ipv4={'\x00', '\xff\xff', @dev}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0xa, @in, 0x0, 0x4}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 02:19:42 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x400300, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:19:42 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x10000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0xb}, 0x1c210, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x4}, 0x0, 0xd, 0xffffffffffffffff, 0x9) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5, r0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 02:19:42 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x6000000, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:19:42 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0xc00e, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 02:19:56 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@ipv4={'\x00', '\xff\xff', @dev}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0xa, @in, 0x0, 0x4}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 02:19:56 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x7000000, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:19:56 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0xc402, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) [ 2231.010329] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 02:19:56 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x8) execveat(r8, &(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)=[0x0, &(0x7f0000000bc0)='\x00\x80C\x107\xa64\xee\xbd*\xd4o\x8a?[\x98\xf29\xee\xc7\x90\x97\xaa\xc3\xc8Zq\xf3\x91\x04[S\\B2m=V\x89\x99\x96Q\xcaA\x18\xaf\xaf:\xf1\xab\x80\"\x7f\xb3\x18\xfe\xd7\xbd\xcd\xcdIf\xae\xb5\x87\xb8#\xe1\xbe\xec\xf0\t\xa1\xf7\xa7\xb1\x9d\xc7\xc2\xf0\x02\xaf\xc4\xd0@\xc2\x12\'\xb9\x9a\xea\x90e%\xe6\xd2E\x19E/\xc6\x17gB0Qim\x82u\x0fZ\xa9\x14\xf5\xc7X\xa9\x00\xb7\xaf\xcfouN\xbd\xb2\t^\xbe&~\xa7l\xfa\x036\x1c\"\x80\xfc/\x9b\x95\xf1!K\xc5{\xe7\xfdB[\xca\x87\x9bc\x98dg\x1a\xa1\xaa\xb4\x19\x7f\xa7\x90y\x9fq\xf5\x8a\xa9 \xa6\xdd\xf0+gb\xa6g\\\xec\tz\x06\xdf\x1a\x9c\xc9\xf7\xcc\x85\xb4G\xe9\xd3D\xf4\x8c\n\x17\xd5\x00\xf18\xb3T', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000280)='@\x90\x9a\x7fl\x00\x00\x00\x00p\xc4S\x9ch\xceH9\x88\xf3c\xb4\xabz#\xa8\xbb5\xd3\xc8\x9b\x00\x00 \x00\x00\x00\x00\x00', &(0x7f0000000540)='\x00', &(0x7f0000000a00)='\x009\x1c\xaf\x14\xe6\xeb\xe9\xf1\xccO@\xbd\xfc\xbdN\xfa\x93Z\x94\xfd\xc6]\xc3\x81g\x95\'\xb7\xf2\xe8\xbf\xd3\xf3\"\xf0Z\x93T\xa1\xc6\x10\x01\xba\xf0\x11\x01 \x94X\x7fQ\xa6\v\xfa\xc2\\$\xad\x96A\xd6\xdf|\x0e,c\xc4\x13\xfb\x91\xc5|{\xde\'xb\xcd\xb2\x177\x83\'\xdb\xf6y_\x10\x87\x01\xd4\xb1\x9b\xe4\xac\xf0D4\xe6v\x86\x02^bt\xbf!b\xd4k\x11\xf5Nj\x97P\b\xf2\xdd\r\xaa,g\xfc\x8f*\bq\x10wl\xe0\x02HG)\xa0\xb9%\x12\x9fx]\xf8Gz`\xfd\x00l\xe9<\xa5\xbd\x9f\x80\xa5\x0f\xd3\xf7\xc8\x98'], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000440)='\x00', &(0x7f0000000740)='\x10', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) 02:19:56 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x1000000, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:19:56 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@ipv4={'\x00', '\xff\xff', @dev}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0xa, @in, 0x0, 0x4, 0x0, 0xfc}}, 0xe8) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 02:19:56 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000004c0)={0x18, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@nested={0x4, 0x16}]}, 0x18}}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r2, 0x10e, 0x0, 0x0, &(0x7f0000000380)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x28, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0xa, 0x0, 0x0, 0x1, [@generic="487fec864b24"]}]}, 0x28}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000180)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_GET(r3, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)={0x90, r4, 0x2, 0x70bd2c, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x7c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x4}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7ff}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x5}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xdf00}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x40}]}, @TIPC_NLA_SOCK_CON={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x7}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x9}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x393}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x40}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x4f}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1fd}]}]}, 0x90}, 0x1, 0x0, 0x0, 0x90}, 0x40090) sendmsg$TIPC_NL_BEARER_DISABLE(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x1b8, r4, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_PUBL={0x54, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x2}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x88b3}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x3}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x3}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x3}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xea0}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x5}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x925}]}, @TIPC_NLA_MEDIA={0x10, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xb4}]}]}, @TIPC_NLA_MON={0x1c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x10001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x641}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7fff}]}, @TIPC_NLA_LINK={0x20, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}]}, @TIPC_NLA_PUBL={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x3}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xdd3c}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x6}]}, @TIPC_NLA_BEARER={0x68, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x9, @local, 0xffff}}, {0x14, 0x2, @in={0x2, 0x4e24, @multicast2}}}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff6bbc}]}]}, @TIPC_NLA_MEDIA={0x14, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_NET={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1ff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x800}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7af144a6}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x10001}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x20000}]}, @TIPC_NLA_MEDIA={0x30, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}]}, 0x1b8}, 0x1, 0x0, 0x0, 0x400c000}, 0x20000004) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r1) sendmsg$NL80211_CMD_SET_REG(r2, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r5, 0x1, 0x70bd27, 0x25dfdbfc, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000010}, 0x2004c040) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), r0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r8, 0x10e, 0x0, 0x0, &(0x7f0000000380)) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r7) sendmsg$NL80211_CMD_SET_REG(r8, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r9, 0x1, 0x70bd27, 0x25dfdbfc, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000010}, 0x2004c040) ioctl$sock_SIOCGIFINDEX_80211(r8, 0x8933, &(0x7f0000000180)={'wlan1\x00'}) sendmsg$NL80211_CMD_CHANGE_NAN_CONFIG(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x3c, r6, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_BANDS={0x8, 0xef, 0x2}, @NL80211_ATTR_BANDS={0x8, 0xef, 0x1711568b6e0741ba}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x1f}, @NL80211_ATTR_BANDS={0x8, 0xef, 0x1}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000}, 0x80) 02:19:56 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x10000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0xb}, 0x1c210, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x4}, 0x0, 0xd, 0xffffffffffffffff, 0x9) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x0) r0 = pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5, r0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 02:19:56 executing program 5: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) (fail_nth: 23) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) 02:19:56 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@ipv4={'\x00', '\xff\xff', @dev}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0xa, @in, 0x0, 0x4, 0x0, 0xfc}}, 0xe8) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) [ 2231.088812] FAULT_INJECTION: forcing a failure. [ 2231.088812] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2231.090823] CPU: 1 PID: 14649 Comm: syz-executor.5 Not tainted 5.10.226 #1 [ 2231.091824] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2231.092998] Call Trace: [ 2231.093390] dump_stack+0x107/0x167 [ 2231.093922] should_fail.cold+0x5/0xa [ 2231.094478] _copy_to_user+0x2e/0x180 [ 2231.095039] simple_read_from_buffer+0xcc/0x160 [ 2231.095713] proc_fail_nth_read+0x198/0x230 [ 2231.096328] ? proc_sessionid_read+0x230/0x230 [ 2231.096984] ? security_file_permission+0xb1/0xe0 [ 2231.097677] ? proc_sessionid_read+0x230/0x230 [ 2231.098349] vfs_read+0x228/0x620 [ 2231.098865] ksys_read+0x12d/0x260 [ 2231.099385] ? vfs_write+0xb10/0xb10 [ 2231.099933] do_syscall_64+0x33/0x40 [ 2231.100467] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2231.101192] RIP: 0033:0x7f614242969c [ 2231.101726] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2231.104302] RSP: 002b:00007f613f9ec170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2231.105378] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f614242969c [ 2231.106389] RDX: 000000000000000f RSI: 00007f613f9ec1e0 RDI: 0000000000000004 [ 2231.107401] RBP: 00007f613f9ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2231.108405] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2231.109411] R13: 00007ffcef2b488f R14: 00007f613f9ec300 R15: 0000000000022000 02:19:56 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x2000000, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:19:56 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x8) execveat(r8, &(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000400)='\x00', &(0x7f0000000bc0)='\x00\x80C\x107\xa64\xee\xbd*\xd4o\x8a?[\x98\xf29\xee\xc7\x90\x97\xaa\xc3\xc8Zq\xf3\x91\x04[S\\B2m=V\x89\x99\x96Q\xcaA\x18\xaf\xaf:\xf1\xab\x80\"\x7f\xb3\x18\xfe\xd7\xbd\xcd\xcdIf\xae\xb5\x87\xb8#\xe1\xbe\xec\xf0\t\xa1\xf7\xa7\xb1\x9d\xc7\xc2\xf0\x02\xaf\xc4\xd0@\xc2\x12\'\xb9\x9a\xea\x90e%\xe6\xd2E\x19E/\xc6\x17gB0Qim\x82u\x0fZ\xa9\x14\xf5\xc7X\xa9\x00\xb7\xaf\xcfouN\xbd\xb2\t^\xbe&~\xa7l\xfa\x036\x1c\"\x80\xfc/\x9b\x95\xf1!K\xc5{\xe7\xfdB[\xca\x87\x9bc\x98dg\x1a\xa1\xaa\xb4\x19\x7f\xa7\x90y\x9fq\xf5\x8a\xa9 \xa6\xdd\xf0+gb\xa6g\\\xec\tz\x06\xdf\x1a\x9c\xc9\xf7\xcc\x85\xb4G\xe9\xd3D\xf4\x8c\n\x17\xd5\x00\xf18\xb3T', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000280)='@\x90\x9a\x7fl\x00\x00\x00\x00p\xc4S\x9ch\xceH9\x88\xf3c\xb4\xabz#\xa8\xbb5\xd3\xc8\x9b\x00\x00 \x00\x00\x00\x00\x00', &(0x7f0000000540)='\x00', &(0x7f0000000a00)='\x009\x1c\xaf\x14\xe6\xeb\xe9\xf1\xccO@\xbd\xfc\xbdN\xfa\x93Z\x94\xfd\xc6]\xc3\x81g\x95\'\xb7\xf2\xe8\xbf\xd3\xf3\"\xf0Z\x93T\xa1\xc6\x10\x01\xba\xf0\x11\x01 \x94X\x7fQ\xa6\v\xfa\xc2\\$\xad\x96A\xd6\xdf|\x0e,c\xc4\x13\xfb\x91\xc5|{\xde\'xb\xcd\xb2\x177\x83\'\xdb\xf6y_\x10\x87\x01\xd4\xb1\x9b\xe4\xac\xf0D4\xe6v\x86\x02^bt\xbf!b\xd4k\x11\xf5Nj\x97P\b\xf2\xdd\r\xaa,g\xfc\x8f*\bq\x10wl\xe0\x02HG)\xa0\xb9%\x12\x9fx]\xf8Gz`\xfd\x00l\xe9<\xa5\xbd\x9f\x80\xa5\x0f\xd3\xf7\xc8\x98'], 0x0, 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) 02:19:56 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0xf000, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 02:19:56 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sysvipc/msg\x00', 0x0, 0x0) pread64(r0, &(0x7f00000010c0)=""/4088, 0xff8, 0x0) [ 2231.206903] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 02:19:56 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@ipv4={'\x00', '\xff\xff', @dev}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0xa, @in, 0x0, 0x4, 0x0, 0xfc}}, 0xe8) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 02:19:56 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x3000000, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:19:56 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@ipv4={'\x00', '\xff\xff', @dev}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0xa, @in, 0x0, 0x4, 0x0, 0xfc}}, 0xe8) connect$inet(r0, 0x0, 0x0) [ 2236.045593] Bluetooth: hci4: command 0x0409 tx timeout [ 2238.093622] Bluetooth: hci4: command 0x041b tx timeout [ 2240.141532] Bluetooth: hci4: command 0x040f tx timeout [ 2240.960237] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2240.962230] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2240.965146] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 2241.019252] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2241.020700] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2241.022638] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2242.189522] Bluetooth: hci4: command 0x0419 tx timeout 02:20:21 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sysvipc/msg\x00', 0x0, 0x0) pread64(r0, &(0x7f00000010c0)=""/4088, 0xff8, 0x0) 02:20:21 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x34000, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 02:20:21 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@ipv4={'\x00', '\xff\xff', @dev}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0xa, @in, 0x0, 0x4, 0x0, 0xfc}}, 0xe8) connect$inet(r0, 0x0, 0x0) 02:20:21 executing program 5: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) 02:20:21 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x10000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0xb}, 0x1c210, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x4}, 0x0, 0xd, 0xffffffffffffffff, 0x9) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x0) r0 = pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5, r0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 02:20:21 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x9000000, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:20:21 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x4000000, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:20:21 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x8) execveat(r8, &(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000400)='\x00', &(0x7f0000000bc0)='\x00\x80C\x107\xa64\xee\xbd*\xd4o\x8a?[\x98\xf29\xee\xc7\x90\x97\xaa\xc3\xc8Zq\xf3\x91\x04[S\\B2m=V\x89\x99\x96Q\xcaA\x18\xaf\xaf:\xf1\xab\x80\"\x7f\xb3\x18\xfe\xd7\xbd\xcd\xcdIf\xae\xb5\x87\xb8#\xe1\xbe\xec\xf0\t\xa1\xf7\xa7\xb1\x9d\xc7\xc2\xf0\x02\xaf\xc4\xd0@\xc2\x12\'\xb9\x9a\xea\x90e%\xe6\xd2E\x19E/\xc6\x17gB0Qim\x82u\x0fZ\xa9\x14\xf5\xc7X\xa9\x00\xb7\xaf\xcfouN\xbd\xb2\t^\xbe&~\xa7l\xfa\x036\x1c\"\x80\xfc/\x9b\x95\xf1!K\xc5{\xe7\xfdB[\xca\x87\x9bc\x98dg\x1a\xa1\xaa\xb4\x19\x7f\xa7\x90y\x9fq\xf5\x8a\xa9 \xa6\xdd\xf0+gb\xa6g\\\xec\tz\x06\xdf\x1a\x9c\xc9\xf7\xcc\x85\xb4G\xe9\xd3D\xf4\x8c\n\x17\xd5\x00\xf18\xb3T', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000280)='@\x90\x9a\x7fl\x00\x00\x00\x00p\xc4S\x9ch\xceH9\x88\xf3c\xb4\xabz#\xa8\xbb5\xd3\xc8\x9b\x00\x00 \x00\x00\x00\x00\x00', &(0x7f0000000540)='\x00', &(0x7f0000000a00)='\x009\x1c\xaf\x14\xe6\xeb\xe9\xf1\xccO@\xbd\xfc\xbdN\xfa\x93Z\x94\xfd\xc6]\xc3\x81g\x95\'\xb7\xf2\xe8\xbf\xd3\xf3\"\xf0Z\x93T\xa1\xc6\x10\x01\xba\xf0\x11\x01 \x94X\x7fQ\xa6\v\xfa\xc2\\$\xad\x96A\xd6\xdf|\x0e,c\xc4\x13\xfb\x91\xc5|{\xde\'xb\xcd\xb2\x177\x83\'\xdb\xf6y_\x10\x87\x01\xd4\xb1\x9b\xe4\xac\xf0D4\xe6v\x86\x02^bt\xbf!b\xd4k\x11\xf5Nj\x97P\b\xf2\xdd\r\xaa,g\xfc\x8f*\bq\x10wl\xe0\x02HG)\xa0\xb9%\x12\x9fx]\xf8Gz`\xfd\x00l\xe9<\xa5\xbd\x9f\x80\xa5\x0f\xd3\xf7\xc8\x98'], 0x0, 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) [ 2256.435181] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 02:20:21 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x5000000, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:20:21 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x7fff, 0x0, &(0x7f0000000780), 0x2800008, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000280)='mnt/encrypted_dir\x00', 0x482200, 0x15) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r3 = openat(r1, &(0x7f0000000240)='./file0\x00', 0x149241, 0xaf) futimesat(r3, &(0x7f0000000000)='./mnt\x00', 0x0) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000340), 0x400200, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000380)={{0x1, 0x1, 0x18, r2, {r0}}, './file1\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='mnt/encrypted_dir\x00', 0x2100, 0x3) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r4, 0xc0189379, &(0x7f0000000400)={{0x1, 0x1, 0x18}, 'mnt/encrypted_dir\x00'}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffff9c, 0x0, 0x1, 0x5b) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 02:20:21 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@ipv4={'\x00', '\xff\xff', @dev}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0xa, @in, 0x0, 0x4, 0x0, 0xfc}}, 0xe8) connect$inet(r0, 0x0, 0x0) 02:20:21 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0xf000000, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:20:21 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x80000, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 02:20:21 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x8) execveat(r8, &(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000400)='\x00', &(0x7f0000000bc0)='\x00\x80C\x107\xa64\xee\xbd*\xd4o\x8a?[\x98\xf29\xee\xc7\x90\x97\xaa\xc3\xc8Zq\xf3\x91\x04[S\\B2m=V\x89\x99\x96Q\xcaA\x18\xaf\xaf:\xf1\xab\x80\"\x7f\xb3\x18\xfe\xd7\xbd\xcd\xcdIf\xae\xb5\x87\xb8#\xe1\xbe\xec\xf0\t\xa1\xf7\xa7\xb1\x9d\xc7\xc2\xf0\x02\xaf\xc4\xd0@\xc2\x12\'\xb9\x9a\xea\x90e%\xe6\xd2E\x19E/\xc6\x17gB0Qim\x82u\x0fZ\xa9\x14\xf5\xc7X\xa9\x00\xb7\xaf\xcfouN\xbd\xb2\t^\xbe&~\xa7l\xfa\x036\x1c\"\x80\xfc/\x9b\x95\xf1!K\xc5{\xe7\xfdB[\xca\x87\x9bc\x98dg\x1a\xa1\xaa\xb4\x19\x7f\xa7\x90y\x9fq\xf5\x8a\xa9 \xa6\xdd\xf0+gb\xa6g\\\xec\tz\x06\xdf\x1a\x9c\xc9\xf7\xcc\x85\xb4G\xe9\xd3D\xf4\x8c\n\x17\xd5\x00\xf18\xb3T', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000280)='@\x90\x9a\x7fl\x00\x00\x00\x00p\xc4S\x9ch\xceH9\x88\xf3c\xb4\xabz#\xa8\xbb5\xd3\xc8\x9b\x00\x00 \x00\x00\x00\x00\x00', &(0x7f0000000540)='\x00', &(0x7f0000000a00)='\x009\x1c\xaf\x14\xe6\xeb\xe9\xf1\xccO@\xbd\xfc\xbdN\xfa\x93Z\x94\xfd\xc6]\xc3\x81g\x95\'\xb7\xf2\xe8\xbf\xd3\xf3\"\xf0Z\x93T\xa1\xc6\x10\x01\xba\xf0\x11\x01 \x94X\x7fQ\xa6\v\xfa\xc2\\$\xad\x96A\xd6\xdf|\x0e,c\xc4\x13\xfb\x91\xc5|{\xde\'xb\xcd\xb2\x177\x83\'\xdb\xf6y_\x10\x87\x01\xd4\xb1\x9b\xe4\xac\xf0D4\xe6v\x86\x02^bt\xbf!b\xd4k\x11\xf5Nj\x97P\b\xf2\xdd\r\xaa,g\xfc\x8f*\bq\x10wl\xe0\x02HG)\xa0\xb9%\x12\x9fx]\xf8Gz`\xfd\x00l\xe9<\xa5\xbd\x9f\x80\xa5\x0f\xd3\xf7\xc8\x98'], 0x0, 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) [ 2256.705726] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2258.509561] Bluetooth: hci4: command 0x0405 tx timeout 02:20:37 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x6000000, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:20:37 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x10000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0xb}, 0x1c210, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x4}, 0x0, 0xd, 0xffffffffffffffff, 0x9) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x0) r0 = pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5, r0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 02:20:37 executing program 5: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x2, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) 02:20:37 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x400300, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 02:20:37 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0xffffff7f, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:20:37 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x8) execveat(r8, &(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000400)='\x00', &(0x7f0000000bc0)='\x00\x80C\x107\xa64\xee\xbd*\xd4o\x8a?[\x98\xf29\xee\xc7\x90\x97\xaa\xc3\xc8Zq\xf3\x91\x04[S\\B2m=V\x89\x99\x96Q\xcaA\x18\xaf\xaf:\xf1\xab\x80\"\x7f\xb3\x18\xfe\xd7\xbd\xcd\xcdIf\xae\xb5\x87\xb8#\xe1\xbe\xec\xf0\t\xa1\xf7\xa7\xb1\x9d\xc7\xc2\xf0\x02\xaf\xc4\xd0@\xc2\x12\'\xb9\x9a\xea\x90e%\xe6\xd2E\x19E/\xc6\x17gB0Qim\x82u\x0fZ\xa9\x14\xf5\xc7X\xa9\x00\xb7\xaf\xcfouN\xbd\xb2\t^\xbe&~\xa7l\xfa\x036\x1c\"\x80\xfc/\x9b\x95\xf1!K\xc5{\xe7\xfdB[\xca\x87\x9bc\x98dg\x1a\xa1\xaa\xb4\x19\x7f\xa7\x90y\x9fq\xf5\x8a\xa9 \xa6\xdd\xf0+gb\xa6g\\\xec\tz\x06\xdf\x1a\x9c\xc9\xf7\xcc\x85\xb4G\xe9\xd3D\xf4\x8c\n\x17\xd5\x00\xf18\xb3T', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000280)='@\x90\x9a\x7fl\x00\x00\x00\x00p\xc4S\x9ch\xceH9\x88\xf3c\xb4\xabz#\xa8\xbb5\xd3\xc8\x9b\x00\x00 \x00\x00\x00\x00\x00', &(0x7f0000000540)='\x00', &(0x7f0000000a00)='\x009\x1c\xaf\x14\xe6\xeb\xe9\xf1\xccO@\xbd\xfc\xbdN\xfa\x93Z\x94\xfd\xc6]\xc3\x81g\x95\'\xb7\xf2\xe8\xbf\xd3\xf3\"\xf0Z\x93T\xa1\xc6\x10\x01\xba\xf0\x11\x01 \x94X\x7fQ\xa6\v\xfa\xc2\\$\xad\x96A\xd6\xdf|\x0e,c\xc4\x13\xfb\x91\xc5|{\xde\'xb\xcd\xb2\x177\x83\'\xdb\xf6y_\x10\x87\x01\xd4\xb1\x9b\xe4\xac\xf0D4\xe6v\x86\x02^bt\xbf!b\xd4k\x11\xf5Nj\x97P\b\xf2\xdd\r\xaa,g\xfc\x8f*\bq\x10wl\xe0\x02HG)\xa0\xb9%\x12\x9fx]\xf8Gz`\xfd\x00l\xe9<\xa5\xbd\x9f\x80\xa5\x0f\xd3\xf7\xc8\x98'], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000440)='\x00', &(0x7f0000000740)='\x10', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) 02:20:37 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x8) execveat(r8, &(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000400)='\x00', &(0x7f0000000bc0)='\x00\x80C\x107\xa64\xee\xbd*\xd4o\x8a?[\x98\xf29\xee\xc7\x90\x97\xaa\xc3\xc8Zq\xf3\x91\x04[S\\B2m=V\x89\x99\x96Q\xcaA\x18\xaf\xaf:\xf1\xab\x80\"\x7f\xb3\x18\xfe\xd7\xbd\xcd\xcdIf\xae\xb5\x87\xb8#\xe1\xbe\xec\xf0\t\xa1\xf7\xa7\xb1\x9d\xc7\xc2\xf0\x02\xaf\xc4\xd0@\xc2\x12\'\xb9\x9a\xea\x90e%\xe6\xd2E\x19E/\xc6\x17gB0Qim\x82u\x0fZ\xa9\x14\xf5\xc7X\xa9\x00\xb7\xaf\xcfouN\xbd\xb2\t^\xbe&~\xa7l\xfa\x036\x1c\"\x80\xfc/\x9b\x95\xf1!K\xc5{\xe7\xfdB[\xca\x87\x9bc\x98dg\x1a\xa1\xaa\xb4\x19\x7f\xa7\x90y\x9fq\xf5\x8a\xa9 \xa6\xdd\xf0+gb\xa6g\\\xec\tz\x06\xdf\x1a\x9c\xc9\xf7\xcc\x85\xb4G\xe9\xd3D\xf4\x8c\n\x17\xd5\x00\xf18\xb3T', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000280)='@\x90\x9a\x7fl\x00\x00\x00\x00p\xc4S\x9ch\xceH9\x88\xf3c\xb4\xabz#\xa8\xbb5\xd3\xc8\x9b\x00\x00 \x00\x00\x00\x00\x00', &(0x7f0000000540)='\x00', &(0x7f0000000a00)='\x009\x1c\xaf\x14\xe6\xeb\xe9\xf1\xccO@\xbd\xfc\xbdN\xfa\x93Z\x94\xfd\xc6]\xc3\x81g\x95\'\xb7\xf2\xe8\xbf\xd3\xf3\"\xf0Z\x93T\xa1\xc6\x10\x01\xba\xf0\x11\x01 \x94X\x7fQ\xa6\v\xfa\xc2\\$\xad\x96A\xd6\xdf|\x0e,c\xc4\x13\xfb\x91\xc5|{\xde\'xb\xcd\xb2\x177\x83\'\xdb\xf6y_\x10\x87\x01\xd4\xb1\x9b\xe4\xac\xf0D4\xe6v\x86\x02^bt\xbf!b\xd4k\x11\xf5Nj\x97P\b\xf2\xdd\r\xaa,g\xfc\x8f*\bq\x10wl\xe0\x02HG)\xa0\xb9%\x12\x9fx]\xf8Gz`\xfd\x00l\xe9<\xa5\xbd\x9f\x80\xa5\x0f\xd3\xf7\xc8\x98'], 0x0, 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) 02:20:37 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@ipv4={'\x00', '\xff\xff', @dev}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0xa, @in, 0x0, 0x4, 0x0, 0xfc}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) (fail_nth: 1) [ 2271.922551] FAULT_INJECTION: forcing a failure. [ 2271.922551] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2271.924355] CPU: 0 PID: 15395 Comm: syz-executor.6 Not tainted 5.10.226 #1 [ 2271.925364] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2271.926578] Call Trace: [ 2271.926975] dump_stack+0x107/0x167 [ 2271.927531] should_fail.cold+0x5/0xa [ 2271.928106] _copy_from_user+0x2e/0x1b0 [ 2271.928707] move_addr_to_kernel.part.0+0x31/0x110 [ 2271.929431] __sys_connect+0xda/0x1a0 [ 2271.929994] ? __sys_connect_file+0x1a0/0x1a0 [ 2271.930662] ? rcu_read_lock_any_held+0x75/0xa0 [ 2271.931362] ? vfs_write+0x354/0xb10 [ 2271.931921] ? fput_many+0x2f/0x1a0 [ 2271.932472] ? ksys_write+0x1a9/0x260 [ 2271.933037] ? __ia32_sys_read+0xb0/0xb0 [ 2271.933645] __x64_sys_connect+0x6f/0xb0 [ 2271.934244] do_syscall_64+0x33/0x40 [ 2271.934792] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2271.935546] RIP: 0033:0x7fb753f14b19 [ 2271.936091] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2271.938772] RSP: 002b:00007fb75148a188 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 2271.939889] RAX: ffffffffffffffda RBX: 00007fb754027f60 RCX: 00007fb753f14b19 [ 2271.940936] RDX: 0000000000000010 RSI: 0000000020000000 RDI: 0000000000000003 [ 2271.941983] RBP: 00007fb75148a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2271.943039] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2271.943336] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2271.944084] R13: 00007fff776acf2f R14: 00007fb75148a300 R15: 0000000000022000 [ 2271.949140] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 02:20:37 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0xf0ffff, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 02:20:37 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x7000000, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:20:37 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x0, {0x2}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:20:37 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@ipv4={'\x00', '\xff\xff', @dev}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0xa, @in, 0x0, 0x4, 0x0, 0xfc}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) (fail_nth: 2) 02:20:37 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x8) execveat(r8, &(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000400)='\x00', &(0x7f0000000bc0)='\x00\x80C\x107\xa64\xee\xbd*\xd4o\x8a?[\x98\xf29\xee\xc7\x90\x97\xaa\xc3\xc8Zq\xf3\x91\x04[S\\B2m=V\x89\x99\x96Q\xcaA\x18\xaf\xaf:\xf1\xab\x80\"\x7f\xb3\x18\xfe\xd7\xbd\xcd\xcdIf\xae\xb5\x87\xb8#\xe1\xbe\xec\xf0\t\xa1\xf7\xa7\xb1\x9d\xc7\xc2\xf0\x02\xaf\xc4\xd0@\xc2\x12\'\xb9\x9a\xea\x90e%\xe6\xd2E\x19E/\xc6\x17gB0Qim\x82u\x0fZ\xa9\x14\xf5\xc7X\xa9\x00\xb7\xaf\xcfouN\xbd\xb2\t^\xbe&~\xa7l\xfa\x036\x1c\"\x80\xfc/\x9b\x95\xf1!K\xc5{\xe7\xfdB[\xca\x87\x9bc\x98dg\x1a\xa1\xaa\xb4\x19\x7f\xa7\x90y\x9fq\xf5\x8a\xa9 \xa6\xdd\xf0+gb\xa6g\\\xec\tz\x06\xdf\x1a\x9c\xc9\xf7\xcc\x85\xb4G\xe9\xd3D\xf4\x8c\n\x17\xd5\x00\xf18\xb3T', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000280)='@\x90\x9a\x7fl\x00\x00\x00\x00p\xc4S\x9ch\xceH9\x88\xf3c\xb4\xabz#\xa8\xbb5\xd3\xc8\x9b\x00\x00 \x00\x00\x00\x00\x00', &(0x7f0000000540)='\x00', &(0x7f0000000a00)='\x009\x1c\xaf\x14\xe6\xeb\xe9\xf1\xccO@\xbd\xfc\xbdN\xfa\x93Z\x94\xfd\xc6]\xc3\x81g\x95\'\xb7\xf2\xe8\xbf\xd3\xf3\"\xf0Z\x93T\xa1\xc6\x10\x01\xba\xf0\x11\x01 \x94X\x7fQ\xa6\v\xfa\xc2\\$\xad\x96A\xd6\xdf|\x0e,c\xc4\x13\xfb\x91\xc5|{\xde\'xb\xcd\xb2\x177\x83\'\xdb\xf6y_\x10\x87\x01\xd4\xb1\x9b\xe4\xac\xf0D4\xe6v\x86\x02^bt\xbf!b\xd4k\x11\xf5Nj\x97P\b\xf2\xdd\r\xaa,g\xfc\x8f*\bq\x10wl\xe0\x02HG)\xa0\xb9%\x12\x9fx]\xf8Gz`\xfd\x00l\xe9<\xa5\xbd\x9f\x80\xa5\x0f\xd3\xf7\xc8\x98'], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000440)='\x00', &(0x7f0000000740)='\x10', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) 02:20:37 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x0, {0x3}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:20:37 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x9000000, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:20:37 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x39e8, &(0x7f0000000180)={0x0, 0x800000, 0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r3 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a", 0x2}], 0x1}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r5, r2, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80000001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(r4, 0x0, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000200)={&(0x7f0000000400)=@l2tp6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85f508c53b74be1cc06a8682449c182396779b4f25f709ca", 0x1a}, {0x0}, {0x0}, {0x0}], 0x4}, 0x0, 0x4000000, 0x1}, 0x0) 02:20:37 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x10000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0xb}, 0x1c210, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x4}, 0x0, 0xd, 0xffffffffffffffff, 0x9) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, r0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 02:20:37 executing program 5: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x4, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) [ 2272.212728] FAULT_INJECTION: forcing a failure. [ 2272.212728] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2272.214426] CPU: 1 PID: 15413 Comm: syz-executor.6 Not tainted 5.10.226 #1 [ 2272.215403] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2272.216553] Call Trace: [ 2272.216935] dump_stack+0x107/0x167 [ 2272.217455] should_fail.cold+0x5/0xa [ 2272.217998] _copy_to_user+0x2e/0x180 [ 2272.218544] simple_read_from_buffer+0xcc/0x160 [ 2272.219210] proc_fail_nth_read+0x198/0x230 [ 2272.219825] ? proc_sessionid_read+0x230/0x230 [ 2272.220476] ? security_file_permission+0xb1/0xe0 [ 2272.221165] ? proc_sessionid_read+0x230/0x230 [ 2272.221812] vfs_read+0x228/0x620 [ 2272.222310] ksys_read+0x12d/0x260 [ 2272.222841] ? vfs_write+0xb10/0xb10 [ 2272.223387] do_syscall_64+0x33/0x40 [ 2272.223919] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2272.224636] RIP: 0033:0x7fb753ec769c [ 2272.225162] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2272.227746] RSP: 002b:00007fb75148a170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2272.228823] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fb753ec769c [ 2272.229830] RDX: 000000000000000f RSI: 00007fb75148a1e0 RDI: 0000000000000004 [ 2272.230822] RBP: 00007fb75148a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2272.231828] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2272.232826] R13: 00007fff776acf2f R14: 00007fb75148a300 R15: 0000000000022000 [ 2272.241862] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2272.290960] ieee802154 phy0 wpan0: encryption failed: -22 02:20:37 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x1000000, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) [ 2272.300909] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.307330] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.313909] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.317844] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.323262] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.331144] ieee802154 phy0 wpan0: encryption failed: -22 02:20:37 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0xf000000, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:20:37 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x0, {0x4}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) [ 2272.345848] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.371074] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.391482] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.403359] ieee802154 phy0 wpan0: encryption failed: -22 02:20:37 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x2000000, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) [ 2272.432251] ieee802154 phy0 wpan0: encryption failed: -22 02:20:37 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@ipv4={'\x00', '\xff\xff', @dev}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0xa, @in, 0x0, 0x4, 0x0, 0xfc}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) [ 2272.450063] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.461805] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.469240] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.472976] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.493718] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.494470] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.495073] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.497611] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.498249] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.505107] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.507764] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.508363] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.509157] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.512889] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.514791] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.515412] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.517601] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.518218] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.518876] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.519535] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.523636] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.524235] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.525161] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.529628] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.530213] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.531121] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.532879] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.533681] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.534282] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.536645] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.537244] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.537937] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.538538] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.543625] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.544245] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.545177] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.545790] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.546470] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.549703] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.550300] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.550973] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.554645] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.555264] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.556023] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.556621] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.561545] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.562142] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.562799] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.563406] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.567576] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.568170] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.568835] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.569450] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.570100] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.570779] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.571422] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.572756] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.573352] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.574096] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.574936] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.575620] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.576207] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.576894] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.577526] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.578202] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.578958] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.579719] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.580294] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.580957] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.581635] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.582277] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.582898] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.583608] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.584205] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.584948] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.585629] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.586278] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.586936] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.587678] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.588269] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.588958] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.589657] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.590286] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.591434] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.592112] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.592882] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.594746] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.595316] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.595988] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.596680] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.597309] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.597993] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.598689] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.599299] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.600028] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.600776] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.601408] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.602110] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.602784] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.603392] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.604093] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.604747] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.605817] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.606360] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.607068] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.607764] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.608399] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.609086] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.609776] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.610375] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.611079] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.611761] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.612394] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.613059] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.613749] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.614331] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.615060] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.615747] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.616380] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.617047] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.617756] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.618360] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.619075] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.619765] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.620400] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.621054] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.621738] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.622338] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.623067] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.623767] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.624402] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.625064] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.625751] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.626351] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.627084] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.627830] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.628510] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.629151] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.629837] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.630427] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.631111] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.631786] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.632412] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.633059] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.633813] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.634373] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.635073] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.635756] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.636404] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.637020] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.637703] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.638311] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.639017] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.639634] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.640280] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.640948] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.641737] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.642304] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.643051] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.643742] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.644369] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.645020] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.645706] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.646304] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.646997] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.647695] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.648317] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.648983] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.649686] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.650277] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.650982] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.651682] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.652304] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.652968] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.653685] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.654274] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.654973] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.655668] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.656305] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.656960] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.657684] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.658275] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.658976] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.659684] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.660311] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.660973] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.661685] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.662275] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.662992] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.663662] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.664297] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.664942] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.665620] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.666203] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.666939] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.667681] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.668290] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.668977] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.669659] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.670242] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.670921] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.671591] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.672228] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.672894] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.673612] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.674253] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.675009] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.675740] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.676353] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.676971] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.677678] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.678269] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.678951] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.679643] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.680280] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.680941] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.681629] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.682229] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.682968] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.683646] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.684294] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.684944] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.685624] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.686221] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.686930] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.687615] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.688277] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.688951] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.689646] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.690247] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.690972] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.691710] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.692327] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.693016] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.693739] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.694330] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.695014] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.695687] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.696335] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.696966] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.697670] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.698263] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.698967] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.699665] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.700308] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.700971] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.701667] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.702267] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.702965] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.703671] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.704300] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.704969] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.705677] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.706269] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.706976] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.708030] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.708771] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.709405] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.710129] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.710812] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.711411] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.712107] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.712788] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.713453] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.714147] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.714883] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.715551] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.716217] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.716853] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.717534] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.718190] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.718903] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.719610] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.720258] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.720933] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.721652] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.722272] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.722966] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.723637] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.724276] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.724939] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.725652] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.726250] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.726958] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.727630] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.728270] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.728972] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.729712] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.730292] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.730988] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.731692] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.732330] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.733016] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.733730] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.734322] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.735034] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.735740] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.736356] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.737001] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.737689] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.738289] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.738967] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.739639] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.740290] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.740957] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.741668] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.742266] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.742978] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.743730] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.744377] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.745088] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.745785] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.746375] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.747055] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.747728] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.748363] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.749026] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.749795] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.750366] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.751068] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.751753] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.752390] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.753025] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.753711] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.754315] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.755026] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.755720] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.756357] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.757021] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.757708] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.758308] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.759010] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.759697] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.760349] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.761010] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.761705] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.762305] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.763015] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.763706] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.764344] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.765010] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.765695] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.766295] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.767029] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.767722] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.768355] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.769026] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.769700] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.770299] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.771021] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.771718] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.772349] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.773003] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.773696] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.774290] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.774988] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.775680] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.776303] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.776968] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.777671] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.778259] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.778962] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.779670] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.780292] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.780952] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.781643] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.782244] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.782973] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.783663] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.784297] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.784960] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.785667] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.786273] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.786979] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.787688] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.788313] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.788989] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.789675] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.790275] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.790991] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.791682] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.792321] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.792993] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.793682] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.794280] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.794987] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.795693] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.796321] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.796987] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.797675] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.798283] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.798989] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.799681] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.800318] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.800973] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.801671] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.802264] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.802983] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.803666] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.804304] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.804974] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.805664] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.806262] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.806971] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.807687] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.808301] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.808981] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.809965] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.810602] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.811278] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.811943] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.812692] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.813282] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.814055] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.814673] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.815337] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.816007] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.816712] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.817300] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.817972] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.818723] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.819361] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.820080] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.820766] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.821368] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.822042] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.822711] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.823361] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.824025] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.824774] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.825335] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.826060] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.826747] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.827374] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.828025] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.828715] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.829333] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.830002] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.830681] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.831326] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.831995] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.832706] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.833296] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.833999] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.834688] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.835330] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.836045] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.836784] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.837350] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.838040] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.838717] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.839367] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.840004] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.840691] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.841287] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.841984] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.842667] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.843302] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.843967] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.844690] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.845274] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.845983] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.846658] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.847311] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.847972] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.848684] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.849274] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.849981] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.850674] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.851311] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.851975] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.852645] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.853244] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.853960] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.854647] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.855286] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.855946] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.856640] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.857243] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.857951] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.858642] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.859285] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.859947] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.860656] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.861255] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.861962] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.862645] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.863295] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.863957] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.864665] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.865280] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.865987] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.866673] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.867300] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.867953] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.868662] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.869262] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.869962] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.870644] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.871295] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.871986] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.872688] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.873289] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.873999] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.874676] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.875322] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.875988] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.876682] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.877285] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.878006] ieee802154 phy0 wpan0: encryption failed: -22 [ 2272.878684] ieee802154 phy0 wpan0: encryption failed: -22 [ 2285.651205] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2285.667283] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 02:20:50 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0x0, {0x5}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:20:50 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x8) execveat(r8, &(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000400)='\x00', &(0x7f0000000bc0)='\x00\x80C\x107\xa64\xee\xbd*\xd4o\x8a?[\x98\xf29\xee\xc7\x90\x97\xaa\xc3\xc8Zq\xf3\x91\x04[S\\B2m=V\x89\x99\x96Q\xcaA\x18\xaf\xaf:\xf1\xab\x80\"\x7f\xb3\x18\xfe\xd7\xbd\xcd\xcdIf\xae\xb5\x87\xb8#\xe1\xbe\xec\xf0\t\xa1\xf7\xa7\xb1\x9d\xc7\xc2\xf0\x02\xaf\xc4\xd0@\xc2\x12\'\xb9\x9a\xea\x90e%\xe6\xd2E\x19E/\xc6\x17gB0Qim\x82u\x0fZ\xa9\x14\xf5\xc7X\xa9\x00\xb7\xaf\xcfouN\xbd\xb2\t^\xbe&~\xa7l\xfa\x036\x1c\"\x80\xfc/\x9b\x95\xf1!K\xc5{\xe7\xfdB[\xca\x87\x9bc\x98dg\x1a\xa1\xaa\xb4\x19\x7f\xa7\x90y\x9fq\xf5\x8a\xa9 \xa6\xdd\xf0+gb\xa6g\\\xec\tz\x06\xdf\x1a\x9c\xc9\xf7\xcc\x85\xb4G\xe9\xd3D\xf4\x8c\n\x17\xd5\x00\xf18\xb3T', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000280)='@\x90\x9a\x7fl\x00\x00\x00\x00p\xc4S\x9ch\xceH9\x88\xf3c\xb4\xabz#\xa8\xbb5\xd3\xc8\x9b\x00\x00 \x00\x00\x00\x00\x00', &(0x7f0000000540)='\x00', &(0x7f0000000a00)='\x009\x1c\xaf\x14\xe6\xeb\xe9\xf1\xccO@\xbd\xfc\xbdN\xfa\x93Z\x94\xfd\xc6]\xc3\x81g\x95\'\xb7\xf2\xe8\xbf\xd3\xf3\"\xf0Z\x93T\xa1\xc6\x10\x01\xba\xf0\x11\x01 \x94X\x7fQ\xa6\v\xfa\xc2\\$\xad\x96A\xd6\xdf|\x0e,c\xc4\x13\xfb\x91\xc5|{\xde\'xb\xcd\xb2\x177\x83\'\xdb\xf6y_\x10\x87\x01\xd4\xb1\x9b\xe4\xac\xf0D4\xe6v\x86\x02^bt\xbf!b\xd4k\x11\xf5Nj\x97P\b\xf2\xdd\r\xaa,g\xfc\x8f*\bq\x10wl\xe0\x02HG)\xa0\xb9%\x12\x9fx]\xf8Gz`\xfd\x00l\xe9<\xa5\xbd\x9f\x80\xa5\x0f\xd3\xf7\xc8\x98'], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000440)='\x00', &(0x7f0000000740)='\x10', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) 02:20:50 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="34000000100001000600000000000000000000000500000000000000150000f8326500000ad022cea3b5906ed71efbac71604114ae634a1d3f5b42332fdb1ddff6c996d594f336ad93897a4c7c7d052c951ff3b19a2ae8dfe7daae4433b91e5be24f079e43a9064d68a1d6c8cb564c5100107341e4376c1319a3cb911ffd141faf6459dfb637ceb7852dafdf71f385cfa97aa0b4888bc38b88bda6372e3668ad38b7f74f5579af15893a0d5ecb611c48d698f5ab174fbc688112a84bc0f1ed5b30c723ba82fe7b97990c195cdd6e5a3ec6986122d762e9332637b26db43c04d57f6347516027"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x8) execveat(r8, &(0x7f0000000180)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000400)='\x00', &(0x7f0000000bc0)='\x00\x80C\x107\xa64\xee\xbd*\xd4o\x8a?[\x98\xf29\xee\xc7\x90\x97\xaa\xc3\xc8Zq\xf3\x91\x04[S\\B2m=V\x89\x99\x96Q\xcaA\x18\xaf\xaf:\xf1\xab\x80\"\x7f\xb3\x18\xfe\xd7\xbd\xcd\xcdIf\xae\xb5\x87\xb8#\xe1\xbe\xec\xf0\t\xa1\xf7\xa7\xb1\x9d\xc7\xc2\xf0\x02\xaf\xc4\xd0@\xc2\x12\'\xb9\x9a\xea\x90e%\xe6\xd2E\x19E/\xc6\x17gB0Qim\x82u\x0fZ\xa9\x14\xf5\xc7X\xa9\x00\xb7\xaf\xcfouN\xbd\xb2\t^\xbe&~\xa7l\xfa\x036\x1c\"\x80\xfc/\x9b\x95\xf1!K\xc5{\xe7\xfdB[\xca\x87\x9bc\x98dg\x1a\xa1\xaa\xb4\x19\x7f\xa7\x90y\x9fq\xf5\x8a\xa9 \xa6\xdd\xf0+gb\xa6g\\\xec\tz\x06\xdf\x1a\x9c\xc9\xf7\xcc\x85\xb4G\xe9\xd3D\xf4\x8c\n\x17\xd5\x00\xf18\xb3T', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='\x00', &(0x7f0000000a00)='\x009\x1c\xaf\x14\xe6\xeb\xe9\xf1\xccO@\xbd\xfc\xbdN\xfa\x93Z\x94\xfd\xc6]\xc3\x81g\x95\'\xb7\xf2\xe8\xbf\xd3\xf3\"\xf0Z\x93T\xa1\xc6\x10\x01\xba\xf0\x11\x01 \x94X\x7fQ\xa6\v\xfa\xc2\\$\xad\x96A\xd6\xdf|\x0e,c\xc4\x13\xfb\x91\xc5|{\xde\'xb\xcd\xb2\x177\x83\'\xdb\xf6y_\x10\x87\x01\xd4\xb1\x9b\xe4\xac\xf0D4\xe6v\x86\x02^bt\xbf!b\xd4k\x11\xf5Nj\x97P\b\xf2\xdd\r\xaa,g\xfc\x8f*\bq\x10wl\xe0\x02HG)\xa0\xb9%\x12\x9fx]\xf8Gz`\xfd\x00l\xe9<\xa5\xbd\x9f\x80\xa5\x0f\xd3\xf7\xc8\x98'], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000700)='\x00', &(0x7f0000000740)='\x00', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x200, 0x2) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) 02:20:50 executing program 5: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x8, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) 02:20:50 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000640), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x1, 0x0, 0xffffff7f, {}, [@NLBL_MGMT_A_FAMILY={0x6}]}, 0x1c}}, 0x0) 02:20:50 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@ipv4={'\x00', '\xff\xff', @dev}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0xa, @in, 0x0, 0x4, 0x0, 0xfc}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x3, 0x0, @remote}, 0x10) 02:20:50 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x3000000, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 02:20:50 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x10000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0xb}, 0x1c210, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x4}, 0x0, 0xd, 0xffffffffffffffff, 0x9) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, r0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 02:20:50 executing program 3: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000180)={0x0, 0x8}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0841538defc240384300ff2b1ebdf78140fc8ef1cb59e72eca3a176386ab9a9e0cbf649c57a04483418124b9321658bbd32b2754c8ff40d81d3f5d57485a0517f5a1249547bbe8822c06e4332a43e983785d198d01a3cf1a5f563adc3ad0ca9ac9b5af829fec54c0f49b242cdf73e716e02bbc86becdb466dd36b2b512d7d98fe41a72edc011e490790d9eab32b40d28c342674d6a71ccb6eee4a2"]) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x9b7a, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x10000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0xb}, 0x1c210, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x4}, 0x0, 0xd, 0xffffffffffffffff, 0x9) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, r0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 02:20:50 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r1, 0xd8499488957a772f, 0x4000000, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) [ 2289.225011] Failed to initialize the IGMP autojoin socket (err -2) [ 2289.496686] Failed to initialize the IGMP autojoin socket (err -2) [ 2291.085641] Bluetooth: hci0: command 0x0409 tx timeout [ 2292.166054] Failed to initialize the IGMP autojoin socket (err -2) [ 2293.134565] Bluetooth: hci0: command 0x041b tx timeout [ 2294.818510] Failed to initialize the IGMP autojoin socket (err -2) [ 2295.181502] Bluetooth: hci0: command 0x040f tx timeout [ 2297.531464] Failed to initialize the IGMP autojoin socket (err -2) [ 2298.868808] Failed to initialize the IGMP autojoin socket (err -2) [ 2299.406494] Bluetooth: hci0: command 0x0409 tx timeout [ 2301.453806] Bluetooth: hci0: command 0x041b tx timeout [ 2301.574620] Failed to initialize the IGMP autojoin socket (err -2) [ 2303.501493] Bluetooth: hci0: command 0x040f tx timeout [ 2304.287861] Failed to initialize the IGMP autojoin socket (err -2) [ 2306.125527] Bluetooth: hci0: command 0x0409 tx timeout [ 2306.597063] Failed to initialize the IGMP autojoin socket (err -2) [ 2308.173507] Bluetooth: hci0: command 0x041b tx timeout [ 2309.281455] Failed to initialize the IGMP autojoin socket (err -2) [ 2310.221529] Bluetooth: hci0: command 0x040f tx timeout [ 2311.924201] Failed to initialize the IGMP autojoin socket (err -2) [ 2313.129315] Failed to initialize the IGMP autojoin socket (err -2) [ 2313.805485] Bluetooth: hci0: command 0x0409 tx timeout [ 2315.762782] Failed to initialize the IGMP autojoin socket (err -2) [ 2315.853490] Bluetooth: hci0: command 0x041b tx timeout [ 2317.901523] Bluetooth: hci0: command 0x040f tx timeout [ 2318.462342] Failed to initialize the IGMP autojoin socket (err -2) [ 2320.269481] Bluetooth: hci1: command 0x0409 tx timeout [ 2321.200296] Failed to initialize the IGMP autojoin socket (err -2) [ 2322.317508] Bluetooth: hci1: command 0x041b tx timeout [ 2323.892207] Failed to initialize the IGMP autojoin socket (err -2) [ 2324.366567] Bluetooth: hci1: command 0x040f tx timeout [ 2326.602192] Failed to initialize the IGMP autojoin socket (err -2) [ 2327.726999] Failed to initialize the IGMP autojoin socket (err -2) [ 2328.526484] Bluetooth: hci0: command 0x0409 tx timeout [ 2330.340635] Failed to initialize the IGMP autojoin socket (err -2) [ 2330.573478] Bluetooth: hci0: command 0x041b tx timeout [ 2332.621503] Bluetooth: hci0: command 0x040f tx timeout [ 2332.924109] Failed to initialize the IGMP autojoin socket (err -2) [ 2335.611043] Failed to initialize the IGMP autojoin socket (err -2) [ 2335.948514] Failed to initialize the IGMP autojoin socket (err -2) 2024/10/17 02:21:41 executor 2 failed 11 times: executor 2: exit status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 16: Device or resource busy) loop exited with status 67 VM DIAGNOSIS: 02:21:41 Registers: info registers vcpu 0 RAX=00005626d4a207b0 RBX=0000000000000000 RCX=0000000000000005 RDX=00007fff49f35e30 RSI=00007fff49f37f96 RDI=00005626d4a3a121 RBP=00007fff49f35e08 RSP=fffffe0000002fd0 R8 =0000000000000000 R9 =00007fcfdfd1b1b0 R10=00000000078bfbff R11=0000000000000010 R12=00005626d4a209a0 R13=0000000000000004 R14=0000000000000000 R15=0000000000000000 RIP=ffffffff84000b80 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0000 0000000000000000 00000000 00000000 DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fcfdf7fb540 00000000 00000000 GS =0000 0000000000000000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00005626d4a3a121 CR3=000000004365e000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=ff000000000000000000000000000000 XMM02=00ff0000000000000000000000000000 XMM03=00000000000000000000ff00000000ff XMM04=2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f XMM05=00000000000000000000000000000000 XMM06=00000000000000000000000000000000 XMM07=00000000000000000000000000000000 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=0000000000000000 RBX=0000000000000001 RCX=00000000000062bb RDX=dffffc0000000000 RSI=00000000000062bb RDI=ffffffff85d825f4 RBP=ffff8880178f75fd RSP=ffff8880178f74f0 R8 =0000000000000000 R9 =0000000000000001 R10=0000000000032042 R11=1ffff11002f1eea6 R12=ffff8880178f7610 R13=ffff8880178f75c8 R14=1ffff11002f1eea6 R15=ffffffff8162bbfe RIP=ffffffff811073f5 RFL=00000217 [----APC] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fcfdfd1d790 CR3=0000000004e26000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=0000000000000000418e7fe100000000 XMM03=0000ff00000000000000000000000000 XMM04=732f6c61636f6c2f7273752f3d485441 XMM05=622f6c61636f6c2f7273752f3a6e6962 XMM06=73752f3a6e6962732f7273752f3a6e69 XMM07=6e69622f3a6e6962732f3a6e69622f72 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000