7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000001280), 0x199040, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0x541b, 0x0) clone3(&(0x7f0000001480)={0x48010480, &(0x7f0000001300), &(0x7f0000001340)=0x0, &(0x7f0000001380), {0x13}, &(0x7f00000013c0)=""/17, 0x11, &(0x7f0000001400)=""/15, &(0x7f0000001440)=[0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0], 0xa}, 0x58) sendmsg$nl_generic(r1, &(0x7f0000001900)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000018c0)={&(0x7f0000001500)={0x384, 0x31, 0x4, 0x70bd25, 0x25dfdbff, {0xa}, [@generic="25e53477c4467946082a5dba766b4880a58b8efeb6e5c08ee550aaa3c55d3dfc1cbb2c8c8e6b86b40276aece15cc48bbeda1f1b45ac0e9ca5ee83d82d33c98bfb7707d47d6d8c6380531e6830cefe7d15ec624beb10201104fed0a28370c7d71b8254b7252659fbcad6b38aed656aca44b62c2cee0913e7aafc29648513b1bcaa43b55539f5ef8b14798c1651c7c2227746b3d4155d65d3819ade04453a081dae230e6362da0a74dbbde342b8aeb8941d713d3", @nested={0x49, 0x72, 0x0, 0x1, [@generic="9e78631b11b3ddd9f18bc171bca52938b7bf3b0ae5", @generic="dc54b6062deffdf28a838539a557f83af0a41a21c3b92b5041032afea91735342f410d848b8f2f7e6846d6cbf32d85e4"]}, @generic="c131c764043fda4bd290b796a137f9e8c8a3a96cfe6ee6aa2039c7cbc216f6fbc28185c0c5669a151e488bb91512d46a8b222fb0d583a7bb900ff9bedf3048f434f0ec619e60e94d75cf4986adabcc0609a5dafd0da970a933a3fef788c02206f140c0163d6eec2f6c6a0be34e33e22ec99cef2b2281fd5f66ebf75951", @nested={0xc, 0x35, 0x0, 0x1, [@typed={0x8, 0x6b, 0x0, 0x0, @fd=r2}]}, @typed={0x9, 0x8, 0x0, 0x0, @str='vfat\x00'}, @nested={0x107, 0x58, 0x0, 0x1, [@typed={0x8, 0x49, 0x0, 0x0, @u32=0x7}, @generic="eef7efcd5d15d4721b631ce9970c56f16e1d575ac9907cb0dd4bae3a94e014f5bcc838d829f2a39f755f25170c92f8d8446eca511353823f7db74cc5e0e4765221f733c4fbe42258ac233e488125c1ee08f5dcb4ededce9454aea6e4d5cc9e261555ad294204a6e2309dcfb9f1b5a6695bd73688775ab8c7a452b29358d114b48949958feca6ce57ff33a708cd47fd6e603551c86d5633c108aa50e80585a8a35b354a7b2e7b8129aab2930a88a34ee3a77ab83b38bb7f70a6e1c343d39d4e7b", @typed={0x8, 0x72, 0x0, 0x0, @pid=r3}, @typed={0x17, 0x6, 0x0, 0x0, @str='net_prio.ifpriomap\x00'}, @typed={0xc, 0x1b, 0x0, 0x0, @u64=0x2}, @generic="1f5ebd818882c6e3443227d6278c5c"]}, @generic="249e3fb17eab774b601bdab38dae4b868177f7ec157ad627851a4f8018df7ada57657b5ed7ed185cee7e70c98b13ed8a138b96507e4d5f1afc52c08a388036c015bd91ef872326c46490c3c9b42a69e97c", @generic="f3ba0935db1a61cedf96669d0a47617a357bf11b5a33f61d968b1b6f10e01f571500866bed91304cd0bb9660baa78acc9fe8d675a0c97f31481a6eca7cce0554de6fcd28f8ca71efaf503bad15f82adaa7b23d3227317ff3850574a79510c6650afc07f2809bed553c5dde1434b165ec8eb923e64a4e5c9e", @generic="2a2880c79b45fb46107be8"]}, 0x384}, 0x1, 0x0, 0x0, 0x8804}, 0x20000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x8401, 0x101) openat$cgroup_netprio_ifpriomap(r4, &(0x7f0000000000), 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) 21:28:14 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) (fail_nth: 10) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:28:14 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x700, 0x0) 21:28:14 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1b, 0x0) 21:28:14 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) [ 1542.905844] FAULT_INJECTION: forcing a failure. [ 1542.905844] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1542.907346] CPU: 0 PID: 9483 Comm: syz-executor.7 Not tainted 5.10.226 #1 [ 1542.908182] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1542.909188] Call Trace: [ 1542.909518] dump_stack+0x107/0x167 [ 1542.909964] should_fail.cold+0x5/0xa [ 1542.910468] _copy_to_user+0x2e/0x180 [ 1542.910939] simple_read_from_buffer+0xcc/0x160 [ 1542.911508] proc_fail_nth_read+0x198/0x230 [ 1542.912057] ? proc_sessionid_read+0x230/0x230 [ 1542.912644] ? security_file_permission+0xb1/0xe0 [ 1542.913260] ? proc_sessionid_read+0x230/0x230 [ 1542.913839] vfs_read+0x228/0x620 [ 1542.914285] ksys_read+0x12d/0x260 [ 1542.918747] ? vfs_write+0xb10/0xb10 [ 1542.919209] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1542.919846] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1542.920476] do_syscall_64+0x33/0x40 [ 1542.920928] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1542.921551] RIP: 0033:0x7f03e9eeb69c [ 1542.922005] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1542.924245] RSP: 002b:00007f03e74ae170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1542.925170] RAX: ffffffffffffffda RBX: 0000000000000024 RCX: 00007f03e9eeb69c [ 1542.926038] RDX: 000000000000000f RSI: 00007f03e74ae1e0 RDI: 0000000000000004 [ 1542.926941] RBP: 00007f03e74ae1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1542.927813] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1542.928676] R13: 00007fff0447dd1f R14: 00007f03e74ae300 R15: 0000000000022000 21:28:14 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) getdents(r0, &(0x7f0000000540)=""/126, 0x7e) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x14) chmod(&(0x7f0000000040)='./file0/../file0\x00', 0xa) 21:28:14 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\x0f\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:28:14 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1e, 0x0) 21:28:14 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x900, 0x0) 21:28:14 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:28:14 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x42, 0xc2) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000140)=0x5) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x200040, 0x10) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000240)) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x2200, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r3, 0x8040942d, &(0x7f0000000000)) getdents(r0, &(0x7f0000000540)=""/126, 0x7e) 21:28:14 executing program 5: ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)=0x80000) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000001280), 0x199040, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0x541b, 0x0) clone3(&(0x7f0000001480)={0x48010480, &(0x7f0000001300), &(0x7f0000001340)=0x0, &(0x7f0000001380), {0x13}, &(0x7f00000013c0)=""/17, 0x11, &(0x7f0000001400)=""/15, &(0x7f0000001440)=[0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0], 0xa}, 0x58) sendmsg$nl_generic(r1, &(0x7f0000001900)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000018c0)={&(0x7f0000001500)={0x384, 0x31, 0x4, 0x70bd25, 0x25dfdbff, {0xa}, [@generic="25e53477c4467946082a5dba766b4880a58b8efeb6e5c08ee550aaa3c55d3dfc1cbb2c8c8e6b86b40276aece15cc48bbeda1f1b45ac0e9ca5ee83d82d33c98bfb7707d47d6d8c6380531e6830cefe7d15ec624beb10201104fed0a28370c7d71b8254b7252659fbcad6b38aed656aca44b62c2cee0913e7aafc29648513b1bcaa43b55539f5ef8b14798c1651c7c2227746b3d4155d65d3819ade04453a081dae230e6362da0a74dbbde342b8aeb8941d713d3", @nested={0x49, 0x72, 0x0, 0x1, [@generic="9e78631b11b3ddd9f18bc171bca52938b7bf3b0ae5", @generic="dc54b6062deffdf28a838539a557f83af0a41a21c3b92b5041032afea91735342f410d848b8f2f7e6846d6cbf32d85e4"]}, @generic="c131c764043fda4bd290b796a137f9e8c8a3a96cfe6ee6aa2039c7cbc216f6fbc28185c0c5669a151e488bb91512d46a8b222fb0d583a7bb900ff9bedf3048f434f0ec619e60e94d75cf4986adabcc0609a5dafd0da970a933a3fef788c02206f140c0163d6eec2f6c6a0be34e33e22ec99cef2b2281fd5f66ebf75951", @nested={0xc, 0x35, 0x0, 0x1, [@typed={0x8, 0x6b, 0x0, 0x0, @fd=r2}]}, @typed={0x9, 0x8, 0x0, 0x0, @str='vfat\x00'}, @nested={0x107, 0x58, 0x0, 0x1, [@typed={0x8, 0x49, 0x0, 0x0, @u32=0x7}, @generic="eef7efcd5d15d4721b631ce9970c56f16e1d575ac9907cb0dd4bae3a94e014f5bcc838d829f2a39f755f25170c92f8d8446eca511353823f7db74cc5e0e4765221f733c4fbe42258ac233e488125c1ee08f5dcb4ededce9454aea6e4d5cc9e261555ad294204a6e2309dcfb9f1b5a6695bd73688775ab8c7a452b29358d114b48949958feca6ce57ff33a708cd47fd6e603551c86d5633c108aa50e80585a8a35b354a7b2e7b8129aab2930a88a34ee3a77ab83b38bb7f70a6e1c343d39d4e7b", @typed={0x8, 0x72, 0x0, 0x0, @pid=r3}, @typed={0x17, 0x6, 0x0, 0x0, @str='net_prio.ifpriomap\x00'}, @typed={0xc, 0x1b, 0x0, 0x0, @u64=0x2}, @generic="1f5ebd818882c6e3443227d6278c5c"]}, @generic="249e3fb17eab774b601bdab38dae4b868177f7ec157ad627851a4f8018df7ada57657b5ed7ed185cee7e70c98b13ed8a138b96507e4d5f1afc52c08a388036c015bd91ef872326c46490c3c9b42a69e97c", @generic="f3ba0935db1a61cedf96669d0a47617a357bf11b5a33f61d968b1b6f10e01f571500866bed91304cd0bb9660baa78acc9fe8d675a0c97f31481a6eca7cce0554de6fcd28f8ca71efaf503bad15f82adaa7b23d3227317ff3850574a79510c6650afc07f2809bed553c5dde1434b165ec8eb923e64a4e5c9e", @generic="2a2880c79b45fb46107be8"]}, 0x384}, 0x1, 0x0, 0x0, 0x8804}, 0x20000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x8401, 0x101) openat$cgroup_netprio_ifpriomap(r4, &(0x7f0000000000), 0x2, 0x0) 21:28:14 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\x10\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:28:14 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0xa00, 0x0) [ 1543.059960] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:28:14 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x23, 0x0) [ 1556.564666] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:28:28 executing program 0: r0 = getpgid(0x0) syz_open_procfs(r0, &(0x7f0000000080)='net/ptype\x00') syz_open_procfs(r0, &(0x7f0000000640)='net/hci\x00') r1 = getpgid(0x0) syz_open_procfs(r1, &(0x7f0000000640)='net/hci\x00') syz_open_procfs(r1, &(0x7f0000001100)='net/psched\x00') r2 = getpgid(0x0) syz_open_procfs(r2, &(0x7f0000000640)='net/hci\x00') rt_tgsigqueueinfo(r0, r2, 0x4, &(0x7f0000001240)={0xb, 0xff, 0x4}) r3 = getpgid(0x0) r4 = syz_open_procfs(r3, &(0x7f0000000640)='net/hci\x00') recvmmsg$unix(r4, &(0x7f0000004980)=[{{&(0x7f0000001300), 0x6e, &(0x7f00000000c0)=[{&(0x7f0000001380)=""/196, 0xc4}, {&(0x7f0000001480)=""/102, 0x66}, {&(0x7f0000001500)=""/183, 0xb7}], 0x3, &(0x7f00000015c0)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}}, {{0x0, 0x0, &(0x7f0000002800)=[{&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000002640)=""/25, 0x19}, {&(0x7f0000002680)=""/117, 0x75}, {&(0x7f0000002700)=""/110, 0x6e}, {&(0x7f0000002780)=""/88, 0x58}], 0x5, &(0x7f0000004c80)=ANY=[@ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="3cabe53687d8dc5a63fef148a9dbd403e9a27b118731025d8cc54a047049c2e1875ea44ed8cbd9ef7c88000006003f36c84010fa408813435ccb220001adafcd77669294a9d49cb095b409219665d42f3d4977da00f311c70600000000000000c7bd7db7312fcda5a622c746f0216fe793e2c78dce56def4a269b06f0292dced3944a4700b3be6c84505a589b11b34f8390bdd45cd90ac500e7f67000000000000000000000000000000060000000000000000000000000000492df0b8d9f57f50df4be02ba279b25fce499dea23ef49c16b4d18a169185c122061c96df1c6c0af939d26ceeef9c7a1d0b799682006"], 0x48}}, {{&(0x7f0000002900), 0x6e, &(0x7f0000003dc0)=[{&(0x7f0000002980)=""/15, 0xf}, {&(0x7f00000029c0)=""/238, 0xee}, {&(0x7f0000002ac0)=""/190, 0xbe}, {&(0x7f0000002b80)=""/204, 0xcc}, {&(0x7f0000002c80)=""/209, 0xd1}, {&(0x7f0000002d80)=""/4096, 0x1000}, {&(0x7f0000003d80)=""/42, 0x2a}], 0x7, &(0x7f0000003e40)=[@cred={{0x1c}}], 0x20}}, {{&(0x7f0000003e80), 0x6e, &(0x7f0000004100)=[{&(0x7f0000003f00)=""/229, 0xe5}, {&(0x7f0000004000)=""/179, 0xb3}], 0x2, &(0x7f0000004140)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002800000000007db2008c000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0x120}}, {{&(0x7f0000004280)=@abs, 0x6e, &(0x7f0000004340)=[{&(0x7f0000004300)=""/4, 0x4}], 0x1, &(0x7f0000004380)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x50}}, {{&(0x7f0000004400), 0x6e, &(0x7f00000045c0)=[{&(0x7f0000004480)=""/189, 0xbd}, {&(0x7f0000004540)=""/96, 0x60}], 0x2, &(0x7f0000004600)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x50}}, {{&(0x7f0000004680)=@abs, 0x6e, &(0x7f0000004940)=[{&(0x7f0000004700)=""/218, 0xda}, {&(0x7f0000004800)=""/26, 0x1a}, {&(0x7f0000004840)=""/221, 0xdd}], 0x3}}], 0x7, 0x10, 0x0) syz_open_procfs(r5, &(0x7f0000004b40)='net/dev_mcast\x00') r6 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r6, &(0x7f0000001140)=""/233, 0xe9) 21:28:28 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:28:28 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0xb00, 0x0) 21:28:28 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\x0f\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:28:28 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:28:28 executing program 5: ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)=0x80000) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000001280), 0x199040, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0x541b, 0x0) clone3(&(0x7f0000001480)={0x48010480, &(0x7f0000001300), &(0x7f0000001340)=0x0, &(0x7f0000001380), {0x13}, &(0x7f00000013c0)=""/17, 0x11, &(0x7f0000001400)=""/15, &(0x7f0000001440)=[0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0], 0xa}, 0x58) sendmsg$nl_generic(r1, &(0x7f0000001900)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000018c0)={&(0x7f0000001500)={0x384, 0x31, 0x4, 0x70bd25, 0x25dfdbff, {0xa}, [@generic="25e53477c4467946082a5dba766b4880a58b8efeb6e5c08ee550aaa3c55d3dfc1cbb2c8c8e6b86b40276aece15cc48bbeda1f1b45ac0e9ca5ee83d82d33c98bfb7707d47d6d8c6380531e6830cefe7d15ec624beb10201104fed0a28370c7d71b8254b7252659fbcad6b38aed656aca44b62c2cee0913e7aafc29648513b1bcaa43b55539f5ef8b14798c1651c7c2227746b3d4155d65d3819ade04453a081dae230e6362da0a74dbbde342b8aeb8941d713d3", @nested={0x49, 0x72, 0x0, 0x1, [@generic="9e78631b11b3ddd9f18bc171bca52938b7bf3b0ae5", @generic="dc54b6062deffdf28a838539a557f83af0a41a21c3b92b5041032afea91735342f410d848b8f2f7e6846d6cbf32d85e4"]}, @generic="c131c764043fda4bd290b796a137f9e8c8a3a96cfe6ee6aa2039c7cbc216f6fbc28185c0c5669a151e488bb91512d46a8b222fb0d583a7bb900ff9bedf3048f434f0ec619e60e94d75cf4986adabcc0609a5dafd0da970a933a3fef788c02206f140c0163d6eec2f6c6a0be34e33e22ec99cef2b2281fd5f66ebf75951", @nested={0xc, 0x35, 0x0, 0x1, [@typed={0x8, 0x6b, 0x0, 0x0, @fd=r2}]}, @typed={0x9, 0x8, 0x0, 0x0, @str='vfat\x00'}, @nested={0x107, 0x58, 0x0, 0x1, [@typed={0x8, 0x49, 0x0, 0x0, @u32=0x7}, @generic="eef7efcd5d15d4721b631ce9970c56f16e1d575ac9907cb0dd4bae3a94e014f5bcc838d829f2a39f755f25170c92f8d8446eca511353823f7db74cc5e0e4765221f733c4fbe42258ac233e488125c1ee08f5dcb4ededce9454aea6e4d5cc9e261555ad294204a6e2309dcfb9f1b5a6695bd73688775ab8c7a452b29358d114b48949958feca6ce57ff33a708cd47fd6e603551c86d5633c108aa50e80585a8a35b354a7b2e7b8129aab2930a88a34ee3a77ab83b38bb7f70a6e1c343d39d4e7b", @typed={0x8, 0x72, 0x0, 0x0, @pid=r3}, @typed={0x17, 0x6, 0x0, 0x0, @str='net_prio.ifpriomap\x00'}, @typed={0xc, 0x1b, 0x0, 0x0, @u64=0x2}, @generic="1f5ebd818882c6e3443227d6278c5c"]}, @generic="249e3fb17eab774b601bdab38dae4b868177f7ec157ad627851a4f8018df7ada57657b5ed7ed185cee7e70c98b13ed8a138b96507e4d5f1afc52c08a388036c015bd91ef872326c46490c3c9b42a69e97c", @generic="f3ba0935db1a61cedf96669d0a47617a357bf11b5a33f61d968b1b6f10e01f571500866bed91304cd0bb9660baa78acc9fe8d675a0c97f31481a6eca7cce0554de6fcd28f8ca71efaf503bad15f82adaa7b23d3227317ff3850574a79510c6650afc07f2809bed553c5dde1434b165ec8eb923e64a4e5c9e", @generic="2a2880c79b45fb46107be8"]}, 0x384}, 0x1, 0x0, 0x0, 0x8804}, 0x20000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x8401, 0x101) 21:28:28 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x24, 0x0) 21:28:28 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x812004, &(0x7f0000000240)=ANY=[]) getdents(r0, &(0x7f0000000540)=""/126, 0x7e) [ 1556.596824] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:28:28 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0xc00, 0x0) 21:28:28 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x26, 0x0) 21:28:28 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x2, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:28:28 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:28:28 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\x10\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) [ 1556.713071] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:28:28 executing program 5: ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)=0x80000) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000001280), 0x199040, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0x541b, 0x0) clone3(&(0x7f0000001480)={0x48010480, &(0x7f0000001300), &(0x7f0000001340)=0x0, &(0x7f0000001380), {0x13}, &(0x7f00000013c0)=""/17, 0x11, &(0x7f0000001400)=""/15, &(0x7f0000001440)=[0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0], 0xa}, 0x58) sendmsg$nl_generic(r1, &(0x7f0000001900)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000018c0)={&(0x7f0000001500)={0x384, 0x31, 0x4, 0x70bd25, 0x25dfdbff, {0xa}, [@generic="25e53477c4467946082a5dba766b4880a58b8efeb6e5c08ee550aaa3c55d3dfc1cbb2c8c8e6b86b40276aece15cc48bbeda1f1b45ac0e9ca5ee83d82d33c98bfb7707d47d6d8c6380531e6830cefe7d15ec624beb10201104fed0a28370c7d71b8254b7252659fbcad6b38aed656aca44b62c2cee0913e7aafc29648513b1bcaa43b55539f5ef8b14798c1651c7c2227746b3d4155d65d3819ade04453a081dae230e6362da0a74dbbde342b8aeb8941d713d3", @nested={0x49, 0x72, 0x0, 0x1, [@generic="9e78631b11b3ddd9f18bc171bca52938b7bf3b0ae5", @generic="dc54b6062deffdf28a838539a557f83af0a41a21c3b92b5041032afea91735342f410d848b8f2f7e6846d6cbf32d85e4"]}, @generic="c131c764043fda4bd290b796a137f9e8c8a3a96cfe6ee6aa2039c7cbc216f6fbc28185c0c5669a151e488bb91512d46a8b222fb0d583a7bb900ff9bedf3048f434f0ec619e60e94d75cf4986adabcc0609a5dafd0da970a933a3fef788c02206f140c0163d6eec2f6c6a0be34e33e22ec99cef2b2281fd5f66ebf75951", @nested={0xc, 0x35, 0x0, 0x1, [@typed={0x8, 0x6b, 0x0, 0x0, @fd=r2}]}, @typed={0x9, 0x8, 0x0, 0x0, @str='vfat\x00'}, @nested={0x107, 0x58, 0x0, 0x1, [@typed={0x8, 0x49, 0x0, 0x0, @u32=0x7}, @generic="eef7efcd5d15d4721b631ce9970c56f16e1d575ac9907cb0dd4bae3a94e014f5bcc838d829f2a39f755f25170c92f8d8446eca511353823f7db74cc5e0e4765221f733c4fbe42258ac233e488125c1ee08f5dcb4ededce9454aea6e4d5cc9e261555ad294204a6e2309dcfb9f1b5a6695bd73688775ab8c7a452b29358d114b48949958feca6ce57ff33a708cd47fd6e603551c86d5633c108aa50e80585a8a35b354a7b2e7b8129aab2930a88a34ee3a77ab83b38bb7f70a6e1c343d39d4e7b", @typed={0x8, 0x72, 0x0, 0x0, @pid=r3}, @typed={0x17, 0x6, 0x0, 0x0, @str='net_prio.ifpriomap\x00'}, @typed={0xc, 0x1b, 0x0, 0x0, @u64=0x2}, @generic="1f5ebd818882c6e3443227d6278c5c"]}, @generic="249e3fb17eab774b601bdab38dae4b868177f7ec157ad627851a4f8018df7ada57657b5ed7ed185cee7e70c98b13ed8a138b96507e4d5f1afc52c08a388036c015bd91ef872326c46490c3c9b42a69e97c", @generic="f3ba0935db1a61cedf96669d0a47617a357bf11b5a33f61d968b1b6f10e01f571500866bed91304cd0bb9660baa78acc9fe8d675a0c97f31481a6eca7cce0554de6fcd28f8ca71efaf503bad15f82adaa7b23d3227317ff3850574a79510c6650afc07f2809bed553c5dde1434b165ec8eb923e64a4e5c9e", @generic="2a2880c79b45fb46107be8"]}, 0x384}, 0x1, 0x0, 0x0, 0x8804}, 0x20000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) [ 1556.730902] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:28:28 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x3, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:28:28 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x27, 0x0) [ 1556.799496] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 1556.802081] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:28:41 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x29, 0x0) 21:28:41 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0xd00, 0x0) 21:28:41 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:28:41 executing program 5: ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)=0x80000) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)) openat$bsg(0xffffffffffffff9c, &(0x7f0000001280), 0x199040, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0x541b, 0x0) clone3(&(0x7f0000001480)={0x48010480, &(0x7f0000001300), &(0x7f0000001340), &(0x7f0000001380), {0x13}, &(0x7f00000013c0)=""/17, 0x11, &(0x7f0000001400)=""/15, &(0x7f0000001440)=[0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0], 0xa}, 0x58) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) 21:28:41 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x4, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:28:41 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w2\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:28:41 executing program 3: r0 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r1) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000100)={0x1c, r2, 0x609, 0x0, 0x0, {0x2a}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r4}]}, 0x1c}}, 0x0) sendmsg$IEEE802154_LLSEC_DEL_KEY(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x3c, r0, 0x2, 0x70bd28, 0x25dfdbfd, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r4}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8000}, 0x20040840) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) getdents(r5, &(0x7f0000000540)=""/126, 0x7e) 21:28:41 executing program 0: r0 = getpgid(0x0) syz_open_procfs(r0, &(0x7f0000000080)='net/ptype\x00') syz_open_procfs(r0, &(0x7f0000000640)='net/hci\x00') r1 = getpgid(0x0) syz_open_procfs(r1, &(0x7f0000000640)='net/hci\x00') syz_open_procfs(r1, &(0x7f0000001100)='net/psched\x00') r2 = getpgid(0x0) syz_open_procfs(r2, &(0x7f0000000640)='net/hci\x00') rt_tgsigqueueinfo(r0, r2, 0x4, &(0x7f0000001240)={0xb, 0xff, 0x4}) r3 = getpgid(0x0) r4 = syz_open_procfs(r3, &(0x7f0000000640)='net/hci\x00') recvmmsg$unix(r4, &(0x7f0000004980)=[{{&(0x7f0000001300), 0x6e, &(0x7f00000000c0)=[{&(0x7f0000001380)=""/196, 0xc4}, {&(0x7f0000001480)=""/102, 0x66}, {&(0x7f0000001500)=""/183, 0xb7}], 0x3, &(0x7f00000015c0)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}}, {{0x0, 0x0, &(0x7f0000002800)=[{&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000002640)=""/25, 0x19}, {&(0x7f0000002680)=""/117, 0x75}, {&(0x7f0000002700)=""/110, 0x6e}, {&(0x7f0000002780)=""/88, 0x58}], 0x5, &(0x7f0000004c80)=ANY=[@ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="3cabe53687d8dc5a63fef148a9dbd403e9a27b118731025d8cc54a047049c2e1875ea44ed8cbd9ef7c88000006003f36c84010fa408813435ccb220001adafcd77669294a9d49cb095b409219665d42f3d4977da00f311c70600000000000000c7bd7db7312fcda5a622c746f0216fe793e2c78dce56def4a269b06f0292dced3944a4700b3be6c84505a589b11b34f8390bdd45cd90ac500e7f67000000000000000000000000000000060000000000000000000000000000492df0b8d9f57f50df4be02ba279b25fce499dea23ef49c16b4d18a169185c122061c96df1c6c0af939d26ceeef9c7a1d0b799682006"], 0x48}}, {{&(0x7f0000002900), 0x6e, &(0x7f0000003dc0)=[{&(0x7f0000002980)=""/15, 0xf}, {&(0x7f00000029c0)=""/238, 0xee}, {&(0x7f0000002ac0)=""/190, 0xbe}, {&(0x7f0000002b80)=""/204, 0xcc}, {&(0x7f0000002c80)=""/209, 0xd1}, {&(0x7f0000002d80)=""/4096, 0x1000}, {&(0x7f0000003d80)=""/42, 0x2a}], 0x7, &(0x7f0000003e40)=[@cred={{0x1c}}], 0x20}}, {{&(0x7f0000003e80), 0x6e, &(0x7f0000004100)=[{&(0x7f0000003f00)=""/229, 0xe5}, {&(0x7f0000004000)=""/179, 0xb3}], 0x2, &(0x7f0000004140)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002800000000007db2008c000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0x120}}, {{&(0x7f0000004280)=@abs, 0x6e, &(0x7f0000004340)=[{&(0x7f0000004300)=""/4, 0x4}], 0x1, &(0x7f0000004380)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x50}}, {{&(0x7f0000004400), 0x6e, &(0x7f00000045c0)=[{&(0x7f0000004480)=""/189, 0xbd}, {&(0x7f0000004540)=""/96, 0x60}], 0x2, &(0x7f0000004600)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x50}}, {{&(0x7f0000004680)=@abs, 0x6e, &(0x7f0000004940)=[{&(0x7f0000004700)=""/218, 0xda}, {&(0x7f0000004800)=""/26, 0x1a}, {&(0x7f0000004840)=""/221, 0xdd}], 0x3}}], 0x7, 0x10, 0x0) syz_open_procfs(r5, &(0x7f0000004b40)='net/dev_mcast\x00') read(0xffffffffffffffff, &(0x7f0000001140)=""/233, 0xe9) [ 1570.276740] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 1570.293990] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:28:55 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x2b, 0x0) 21:28:55 executing program 5: ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)=0x80000) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)) openat$bsg(0xffffffffffffff9c, &(0x7f0000001280), 0x199040, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0x541b, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) 21:28:55 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x240200, 0x0) r1 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) kcmp(0xffffffffffffffff, 0xffffffffffffffff, 0x2, r0, r1) r2 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) getdents(r2, &(0x7f0000000540)=""/126, 0x7e) [ 1583.674418] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:28:55 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\xf5,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:28:55 executing program 0: r0 = getpgid(0x0) syz_open_procfs(r0, &(0x7f0000000080)='net/ptype\x00') syz_open_procfs(r0, &(0x7f0000000640)='net/hci\x00') r1 = getpgid(0x0) syz_open_procfs(r1, &(0x7f0000000640)='net/hci\x00') syz_open_procfs(r1, &(0x7f0000001100)='net/psched\x00') r2 = getpgid(0x0) syz_open_procfs(r2, &(0x7f0000000640)='net/hci\x00') rt_tgsigqueueinfo(r0, r2, 0x4, &(0x7f0000001240)={0xb, 0xff, 0x4}) r3 = getpgid(0x0) r4 = syz_open_procfs(r3, &(0x7f0000000640)='net/hci\x00') recvmmsg$unix(r4, &(0x7f0000004980)=[{{&(0x7f0000001300), 0x6e, &(0x7f00000000c0)=[{&(0x7f0000001380)=""/196, 0xc4}, {&(0x7f0000001480)=""/102, 0x66}, {&(0x7f0000001500)=""/183, 0xb7}], 0x3, &(0x7f00000015c0)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}}, {{0x0, 0x0, &(0x7f0000002800)=[{&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000002640)=""/25, 0x19}, {&(0x7f0000002680)=""/117, 0x75}, {&(0x7f0000002700)=""/110, 0x6e}, {&(0x7f0000002780)=""/88, 0x58}], 0x5, &(0x7f0000004c80)=ANY=[@ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="3cabe53687d8dc5a63fef148a9dbd403e9a27b118731025d8cc54a047049c2e1875ea44ed8cbd9ef7c88000006003f36c84010fa408813435ccb220001adafcd77669294a9d49cb095b409219665d42f3d4977da00f311c70600000000000000c7bd7db7312fcda5a622c746f0216fe793e2c78dce56def4a269b06f0292dced3944a4700b3be6c84505a589b11b34f8390bdd45cd90ac500e7f67000000000000000000000000000000060000000000000000000000000000492df0b8d9f57f50df4be02ba279b25fce499dea23ef49c16b4d18a169185c122061c96df1c6c0af939d26ceeef9c7a1d0b799682006"], 0x48}}, {{&(0x7f0000002900), 0x6e, &(0x7f0000003dc0)=[{&(0x7f0000002980)=""/15, 0xf}, {&(0x7f00000029c0)=""/238, 0xee}, {&(0x7f0000002ac0)=""/190, 0xbe}, {&(0x7f0000002b80)=""/204, 0xcc}, {&(0x7f0000002c80)=""/209, 0xd1}, {&(0x7f0000002d80)=""/4096, 0x1000}, {&(0x7f0000003d80)=""/42, 0x2a}], 0x7, &(0x7f0000003e40)=[@cred={{0x1c}}], 0x20}}, {{&(0x7f0000003e80), 0x6e, &(0x7f0000004100)=[{&(0x7f0000003f00)=""/229, 0xe5}, {&(0x7f0000004000)=""/179, 0xb3}], 0x2, &(0x7f0000004140)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002800000000007db2008c000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0x120}}, {{&(0x7f0000004280)=@abs, 0x6e, &(0x7f0000004340)=[{&(0x7f0000004300)=""/4, 0x4}], 0x1, &(0x7f0000004380)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x50}}, {{&(0x7f0000004400), 0x6e, &(0x7f00000045c0)=[{&(0x7f0000004480)=""/189, 0xbd}, {&(0x7f0000004540)=""/96, 0x60}], 0x2, &(0x7f0000004600)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x50}}, {{&(0x7f0000004680)=@abs, 0x6e, &(0x7f0000004940)=[{&(0x7f0000004700)=""/218, 0xda}, {&(0x7f0000004800)=""/26, 0x1a}, {&(0x7f0000004840)=""/221, 0xdd}], 0x3}}], 0x7, 0x10, 0x0) syz_open_procfs(r5, &(0x7f0000004b40)='net/dev_mcast\x00') read(0xffffffffffffffff, &(0x7f0000001140)=""/233, 0xe9) 21:28:55 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x5, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:28:55 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:28:55 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0xe00, 0x0) [ 1583.690820] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:28:55 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1002, 0x0) 21:28:55 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x34, 0x0) 21:28:55 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:28:55 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\x0f\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:28:55 executing program 5: ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)=0x80000) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)) openat$bsg(0xffffffffffffff9c, &(0x7f0000001280), 0x199040, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) 21:28:55 executing program 0: r0 = getpgid(0x0) syz_open_procfs(r0, &(0x7f0000000080)='net/ptype\x00') syz_open_procfs(r0, &(0x7f0000000640)='net/hci\x00') r1 = getpgid(0x0) syz_open_procfs(r1, &(0x7f0000000640)='net/hci\x00') syz_open_procfs(r1, &(0x7f0000001100)='net/psched\x00') r2 = getpgid(0x0) syz_open_procfs(r2, &(0x7f0000000640)='net/hci\x00') rt_tgsigqueueinfo(r0, r2, 0x4, &(0x7f0000001240)={0xb, 0xff, 0x4}) r3 = getpgid(0x0) r4 = syz_open_procfs(r3, &(0x7f0000000640)='net/hci\x00') recvmmsg$unix(r4, &(0x7f0000004980)=[{{&(0x7f0000001300), 0x6e, &(0x7f00000000c0)=[{&(0x7f0000001380)=""/196, 0xc4}, {&(0x7f0000001480)=""/102, 0x66}, {&(0x7f0000001500)=""/183, 0xb7}], 0x3, &(0x7f00000015c0)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}}, {{0x0, 0x0, &(0x7f0000002800)=[{&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000002640)=""/25, 0x19}, {&(0x7f0000002680)=""/117, 0x75}, {&(0x7f0000002700)=""/110, 0x6e}, {&(0x7f0000002780)=""/88, 0x58}], 0x5, &(0x7f0000004c80)=ANY=[@ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="3cabe53687d8dc5a63fef148a9dbd403e9a27b118731025d8cc54a047049c2e1875ea44ed8cbd9ef7c88000006003f36c84010fa408813435ccb220001adafcd77669294a9d49cb095b409219665d42f3d4977da00f311c70600000000000000c7bd7db7312fcda5a622c746f0216fe793e2c78dce56def4a269b06f0292dced3944a4700b3be6c84505a589b11b34f8390bdd45cd90ac500e7f67000000000000000000000000000000060000000000000000000000000000492df0b8d9f57f50df4be02ba279b25fce499dea23ef49c16b4d18a169185c122061c96df1c6c0af939d26ceeef9c7a1d0b799682006"], 0x48}}, {{&(0x7f0000002900), 0x6e, &(0x7f0000003dc0)=[{&(0x7f0000002980)=""/15, 0xf}, {&(0x7f00000029c0)=""/238, 0xee}, {&(0x7f0000002ac0)=""/190, 0xbe}, {&(0x7f0000002b80)=""/204, 0xcc}, {&(0x7f0000002c80)=""/209, 0xd1}, {&(0x7f0000002d80)=""/4096, 0x1000}, {&(0x7f0000003d80)=""/42, 0x2a}], 0x7, &(0x7f0000003e40)=[@cred={{0x1c}}], 0x20}}, {{&(0x7f0000003e80), 0x6e, &(0x7f0000004100)=[{&(0x7f0000003f00)=""/229, 0xe5}, {&(0x7f0000004000)=""/179, 0xb3}], 0x2, &(0x7f0000004140)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002800000000007db2008c000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0x120}}, {{&(0x7f0000004280)=@abs, 0x6e, &(0x7f0000004340)=[{&(0x7f0000004300)=""/4, 0x4}], 0x1, &(0x7f0000004380)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x50}}, {{&(0x7f0000004400), 0x6e, &(0x7f00000045c0)=[{&(0x7f0000004480)=""/189, 0xbd}, {&(0x7f0000004540)=""/96, 0x60}], 0x2, &(0x7f0000004600)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x50}}, {{&(0x7f0000004680)=@abs, 0x6e, &(0x7f0000004940)=[{&(0x7f0000004700)=""/218, 0xda}, {&(0x7f0000004800)=""/26, 0x1a}, {&(0x7f0000004840)=""/221, 0xdd}], 0x3}}], 0x7, 0x10, 0x0) syz_open_procfs(r5, &(0x7f0000004b40)='net/dev_mcast\x00') read(0xffffffffffffffff, &(0x7f0000001140)=""/233, 0xe9) 21:28:55 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000001e00)="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", 0xfffffffffffffdd0}, {&(0x7f0000000100)="71d1ccd49796e7843c0973d88250a83448e689bfa96ff20af1c9990c583852523df3248cf270ebf83fdc99bdc83bd6a98527688d09f73518a506287e2d2b2f93c1755cba329a5c62d07554d7b59602da61ff0136888059eb1df7287f7f20a298298cde1c91340e81076f0b9cefab03b4c65395a7eff2325b432a89348f9807a56f18fd5e037f399ef9648d0564d8decb476b51c61ae7621874063d9ded990954bff8a0045e3a", 0xa6, 0x7}], 0x0, &(0x7f0000000040)=ANY=[]) getdents(r0, &(0x7f0000000540)=""/126, 0x7e) 21:28:55 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x36, 0x0) 21:28:55 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x6, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1583.854217] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 1583.870467] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 1583.980289] FAT-fs (loop3): invalid media value (0xa8) [ 1583.981016] FAT-fs (loop3): Can't find a valid FAT filesystem 21:29:08 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1003, 0x0) 21:29:08 executing program 0: r0 = getpgid(0x0) syz_open_procfs(r0, &(0x7f0000000080)='net/ptype\x00') syz_open_procfs(r0, &(0x7f0000000640)='net/hci\x00') r1 = getpgid(0x0) syz_open_procfs(r1, &(0x7f0000000640)='net/hci\x00') syz_open_procfs(r1, &(0x7f0000001100)='net/psched\x00') r2 = getpgid(0x0) syz_open_procfs(r2, &(0x7f0000000640)='net/hci\x00') rt_tgsigqueueinfo(r0, r2, 0x4, &(0x7f0000001240)={0xb, 0xff, 0x4}) r3 = getpgid(0x0) r4 = syz_open_procfs(r3, &(0x7f0000000640)='net/hci\x00') recvmmsg$unix(r4, &(0x7f0000004980)=[{{&(0x7f0000001300), 0x6e, &(0x7f00000000c0)=[{&(0x7f0000001380)=""/196, 0xc4}, {&(0x7f0000001480)=""/102, 0x66}, {&(0x7f0000001500)=""/183, 0xb7}], 0x3, &(0x7f00000015c0)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}}, {{0x0, 0x0, &(0x7f0000002800)=[{&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000002640)=""/25, 0x19}, {&(0x7f0000002680)=""/117, 0x75}, {&(0x7f0000002700)=""/110, 0x6e}, {&(0x7f0000002780)=""/88, 0x58}], 0x5, &(0x7f0000004c80)=ANY=[@ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="3cabe53687d8dc5a63fef148a9dbd403e9a27b118731025d8cc54a047049c2e1875ea44ed8cbd9ef7c88000006003f36c84010fa408813435ccb220001adafcd77669294a9d49cb095b409219665d42f3d4977da00f311c70600000000000000c7bd7db7312fcda5a622c746f0216fe793e2c78dce56def4a269b06f0292dced3944a4700b3be6c84505a589b11b34f8390bdd45cd90ac500e7f67000000000000000000000000000000060000000000000000000000000000492df0b8d9f57f50df4be02ba279b25fce499dea23ef49c16b4d18a169185c122061c96df1c6c0af939d26ceeef9c7a1d0b799682006"], 0x48}}, {{&(0x7f0000002900), 0x6e, &(0x7f0000003dc0)=[{&(0x7f0000002980)=""/15, 0xf}, {&(0x7f00000029c0)=""/238, 0xee}, {&(0x7f0000002ac0)=""/190, 0xbe}, {&(0x7f0000002b80)=""/204, 0xcc}, {&(0x7f0000002c80)=""/209, 0xd1}, {&(0x7f0000002d80)=""/4096, 0x1000}, {&(0x7f0000003d80)=""/42, 0x2a}], 0x7, &(0x7f0000003e40)=[@cred={{0x1c}}], 0x20}}, {{&(0x7f0000003e80), 0x6e, &(0x7f0000004100)=[{&(0x7f0000003f00)=""/229, 0xe5}, {&(0x7f0000004000)=""/179, 0xb3}], 0x2, &(0x7f0000004140)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002800000000007db2008c000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0x120}}, {{&(0x7f0000004280)=@abs, 0x6e, &(0x7f0000004340)=[{&(0x7f0000004300)=""/4, 0x4}], 0x1, &(0x7f0000004380)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x50}}, {{&(0x7f0000004400), 0x6e, &(0x7f00000045c0)=[{&(0x7f0000004480)=""/189, 0xbd}, {&(0x7f0000004540)=""/96, 0x60}], 0x2, &(0x7f0000004600)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x50}}, {{&(0x7f0000004680)=@abs, 0x6e, &(0x7f0000004940)=[{&(0x7f0000004700)=""/218, 0xda}, {&(0x7f0000004800)=""/26, 0x1a}, {&(0x7f0000004840)=""/221, 0xdd}], 0x3}}], 0x7, 0x10, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r5, &(0x7f0000001140)=""/233, 0xe9) 21:29:08 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) getdents(r0, &(0x7f0000000540)=""/126, 0x7e) [ 1597.079378] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:29:08 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x7, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:29:08 executing program 5: ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)=0x80000) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)) openat$bsg(0xffffffffffffff9c, &(0x7f0000001280), 0x199040, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) 21:29:08 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x37, 0x0) 21:29:08 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\x10\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:29:08 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) [ 1597.126134] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:29:08 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x39, 0x0) 21:29:08 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1004, 0x0) 21:29:08 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x3b, 0x0) 21:29:08 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000540)=""/126, 0x7e) 21:29:08 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1005, 0x0) 21:29:08 executing program 5: ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)=0x80000) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) 21:29:08 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x8, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:29:08 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x3d, 0x0) 21:29:08 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x0f2\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) [ 1597.278269] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:29:22 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:29:22 executing program 0: r0 = getpgid(0x0) syz_open_procfs(r0, &(0x7f0000000080)='net/ptype\x00') syz_open_procfs(r0, &(0x7f0000000640)='net/hci\x00') r1 = getpgid(0x0) syz_open_procfs(r1, &(0x7f0000000640)='net/hci\x00') syz_open_procfs(r1, &(0x7f0000001100)='net/psched\x00') r2 = getpgid(0x0) syz_open_procfs(r2, &(0x7f0000000640)='net/hci\x00') rt_tgsigqueueinfo(r0, r2, 0x4, &(0x7f0000001240)={0xb, 0xff, 0x4}) r3 = getpgid(0x0) syz_open_procfs(r3, &(0x7f0000000640)='net/hci\x00') r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r4, &(0x7f0000001140)=""/233, 0xe9) [ 1610.801824] FAT-fs (loop3): Unrecognized mount option "‘›?VI¥™>·11ÕX™íÖÙØâ_ú)ÓR›­šµì5p" or missing value [ 1610.807181] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:29:22 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x102\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:29:22 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000000)='./file0\x00', 0x0, 0x6, &(0x7f0000000440)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}, {&(0x7f00000001c0)="dcf677bc33db22b4c8f78844863062ed9a622686b4613c0bd093e0ed7847cd40343b59cc76b548d5ec48f2cfb94248fd6f6b286f8778938ef61b19a870feb3059737c75d43f4261a9e4dd4710ec1c6863dd80c9a510b34ad5ec182f599189ce0f42a58a50cc6ab00952fadf4a0f2167d1e7a678fdca776e1e010eba9c126b0e1919b3f560149a599103eb73131d55899edd6d9d8e25ffa29d3529bad9ab5ec35702c657ba29154a43eae290991aa7b4ead26a134582e39d1a19206c7d97fe8691bfdcff0354a603d607ce05ad1b6a40200cb11a7d7aeeaed3574fcf7d6394c70159f865b310f55c528eb", 0xea, 0x20007}, {&(0x7f0000000040)="789e77da3fb3829ca423f5c35d4c4e2f4210ba1f85bb74786268", 0x1a, 0x4}, {&(0x7f0000000300)="b3d4f3dd090f2f7b09d4ca3d37ad3f1315bf7e3b59c4ded2d1531605a0512e753879b210e65422b712bf4d4d707ba32598ef2d1d1b91f22edb4f297d1d8e116d8d21591bf29524d55f7ad04b5acc786577528344e2f377e45ead6e0bf70d90388114ed077f9afe", 0x67, 0x2000000000000003}, {&(0x7f00000005c0)="49659490bb4848bf7699d06694acd0b3439f3b470457f4b147d43f67bf47b54e722625e2616018f7f0ee7894faf5b4702166aacb699783ba9085b8db17b7603487e5167aea3379dda567f51e1338d94d9a443053f628913afe23be8be02092414ac9e64d6430e5c897306c670b8567eefd797c6bffb03ba425bd98949501100ecada128746a221b83a3435cdf9c34814947a6e43db948efa47759415f04121a88a8e3406a90ebb3ea873fd97b41a2e25fb47f1e13304504d23590200abd5709c4d38020a6383c2e81d9827ed88b680f505b4e8110eafcd465e2ed6e29194d6a96c789de22fc8e8f22074f548d0", 0xed, 0x2}], 0x0, &(0x7f0000000240)=ANY=[]) getdents(r1, &(0x7f0000000540)=""/126, 0x7e) copy_file_range(r0, &(0x7f0000000180)=0x4894, r0, &(0x7f00000002c0)=0x101, 0x0, 0x0) 21:29:22 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x41, 0x0) 21:29:22 executing program 5: ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)=0x80000) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) 21:29:22 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1006, 0x0) 21:29:22 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x9, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1610.815649] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:29:22 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x43, 0x0) [ 1610.859711] FAT-fs (loop3): Unrecognized mount option "‘›?VI¥™>·11ÕX™íÖÙØâ_ú)ÓR›­šµì5p" or missing value 21:29:36 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1007, 0x0) 21:29:36 executing program 0: r0 = getpgid(0x0) syz_open_procfs(r0, &(0x7f0000000080)='net/ptype\x00') syz_open_procfs(r0, &(0x7f0000000640)='net/hci\x00') r1 = getpgid(0x0) syz_open_procfs(r1, &(0x7f0000000640)='net/hci\x00') syz_open_procfs(r1, &(0x7f0000001100)='net/psched\x00') r2 = getpgid(0x0) syz_open_procfs(r2, &(0x7f0000000640)='net/hci\x00') rt_tgsigqueueinfo(r0, r2, 0x4, &(0x7f0000001240)={0xb, 0xff, 0x4}) getpgid(0x0) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r3, &(0x7f0000001140)=""/233, 0xe9) 21:29:36 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x03\b\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:29:36 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0xf, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1624.292736] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:29:36 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x44, 0x0) 21:29:36 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b9d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)=0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000001c0)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x2f, 0x9, 0x88, 0x9b, 0x0, 0xfe, 0x800, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0xd233e2084ff5427b, @perf_config_ext={0xbe, 0x3}, 0x40, 0xff, 0x0, 0x8, 0x6, 0x4, 0x1, 0x0, 0x7, 0x0, 0x2347}, r2, 0x4, r0, 0x1) getdents(r1, &(0x7f0000000540)=""/126, 0x7e) 21:29:36 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) [ 1624.308614] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:29:36 executing program 5: ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)=0x80000) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) 21:29:36 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1008, 0x0) 21:29:36 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x45, 0x0) 21:29:36 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x03\x10\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:29:36 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x48, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:29:36 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) getdents(r0, &(0x7f0000000540)=""/126, 0x7e) r1 = openat(r0, &(0x7f0000000000)='./file0\x00', 0x80000, 0x128) getdents64(r1, &(0x7f00000001c0)=""/169, 0xa9) 21:29:36 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x100a, 0x0) 21:29:36 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x46, 0x0) [ 1624.415918] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 1624.444196] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:29:36 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x48, 0x0) 21:29:36 executing program 5: ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)=0x80000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) 21:29:50 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1010, 0x0) 21:29:50 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x4c, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:29:50 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:29:50 executing program 0: r0 = getpgid(0x0) syz_open_procfs(r0, &(0x7f0000000080)='net/ptype\x00') syz_open_procfs(r0, &(0x7f0000000640)='net/hci\x00') r1 = getpgid(0x0) syz_open_procfs(r1, &(0x7f0000000640)='net/hci\x00') syz_open_procfs(r1, &(0x7f0000001100)='net/psched\x00') r2 = getpgid(0x0) syz_open_procfs(r2, &(0x7f0000000640)='net/hci\x00') rt_tgsigqueueinfo(r0, r2, 0x4, &(0x7f0000001240)={0xb, 0xff, 0x4}) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r3, &(0x7f0000001140)=""/233, 0xe9) 21:29:50 executing program 5: ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)=0x80000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) 21:29:50 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x03\x12\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:29:50 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x4a, 0x0) 21:29:50 executing program 3: prctl$PR_SET_TAGGED_ADDR_CTRL(0x37, 0x4) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) getdents(r0, &(0x7f0000000540)=""/126, 0x7e) [ 1638.309315] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 1638.366868] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:29:50 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x4b, 0x0) 21:29:50 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1048, 0x0) 21:29:50 executing program 5: ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)=0x80000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) 21:29:50 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x68, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:29:50 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\x0fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) [ 1638.437546] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:29:50 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x104c, 0x0) [ 1638.455950] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:29:50 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x4c, 0x0) 21:29:50 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x4d, 0x0) 21:29:50 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x6c, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:29:50 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1068, 0x0) 21:29:50 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) [ 1638.552464] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 1638.565015] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:30:03 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\x10n\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:30:03 executing program 0: r0 = getpgid(0x0) syz_open_procfs(r0, &(0x7f0000000080)='net/ptype\x00') syz_open_procfs(r0, &(0x7f0000000640)='net/hci\x00') r1 = getpgid(0x0) syz_open_procfs(r1, &(0x7f0000000640)='net/hci\x00') syz_open_procfs(r1, &(0x7f0000001100)='net/psched\x00') r2 = getpgid(0x0) syz_open_procfs(r2, &(0x7f0000000640)='net/hci\x00') r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r3, &(0x7f0000001140)=""/233, 0xe9) 21:30:03 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x106c, 0x0) 21:30:03 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x4e, 0x0) 21:30:03 executing program 3: r0 = getpgid(0x0) syz_open_procfs(r0, &(0x7f0000000640)='net/hci\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r1, 0xc020660b, &(0x7f0000000040)) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x40, 0x1, 0x6, 0x3f, 0x0, 0xc1, 0x81200, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x2, 0x5}, 0x8040, 0x2, 0xe03, 0x5, 0x8001, 0x97f8, 0x6, 0x0, 0x28368808, 0x0, 0xd586}, r0, 0xf, r1, 0x2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) getdents(r2, &(0x7f0000000540)=""/126, 0x7e) 21:30:03 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:30:03 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) 21:30:03 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x74, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1652.133635] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 1652.148664] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:30:03 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1074, 0x0) 21:30:03 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\xf5CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:30:03 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x50, 0x0) 21:30:03 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) 21:30:17 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) syz_open_dev$mouse(&(0x7f0000000180), 0x7ff, 0x288103) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x380, 0x0) openat$incfs(r2, 0x0, 0x539002, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:30:17 executing program 0: r0 = getpgid(0x0) syz_open_procfs(r0, &(0x7f0000000080)='net/ptype\x00') syz_open_procfs(r0, &(0x7f0000000640)='net/hci\x00') r1 = getpgid(0x0) syz_open_procfs(r1, &(0x7f0000000640)='net/hci\x00') syz_open_procfs(r1, &(0x7f0000001100)='net/psched\x00') getpgid(0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000001140)=""/233, 0xe9) 21:30:17 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) 21:30:17 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x7a, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:30:17 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f00000003c0)='./file0\x00', 0x3, 0x2, &(0x7f0000000500)=[{&(0x7f0000000400)="f0d7b07e36172e6c1eb4c281b1d319e6ebb643b8fa11520b71b237c0b64e68a38c49609f74e852cc47b5e6c3a980a50e5afcd6ef9835fe7489dc93057b809e645d2f18ad78719056501bbbb609d37afb5e0688d41e90a762369c226a563aa612e94da51c3810d41e72adcf3007e9735ce026ba77", 0x74, 0x100000000}, {&(0x7f0000000480)="db5e2d3bc42f8ee397cefbe2027a4b36aaca0c2f8b17107ebe2217fe52143342ab55ac906402ce1d861ad2bba98b0cfc7e52a6c476429c46f2925635d57409b4045e9f3e3b34cb89cd90", 0x4a, 0x1}], 0x20, &(0x7f00000005c0)={[{@nr_blocks={'nr_blocks', 0x3d, [0x32, 0x74, 0x30, 0x39, 0x39]}}], [{@fowner_lt={'fowner<', 0xee01}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000600)) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r1 = syz_io_uring_setup(0x55f1, &(0x7f0000000080), &(0x7f0000ffd000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x400}, 0x0) io_uring_enter(r1, 0x76d3, 0x0, 0x0, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) r5 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r6, 0x81f8943c, &(0x7f00000001c0)) getdents(r5, &(0x7f0000000540)=""/126, 0x7e) 21:30:17 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:30:17 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x55, 0x0) 21:30:17 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x107a, 0x0) [ 1665.757781] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 1665.768737] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:30:17 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x57, 0x0) 21:30:17 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x5e, 0x0) 21:30:17 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x60, 0x0) 21:30:17 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1100, 0x0) 21:30:17 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) 21:30:17 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0xf0, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:30:17 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x63, 0x0) 21:30:17 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) [ 1665.972767] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 1665.988052] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:30:17 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002740), 0xffffffffffffffff) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f0000002800)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000940)={0x20, r1, 0x1, 0x0, 0x0, {0x15}, [@ETHTOOL_A_EEE_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}]}, 0x20}}, 0x0) sendmsg$ETHTOOL_MSG_CHANNELS_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)={0x134, 0x0, 0x10, 0x70bd25, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}]}, @HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x90, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6erspan0\x00'}]}]}, 0x134}, 0x1, 0x0, 0x0, 0x800}, 0x40000) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r4) r5 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r5, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:30:31 executing program 5: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) 21:30:31 executing program 0: r0 = getpgid(0x0) syz_open_procfs(r0, &(0x7f0000000080)='net/ptype\x00') syz_open_procfs(r0, &(0x7f0000000640)='net/hci\x00') r1 = getpgid(0x0) syz_open_procfs(r1, &(0x7f0000000640)='net/hci\x00') syz_open_procfs(r1, &(0x7f0000001100)='net/psched\x00') r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000001140)=""/233, 0xe9) 21:30:31 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0xe0b36d80, 0x0, 0x0, 0x0, {0xd}, 0x0, 0xfffffffffffffeea, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0xc020660b, &(0x7f0000000040)) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f00000003c0)={0x1, 0x8000}, 0x4) r3 = openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) r4 = accept$unix(r3, &(0x7f0000000180)=@abs, &(0x7f0000000200)=0x6e) recvmsg$unix(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f00000002c0)=""/217, 0xd9}, {&(0x7f00000003c0)}], 0x2, &(0x7f0000000540)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c00000000000000010000000200000043", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x40}, 0x2040) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) fcntl$getflags(r1, 0x408) 21:30:31 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x65, 0x0) 21:30:31 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1200, 0x0) [ 1679.874255] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:30:31 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r1, 0xc020660b, &(0x7f0000000040)) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x80, 0x81, 0x0, 0x9, 0x0, 0x81, 0x4, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000000000), 0xf}, 0xc0, 0xffffffffffffff81, 0x72, 0x6, 0xef, 0x8, 0x6, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, r1, 0x0) getdents(r0, &(0x7f0000000540)=""/126, 0x7e) 21:30:31 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:30:31 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x1fb, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1679.885017] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:30:31 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x78, 0x0) 21:30:31 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x2f00, 0x0) 21:30:31 executing program 5: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) 21:30:31 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x300, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:30:31 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x20001140, 0x0) 21:30:31 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x401}, 0x0, 0x7a, 0x0, 0x0, 0xf65}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) getdents(r0, &(0x7f0000000540)=""/126, 0x7e) 21:30:31 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) [ 1680.018853] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:30:31 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x7a, 0x0) 21:30:31 executing program 5: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) [ 1680.044447] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:30:45 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x2) 21:30:45 executing program 0: r0 = getpgid(0x0) syz_open_procfs(r0, &(0x7f0000000080)='net/ptype\x00') syz_open_procfs(r0, &(0x7f0000000640)='net/hci\x00') r1 = getpgid(0x0) syz_open_procfs(r1, &(0x7f0000000640)='net/hci\x00') r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000001140)=""/233, 0xe9) 21:30:45 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x88, 0x0) 21:30:45 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='ceph\x00', &(0x7f0000000000)={'syz', 0x1}, &(0x7f0000000180)=':\x15\x00U\x1bT;\xfa4qd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xf1G\xdb\xc2m\xb2w\b\xb7*\xd2\xa6\x84E\xef\xc1\x87\x8emv\xfdo\x83\';\f\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sq+48F\x9cX\x00'/118, 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:30:45 executing program 3: prctl$PR_GET_IO_FLUSHER(0x3a) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xc, 0xffffffffffffffff, 0xa) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) getdents(r0, &(0x7f0000000540)=""/126, 0x7e) chdir(&(0x7f0000000000)='./file0\x00') 21:30:45 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x500, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:30:45 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) [ 1693.310911] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:30:45 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) 21:30:45 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x3) 21:30:45 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x8a, 0x0) [ 1693.367596] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:30:45 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) 21:30:45 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0xc020660b, &(0x7f0000000040)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r1) r2 = syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r2, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:30:45 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x600, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:30:45 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x98, 0x0) 21:30:45 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x4) 21:30:45 executing program 3: ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000000)={0x3, 0x2937}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x100000000000}, 0x140, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) getdents(r0, &(0x7f0000000540)=""/126, 0x7e) 21:30:45 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x9a, 0x0) [ 1693.481625] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 1693.494626] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:30:58 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:30:58 executing program 0: r0 = getpgid(0x0) syz_open_procfs(r0, &(0x7f0000000080)='net/ptype\x00') syz_open_procfs(r0, &(0x7f0000000640)='net/hci\x00') getpgid(0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000001140)=""/233, 0xe9) 21:30:58 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x4, 0x4, 0x0, 0x0, 0x4305, 0x80400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = clone3(&(0x7f0000000340)={0x883e8d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r1) r2 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x480, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={&(0x7f0000000300), 0xe}, 0x0, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0x4000c, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) r3 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(r3, 0x0, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r4, 0xc020660b, &(0x7f0000000040)) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_OPENAT2={0x1c, 0x5, 0x0, r4, &(0x7f0000000180)={0x1, 0x4, 0xc}, &(0x7f00000001c0)='./file0\x00', 0x18, 0x0, 0x23456, {0x0, r5}}, 0xb3ee) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r2, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) [ 1707.050273] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:30:58 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x5) 21:30:58 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0xa8, 0x0) 21:30:58 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) getdents(r0, &(0x7f0000000540)=""/126, 0x7e) sendmmsg(0xffffffffffffffff, &(0x7f00000003c0)=[{{&(0x7f0000000000)=@l2tp={0x2, 0x0, @multicast1, 0x2}, 0x80, &(0x7f0000000100)=[{&(0x7f00000001c0)="6cda60d4870abef49646868248c197456bac6803cad74b492820c8fa49ff7a46041cd68a236734d167ba76a34c11b63460ee99512e19277098b8d3cb88c99070bb0863d44bb5b74f054a02221a8dd28a75a19980316e66711eda6454cc9c90c650a3ff159678d49bdd54e7949df5c8a2ea8a1169fb11a72eae3e61cc41df0b2fb66e76698b6b1da44a3cba72e3b606d91e92c210cc57e64d87bfa7c23eec6ac5068a6e6d637adae12fca5084614a7ddb40f56a516c592f3039d438c79b943f9d04e52b3dba888ab90aa496af609e", 0xce}, {&(0x7f00000002c0)="422a49a4d9c6718e50e73d16d0c198139597eb71e876ac4ad83a9e690fa2b60e950aaddbc2a6b0f64714a1d40fbd0ad8f66ec8efc8ef7eb76839c99c6c8d3aa492970f6074d339d4bd28a340f1834e362c04fde96c27241917b6965c3713f4fd9c4ffb7531d7d9935fac9e8607e85c66ed466167ae2aa9f959094a0e37dcc24146b46de805bceac65104a8223693853e3c9948c2221d525157148db75c7f35c8bea1c17519627efd7981101e36bd73b7f12731e020853574cb4bc492c46baa017400dbf65bccda8ad5a0397b83aa", 0xce}], 0x2, &(0x7f00000005c0)=[{0x48, 0x1, 0xfffffffc, "50da76a4edc03cdf310ddb93a4f986ecb2f42921f22905894636c85aebd52dc793e796b7155bf54313fdc50ebb3ee092ed56b73c9cdf2be9"}, {0xd8, 0x109, 0x3f, "f5c2403012aea62674eaeab478e9344e3149b662dea6b9c530ffeace20060a7f51cfe22ae1adea05ad90cb304441ab48223cfcbfcbd9390c7b6e221aacca4f6137d5169c480065373dde69d1aaebdfc5068a7522b48f9bcd99ff919e53fee01e1f5bdadfb10b970a1f9a955ae306499da21a3b77a7fa53304cd34c6ab97bfe31a73f631f0e6c457319525e8d31a284519e48c529a9eaca38741dcd21d46b1d615042564a07901eed4796d48e233427b365484b90aeaad2248df8bac64e0e1f9fb0acfcd0dbbb5298"}, {0xc8, 0x10d, 0x400, "b4ccea307a39977cb454deb3325c24173174e406bbb8160dd2c29d052e7fe66061b74801c92e219699c7754afeadac83d06f1a517f5e8c5e1a217583376325ba0bf3de7077f84c3432542a29b883b50f920ee08dfdf79a7e0dbe0bf0ab8e8a6bb59bb78e9c5cf0697dbd0fed736ce0d6863d678af3b884f2dc45dee4f82346fe12f44a3d71dc47787460fa75d0b46537c96585e2e13bd4a15c5dd6d68ce74aa3cf30c3ff44e83601e81eaadb34b27bb04be0cf10"}, {0xb8, 0x0, 0x4, "29d04632855c29b0ae95a026a020a199bdf700837e29e512a3d50a31d20aa8b2aa0574b18978f792a40b6be6766d68d331514d98712329351af159d44c5c39f96f1eed2e0caaad02317e8dfedee8bc6578701732ca64b18b57cd3a280cd0da633d459c66e9af52804ada787dc411050975412d3b421ea102a9a54097dea1146122f6b78e7f40a7f096dc3891c56243734257c8e7868369fee4fe285b751c52be0cfb455a68"}, {0x60, 0x117, 0x2, "a1d29d697ba972cd7defdec034faaccd9e550269181503d76568df62d40dd4a7395459adb91abf285c91c061a8ae2bbe861644dd822bb5e1cc09f4a867dd28a56f122b50b936708f0f187b"}, {0x80, 0x137, 0x200, "c23b9282588180eba7ab16bc72869c50172977b1f7d3ea50f16583915c100cbba9128ced8811b4831988a34bd94ba1c8bdf6759fd46c5806f49b9c187d8a32a126fc0b8f632011507d31818e225be16b3e827fad2c3957895d1231ae45d5bb533046260e6d0f9f312a5a"}, {0xd8, 0x88, 0x1, "f8b360368f4e1031feb10a26f4bac8fe60f362ab69659a28f724b31701bc007a9953070fa87977d53d702a6123847a3891f004a9a4a031023454b17c72a0ef1389a5357ef959792225718469946163c38300d7574437cdf45f4c8c2992b87591c3148bd267af7496a952be1029ad7c4a17b2b35789b72fdbc7c60748d3cd807996385381d938f806f884f10ee102036fe705e721620d474a54651beadb9e820bf6b97bf5bb5b104e85d80c7f3253fd190d55aac1ddd8b026618cd40b0092498ed5a6bb90b7cb0354"}, {0x68, 0x102, 0x7ff, "512554b75d0b62320fbc3623f65f334bc3ea327a53850d99fd8ba3e8bb5d228905314d22cc00bd6f88bd2f1e2cbeb4d3f7ec468b5ed24b67cede0b402aee17c98c13ceb4c160d7e90cb6bc72a359dab3a4"}, {0x70, 0x1e9, 0xfe, "7c6fd9b3f1c41085f840fb14c6399bb87a24bc46d30f92909d73b91f89a82425bb70dc03bb8a73546caab1bc28d4a22a8acd4443707a1550bd5e3aca33ff4e788efb70109af4e6466ae3d1bb13bbc89b62a0f80d80da13372f42"}, {0x18, 0xff, 0x6, "03c160fe5cf1c174"}], 0x548}}], 0x1, 0x440c0) 21:30:58 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) 21:30:58 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x700, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1707.056466] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:30:58 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) 21:30:58 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0xaa, 0x0) 21:30:58 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:30:58 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x900, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:30:58 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0xac, 0x0) 21:30:58 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) keyctl$set_reqkey_keyring(0xe, 0x5) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r1) r2 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x44000, 0x122) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x1e, r3, r0, r4, 0x1) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180), 0x107100) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r2, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:30:58 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x6) 21:30:58 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0xae, 0x0) 21:30:58 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0xb0, 0x0) [ 1707.248138] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 1707.261886] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:31:12 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:31:12 executing program 0: r0 = getpgid(0x0) syz_open_procfs(r0, &(0x7f0000000080)='net/ptype\x00') syz_open_procfs(r0, &(0x7f0000000640)='net/hci\x00') r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000001140)=""/233, 0xe9) 21:31:12 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r2 = openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r1, 0xc020662a, &(0x7f00000002c0)={0x100000001, 0x7, 0x3, 0x2, 0x4, [{0x100000000, 0x9, 0x7fff, '\x00', 0x2000}, {0x400, 0x7, 0xffffffffffffff95, '\x00', 0x2008}, {0x9455, 0x8, 0x1, '\x00', 0x182}, {0x6, 0x8000, 0x20, '\x00', 0x401}]}) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0xf}, 0x10140, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$CDROM_LOCKDOOR(r2, 0x5329, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:31:12 executing program 3: ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x5}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, @perf_config_ext={0x80000000000}, 0x4}, 0x0, 0x0, r0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) getdents(r1, &(0x7f0000000540)=""/126, 0x7e) 21:31:12 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0xf00, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:31:12 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0xb2, 0x0) 21:31:12 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) 21:31:12 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x7) [ 1721.176941] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 1721.188850] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:31:12 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0xb4, 0x0) 21:31:12 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x8) 21:31:12 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x1a7b, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:31:13 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0xb9, 0x0) [ 1721.274634] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:31:13 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) 21:31:13 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0xbb, 0x0) [ 1721.297050] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:31:13 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0xbd, 0x0) 21:31:13 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x5, 0x8, 0x40, 0xc7, 0x0, 0x4, 0x10020, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x1, 0x1}, 0x40, 0x8, 0x434b4ec7, 0x5, 0x2, 0x7, 0xfff, 0x0, 0x6, 0x0, 0xff}, 0x0, 0x4, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) getdents(r2, &(0x7f0000000540)=""/126, 0x7e) 21:31:13 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:31:26 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0xa) 21:31:26 executing program 0: r0 = getpgid(0x0) syz_open_procfs(r0, &(0x7f0000000080)='net/ptype\x00') r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000001140)=""/233, 0xe9) 21:31:26 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0x541b, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) getdents(r1, &(0x7f0000000540)=""/126, 0x7e) 21:31:26 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0xc0, 0x0) 21:31:26 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x4800, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1734.909006] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:31:26 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='mounts\x00') r2 = syz_open_dev$hiddev(&(0x7f00000002c0), 0xc5de, 0x80) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r3, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x204000, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB="2c776620d6b1af7a8f1ca2039464aa63cef89439dc6e6f3d", @ANYRESHEX=r2, @ANYBLOB=',privport,privport,aname=dns_resolver\x00,posixacl,defcontext=system_u,euid<', @ANYRESDEC=r3, @ANYBLOB=',dont_appraise,smackfshat=dns_resolver\x00,rootcontext=root,fsname=\x00,dont_appraise,\x00']) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r4 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r4, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:31:26 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) 21:31:26 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r0, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) [ 1734.928329] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:31:26 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0xc2, 0x0) 21:31:26 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x10) 21:31:26 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r0, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:31:26 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x4c00, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:31:26 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) [ 1735.016257] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 1735.018624] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:31:26 executing program 3: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000, 0x4}, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x94}, 0x0, 0x4000, 0xffffffffffffffff, 0xc) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) getdents(r0, &(0x7f0000000540)=""/126, 0x7e) r1 = getpgid(0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0xc020660b, &(0x7f0000000040)) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x86, 0x5d, 0x2, 0x9, 0x0, 0x7, 0x40010, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x401, 0x0, @perf_config_ext={0x5, 0x3}, 0xc004, 0x3, 0xfffffff7, 0x7, 0xf6a, 0x7f, 0x6, 0x0, 0x4, 0x0, 0x80000000}, r1, 0xc, r2, 0x0) [ 1748.637623] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 1748.652195] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:31:40 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0xc3, 0x0) 21:31:40 executing program 0: getpgid(0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000001140)=""/233, 0xe9) 21:31:40 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) 21:31:40 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x6800, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:31:40 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x48) 21:31:40 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r0, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:31:40 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:31:40 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) getdents(r0, &(0x7f0000000540)=""/126, 0x7e) getdents64(r0, &(0x7f0000000000)=""/33, 0x21) 21:31:40 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0xc4, 0x0) 21:31:40 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x4c) 21:31:40 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x6c00, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:31:40 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2000009, 0x80010, r0, 0x52e02000) ioctl$EXT4_IOC_GROUP_ADD(r1, 0xc020660b, &(0x7f0000000040)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0xc020660b, &(0x7f0000000040)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, &(0x7f00000001c0)=ANY=[@ANYBLOB="05008ab057e632b8d1118dcd90df43494edf3cb76843b4eb8cb82393fa2db477b43811c6c410dd103344744377dff6b08563cbee", @ANYRES32, @ANYBLOB="06000000000000002e2f66696c653000"]) getdents(r1, &(0x7f0000000280)=""/144, 0x90) [ 1748.739525] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 1748.749671] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:31:40 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0xc6, 0x0) 21:31:40 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r0, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:31:40 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) 21:31:40 executing program 6: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r2) r3 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) kcmp(r1, r1, 0x3, r4, r5) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r3, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) fcntl$setflags(r0, 0x2, 0x1) lseek(r6, 0x101, 0x1) 21:31:40 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0xc8, 0x0) 21:31:54 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x7400, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:31:54 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000001140)=""/233, 0xe9) [ 1762.297014] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 1762.317499] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:31:54 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r0, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:31:54 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0xca, 0x0) 21:31:54 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x68) 21:31:54 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000240)=ANY=[]) getdents(r0, &(0x7f0000000540)=""/126, 0x7e) 21:31:54 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f00000002c0)=0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r4, 0xc020660b, &(0x7f0000000040)) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x37, 0x1f, 0x9, 0x2c, 0x0, 0x9, 0x1040, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x4, @perf_bp={&(0x7f0000000180), 0x9}, 0x2000, 0x6, 0x55, 0x3, 0x2, 0x101, 0x8, 0x0, 0x1}, r3, 0x800, r4, 0x8) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:31:54 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[]) [ 1762.336103] FAT-fs (loop3): bogus number of reserved sectors [ 1762.336882] FAT-fs (loop3): Can't find a valid FAT filesystem [ 1762.362804] FAT-fs (loop3): bogus number of reserved sectors [ 1762.363754] FAT-fs (loop3): Can't find a valid FAT filesystem 21:31:54 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x7a00, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1762.403581] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 1762.412179] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:31:54 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[]) 21:31:54 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0xcc, 0x0) 21:31:54 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9}, 0x10000, 0x0, 0x0, 0xb, 0x1, 0x0, 0x0, 0x0, 0x8000, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FICLONE(r0, 0x40049409, r0) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x1f, 0x0, 0x3, 0x5d, 0x0, 0x1ff, 0x40840, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x6}, 0x1408, 0x800, 0x7, 0x5, 0xd82, 0x9, 0x8, 0x0, 0xfff, 0x0, 0x40}, 0x0, 0x7, 0xffffffffffffffff, 0x1) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) getdents(r1, &(0x7f0000000540)=""/126, 0x7e) 21:31:54 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x6c) 21:31:54 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x7b1a, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:31:54 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f00000022c0), 0x2, 0x3) socket$packet(0x11, 0x3, 0x300) r2 = openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg$unix(r2, &(0x7f00000010c0)=[{{&(0x7f00000002c0), 0x6e, &(0x7f0000000600)=[{&(0x7f0000000340)=""/111, 0x6f}, {&(0x7f0000000500)=""/199, 0xc7}, {&(0x7f00000003c0)=""/127, 0x7f}, {&(0x7f0000000440)=""/10, 0xa}, {&(0x7f0000001280)=""/4096, 0x1000}], 0x5, &(0x7f0000000680)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}], 0x20}}, {{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/248, 0xf8}], 0x1, &(0x7f0000000800)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xe8}}, {{&(0x7f0000000940), 0x6e, &(0x7f0000000b00)=[{&(0x7f00000009c0)=""/3, 0x3}, {&(0x7f0000000a00)=""/29, 0x1d}, {&(0x7f0000000a40)=""/157, 0x9d}], 0x3, &(0x7f0000000b40)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xd8}}, {{&(0x7f0000000c40)=@abs, 0x6e, &(0x7f0000000e40)=[{&(0x7f0000000cc0)=""/52, 0x34}, {&(0x7f0000000d00)=""/38, 0x26}, {&(0x7f0000000d40)=""/201, 0xc9}], 0x3, &(0x7f0000000e80)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x90}}, {{&(0x7f0000000f40)=@abs, 0x6e, &(0x7f0000001080)=[{&(0x7f0000000fc0)=""/149, 0x95}], 0x1}}], 0x5, 0x100, &(0x7f0000002280)={0x0, 0x3938700}) chown(&(0x7f0000000180)='./file0\x00', 0xee01, r3) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) [ 1762.502805] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:31:54 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0xcd, 0x0) [ 1762.517145] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:31:54 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r0, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) [ 1775.945843] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 1775.949019] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:32:07 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[]) 21:32:07 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, 0x0, 0x0) read(r0, &(0x7f0000001140)=""/233, 0xe9) 21:32:07 executing program 6: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r2) r4 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ADD_IFACE(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16, @ANYBLOB="010000000000000000002100000009001f00706879310000000005002000010000000c000500000000000000f481"], 0x34}}, 0x0) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x3c, r3, 0x0, 0x70bd29, 0x25dfdbfe, {}, [@IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_TYPE={0x5, 0x33, 0x8}, @IEEE802154_ATTR_LLSEC_CMD_FRAME_ID={0x5, 0x34, 0x5e}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_LLSEC_CMD_FRAME_ID={0xfffffffffffffe79, 0x34, 0x2}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000041) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7fff}, 0x20, 0x4}, r1, 0x4000000, r0, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r4, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) r6 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r6, 0x541b, 0x0) fsync(r6) 21:32:07 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0xc020660b, &(0x7f0000000040)) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x5, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, @perf_bp={&(0x7f00000001c0), 0x9}, 0x0, 0xfffffffffffffffe, 0x2000000, 0x0, 0x0, 0x7fff, 0x9}, 0x0, 0x12, r0, 0xb) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) getdents(r1, &(0x7f0000000540)=""/126, 0x7e) getdents64(r1, &(0x7f0000000000)=""/111, 0x6f) 21:32:07 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x8100, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:32:07 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x74) 21:32:07 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:32:07 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0xce, 0x0) 21:32:07 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0xf000, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1775.997557] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:32:07 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, 0x0, 0x0) read(r0, &(0x7f0000001140)=""/233, 0xe9) [ 1776.011403] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:32:07 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x7a) 21:32:07 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) [ 1788.827145] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 1788.860226] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:32:20 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0xfb01, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:32:20 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:32:20 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x300) 21:32:20 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) getdents(r0, &(0x7f0000000540)=""/126, 0x7e) getdents64(r0, &(0x7f00000001c0)=""/204, 0xcc) 21:32:20 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) 21:32:20 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0xdc, 0x0) 21:32:20 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$IEEE802154_ASSOCIATE_REQ(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x1c, r1, 0x800, 0x70bd28, 0x25dfdbfd, {}, [@IEEE802154_ATTR_CAPABILITY={0x5, 0x11, 0xe}]}, 0x1c}}, 0x40) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x38, r1, 0x200, 0x70bd25, 0x25dfdbfb, {}, [@IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_LLSEC_FRAME_TYPE={0x5, 0x33, 0x7}, @IEEE802154_ATTR_DEV_INDEX={0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x24004080}, 0x20008000) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r2 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r2, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f0000000180)={'wpan1\x00'}) 21:32:20 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, 0x0, 0x0) read(r0, &(0x7f0000001140)=""/233, 0xe9) 21:32:20 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0xde, 0x0) 21:32:20 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x80000, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:32:20 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x500) 21:32:20 executing program 0: openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(0xffffffffffffffff, &(0x7f0000001140)=""/233, 0xe9) [ 1788.935474] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 1788.941285] FAT-fs (loop5): bogus number of reserved sectors [ 1788.942034] FAT-fs (loop5): Can't find a valid FAT filesystem [ 1788.946245] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:32:20 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:32:20 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0xe0ffff, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:32:20 executing program 6: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = add_key$fscrypt_provisioning(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x1}, &(0x7f00000002c0)={0x4911c569f2e8d838, 0x0, @b}, 0x48, r1) r4 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r3, r4, r1, 0x1) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r2) r5 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x5, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r5, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:32:20 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0xec, 0x0) 21:32:20 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) 21:32:20 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0xc020660b, &(0x7f0000000040)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0xfffffff8}}, './file0/file0\x00'}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x88, 0x40, 0x81, 0x3, 0x0, 0x8, 0x82, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x800, 0x1, @perf_bp, 0x400, 0x3, 0x5acb, 0x6, 0x7fff, 0x40, 0x4, 0x0, 0xbaa, 0x0, 0x3f}, 0x0, 0xf, r0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) getdents(r1, &(0x7f0000000540)=""/126, 0x7e) [ 1789.028290] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 1789.053807] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 1789.094348] FAT-fs (loop3): Unrecognized mount option "" or missing value [ 1789.098472] FAT-fs (loop5): bogus number of reserved sectors [ 1789.099322] FAT-fs (loop5): Can't find a valid FAT filesystem [ 1789.130003] FAT-fs (loop3): Unrecognized mount option "" or missing value 21:32:33 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:32:33 executing program 0: openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(0xffffffffffffffff, &(0x7f0000001140)=""/233, 0xe9) 21:32:33 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x2000000000000000}, 0x0, 0x4, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) getdents(r0, &(0x7f0000000540)=""/126, 0x7e) 21:32:33 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) 21:32:33 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0xf0ffff, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1801.977488] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:32:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0xee, 0x0) 21:32:33 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpgid(0x0) syz_open_procfs(r0, &(0x7f0000000640)='net/hci\x00') perf_event_open(&(0x7f0000000940)={0x2, 0x80, 0x79, 0x9, 0x0, 0x1, 0x0, 0x40, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000880), 0xc}, 0x8001, 0x0, 0x8, 0x1, 0x3, 0x0, 0x6, 0x0, 0x5, 0x0, 0x3}, r0, 0x6, 0xffffffffffffffff, 0xb) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r1) r2 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = syz_mount_image$iso9660(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x9, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="6a70d0ff9b273d276bc890417687cc7b44aa4dd78346e719fcb2ada56c96691e1c4f8dfd606f8c510c082317e4102e7d0f7370bb7045fabafc7fdda172d8145de2e88f49ae56ebcd9cab5f802ab7ea0622dd728aeea0d32b4b7e5d7bb81055d5e67cc15a05eba4c8974cf022ccdf98009adfcd0d4fab553e5a99f42d29d0ff115adc228dbc1ddcbdc65b6f910c084d535be5f8e9451f540ed4dc0b2e835339df491389b5e7537602b62f5b78678dd7ac43c6b3719ab73cdc4b", 0xb9, 0x5}, {&(0x7f0000000380)="aefbd5f426c2146675862f5967a4952480218683ecba23de296bb777f25050d6ffa5f5b48590b44e2113f84dded334d5449477a8c24d8dffcfdc19df2cd5346959e412587c9574c987b50bdd2d062037ffb9544a76313937e30136506b93d4f96363376540f55a26b18c58336c2f1f39d985040d5e4edd39137bc5e19377b275513af9433a7311feb50e0610866ebcfec6f2e1299881a72b6822db40441a29f7f3ff6bfebcdeb0b5848cb5bb919c30790f6855453e7f0ba8722590b5c9c6df5d9cf1b2903f2acddc9fa91d2743b61716904ade234b4ac7f78ef0628d", 0xdc, 0x3}, {&(0x7f0000000500)="09c6d899cced265d77739dbfc2b90979ea0065ab3d60b42e9b280d0c033bbbaf59ae0a285c707d82c07399f385971d4691c0e89f68f293556bf8a380858f8fb8411ee7754b80b2c8542bbe0012c188c48a973ff4be46", 0x56, 0x29d90ab}, {&(0x7f0000000200)="2ff1b574064950c58c1f9b927c5f9082c6e0d7479534ca6c98b06056697dd466106a7818d2d1f898798b6aa7f2c8cc", 0x2f, 0xfffffffffffffff8}, {&(0x7f0000000580)="2a277bff85a44455a85b597f975ad8882d1749a673111b916dcba73300b8f5ea83924c28266f96f27d50d6a813f3f86452c810966ea141d6ef44", 0x3a, 0x101}, {&(0x7f00000005c0)="bb4cc99d66b6b4cad118b0953d75c5f744efd00cad23d53ae5ca5c7c4a90ff5713faff20938d7a361763a2ee708d457a370910101845a99903e54b4ba21687c872a53e7b647fd6a52d428950d6fa7ac00ea7e208c9fe04044883f665abac9172aa4d61baaa03ae9da565c46225627346f6db6a8778fe6073f649278be04ca7649d49254a3dabde0d41aaeea186e5a39ca34ce2f48564e66bce00fca4a4093c70fc4a8e5253b644db464ccec48d32102dd5e077ef00c0203449a1848a49eae8c961694de87c52a408b3f827b32b18fe5b5043191bed17f5e9584e7473b7b5024cb2ff5823740d033f70bab5c4d21889b28327dfc3e169ae8a0e8c14", 0xfb, 0xbd8b}], 0x882400, &(0x7f0000000780)={[{@uid={'uid', 0x3d, 0xee01}}, {@map_off}, {@cruft}, {@check_strict}, {@check_relaxed}, {@hide}, {}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}, {@unhide}], [{@smackfsfloor={'smackfsfloor', 0x3d, '-['}}]}) pwrite64(r3, &(0x7f0000000800)="8871000733b3b742820e94c1a2ffe24d9f671a05a0c1591daa9995980829d2e0e72c148cee62a8893b9740ddf54d7594345627efb4935a79946ac1913fd6f940e470840253ea672657539f343e10", 0x4e, 0x3ff) faccessat2(r2, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:32:33 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x600) 21:32:33 executing program 0: openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(0xffffffffffffffff, &(0x7f0000001140)=""/233, 0xe9) [ 1802.000137] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 1802.009977] FAT-fs (loop5): bogus number of reserved sectors [ 1802.010907] FAT-fs (loop5): Can't find a valid FAT filesystem 21:32:33 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x700) 21:32:33 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:32:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0xfb, 0x0) 21:32:33 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0}], 0x0, &(0x7f0000000240)=ANY=[]) 21:32:33 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x1000000, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:32:33 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, 0x0, 0x0) [ 1802.116943] FAT-fs (loop5): bogus number of reserved sectors [ 1802.118279] FAT-fs (loop5): Can't find a valid FAT filesystem [ 1802.121344] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:32:33 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r1, 0xc020660b, &(0x7f0000000040)) openat(r1, &(0x7f0000000000)='./file0\x00', 0x26e541, 0xa) getdents(r0, &(0x7f0000000540)=""/126, 0x7e) 21:32:33 executing program 6: perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x10, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x1, 0x8, 0x9, 0x80, 0x0, 0x6, 0x80148, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xc03c, 0x0, @perf_bp={&(0x7f0000000580), 0x8}, 0x81, 0xfffffffffffff001, 0x80000001, 0x4, 0x5, 0x3ff, 0x81, 0x0, 0x401, 0x0, 0x9}, 0x0, 0x200000000000c, 0xffffffffffffffff, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r1) perf_event_open(&(0x7f0000000500)={0x4, 0x80, 0xf2, 0x6, 0x7, 0x6, 0x0, 0xfff, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, @perf_bp={&(0x7f0000000440), 0x3}, 0x3000, 0x2, 0x8001, 0x2, 0x6000000000000000, 0x3f, 0x7ff, 0x0, 0x3, 0x0, 0x7}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0xf) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r2, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_START_REQ(r3, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x24, 0x0, 0x400, 0x70bd29, 0x25dfdbff, {}, [@IEEE802154_ATTR_CHANNEL={0x5, 0x7, 0x19}, @IEEE802154_ATTR_COORD_REALIGN={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x9074}, 0x90) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x7, 0x20, 0x65, 0x0, 0x6, 0x311, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000180), 0xb}, 0x1c01, 0x8000, 0x8, 0x6, 0xaad0, 0xfff, 0x7, 0x0, 0x4, 0x0, 0x8}, r0, 0xc, 0xffffffffffffffff, 0x2) [ 1802.136745] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:32:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0xfd, 0x0) 21:32:33 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0xa00) 21:32:33 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0}], 0x0, &(0x7f0000000240)=ANY=[]) 21:32:33 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x2000000, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1802.224275] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 1802.237671] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 1802.315744] FAT-fs (loop5): bogus number of reserved sectors [ 1802.316601] FAT-fs (loop5): Can't find a valid FAT filesystem 21:32:47 executing program 1: clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:32:47 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x10b, 0x0) 21:32:47 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0}], 0x0, &(0x7f0000000240)=ANY=[]) 21:32:47 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x1f00) 21:32:47 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r2) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r2) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:32:47 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x5, 0x6, &(0x7f0000000400)=[{&(0x7f00000001c0)="4c9bf62e0a14363f34ab18a8ad1d1d134397e2db4393b71252b3e6a4a68ae87bd948c200aa10f7a98e4ad784d373183c8894dfd9832a51101b2d41d0443cdeedbb37476b5ce83972eb0a3e39718d7d2e3c5da7bc1968fa56e926d77dd191edb8903b6104a55c82fc575971b27527f6c8e4641d71", 0x74, 0xfffffffffffffbff}, {&(0x7f0000000100)="af1810f1054d737e32a39afedd", 0xd, 0x1fffc0000}, {&(0x7f0000000240)="1a84a850d51ed6149cbdbe883c72d9089e8a1cbd02b51d88fb343d08a79f349c20e6e2e410fcb43fa8a190fdb790be6fbaefb3ae288f1517723b392580fcba84a832d238215b78b71028ade101fc1b24f448b449fdf6cfa85c07f554b8eae9767bd0990ee1ea1d8b92309c51de5dd42433c3b404f9593f52d76d8abb331e95ac2e8993bb529f4376990374429e556d9c53e700ea2fddefb89114aa87d11f51cb56bcf2e63a571980e04dbd", 0xab, 0x3}, {&(0x7f0000000300)="00635aeced361fb2264d77655867e4f67a188dd5e25d3742f89b959e9390fa9d78857f55cbf7d2d6e9bc4bd7782682b2b71fba36eb361ffdfdbb1df6458d2e099816e9265ff23f3cdd8e156c7d0f64fdd67a5427032df324dce2199637baf2958f24", 0x62}, {&(0x7f0000000380)="f1eda4b8946068c8a8ca71abbb7f5e7d2908b8253b79925e93a6ebae97b8f7488bfb0e34747184ec2128ce266eec5d59bb83b85f8898ea0d4e53fc8426cea73fa66ec76f14540dba386aa1504410b743d4cac1411ec11325d3179c5f78038d712ac368f1120453a89580fd5b793da2c7f64b04b1026835c7ae28", 0x7a, 0x41e}, {&(0x7f00000005c0)="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", 0x1000, 0x1c}], 0x20008, &(0x7f0000001600)=ANY=[@ANYBLOB='utf8=1,utf8=0,shortname=mixed,uid=', @ANYRESDEC=0x0, @ANYBLOB=',dont_hash,func=FILE_MMAP,dont_appraise,subj_use2=\x00,\x00']) r2 = openat(r1, &(0x7f00000015c0)='./file0\x00', 0x100, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r2, 0xc018937e, &(0x7f0000000500)={{0x1, 0x1, 0x18, r1, @out_args}, './file0\x00'}) readlinkat(r3, &(0x7f0000001680)='./file1\x00', &(0x7f0000001e00)=""/4096, 0x1000) getdents(r0, &(0x7f0000000540)=""/126, 0x7e) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r4, 0xc020660b, &(0x7f0000000040)) openat(r4, &(0x7f00000004c0)='./file0\x00', 0x82, 0x19) 21:32:47 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x3000000, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:32:47 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, 0x0, 0x0) [ 1815.520595] FAT-fs (loop5): bogus number of reserved sectors [ 1815.521421] FAT-fs (loop5): Can't find a valid FAT filesystem 21:32:47 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x2000) 21:32:47 executing program 1: clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:32:47 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x10d, 0x0) [ 1815.586277] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 1815.598664] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:32:47 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, 0x0, 0x0) 21:33:00 executing program 3: r0 = getpgid(0x0) syz_open_procfs(r0, &(0x7f0000000640)='net/hci\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, r0, 0xb, 0xffffffffffffffff, 0x9) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x100, 0x2, &(0x7f00000003c0)=[{&(0x7f00000001c0)="763e5c384e45ca62507bcc29f31baf3744ffad4d4de209b0b2ed803bd1b388c1aa8a53474dd2b41c172382cfe832fc9d8aefea77640054643f47e2b02953bdffb5327c93ab1b8dc601aa883b4878dddb75c6ff3a65c5f97688d83c076c68bf1f37e81f23733c4cf682231f2e7a9fe88a794624d3deeacb037edbf6134104fc68f9dd1e51c093979365c58ca3482d33ef5790c6d546c0debf54a2a8175465625b2c6406f07203b38f408c361d4ee0dfb84c91d3aeb48671d08b161ada5da968ab2387afd55e2d3eac0c2a7008f6", 0xcd, 0x1}, {&(0x7f00000002c0)="e95d6e4ba24debdbfbe3ecda53a45fe7ac6147471774889518b2b8782f7ed5e814e435703d01588502010002d863980b84d9ee5b92f3dd5092d4640eeeee1cb6e35c07c54d38d49f4444ebfa4742789ac2043433f807fdda95fa2d4b57a6fa26ba9a2679b9e2a30080e44a8027ab32f9110c585cfe9fc7e113392c68136379d489ffebf13dfdd1873b6220cb3f71b867ee6fdba77f032c5382cce042c905cf9020925fe8bd0a9c231d98f7d743fb28e32763c30b5473f68fb6a713cbdb3f187b372fd7f1", 0xc4, 0x9}], 0x801002, &(0x7f0000000400)={[{@hide}], [{@pcr={'pcr', 0x3d, 0x31}}, {@context={'context', 0x3d, 'unconfined_u'}}]}) getdents(r1, &(0x7f0000000540)=""/126, 0x7e) openat(r1, &(0x7f0000000000)='./file0\x00', 0x10000, 0xe7) 21:33:00 executing program 1: clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:33:00 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:33:00 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x4000000, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:33:00 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) 21:33:00 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x11b, 0x0) 21:33:00 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x4800) 21:33:00 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x600) [ 1828.915551] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 1828.919619] FAT-fs (loop5): bogus number of reserved sectors [ 1828.921462] FAT-fs (loop5): Can't find a valid FAT filesystem [ 1828.921913] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:33:00 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x5000000, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:33:00 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x4c00) 21:33:00 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:33:00 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x600) 21:33:00 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x11d, 0x0) [ 1829.028718] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:33:00 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) [ 1829.053782] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:33:00 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x600) 21:33:00 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) keyctl$set_reqkey_keyring(0xe, 0x5) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:33:00 executing program 3: keyctl$describe(0x6, 0x0, &(0x7f00000005c0)=""/4096, 0x1000) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$link(0x8, 0x0, 0xfffffffffffffffd) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x6, 0x7f, 0xef, 0x9, 0x0, 0x7b, 0x2441, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffa, 0x1, @perf_config_ext={0x339, 0x8}, 0x2a02, 0x8, 0x0, 0x5, 0xd0, 0x4, 0x1, 0x0, 0x1, 0x0, 0x9}, 0x0, 0x1, r2, 0x0) getdents(r1, &(0x7f0000000540)=""/126, 0x7e) 21:33:00 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x6000000, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1829.161245] FAT-fs (loop5): bogus number of reserved sectors [ 1829.162185] FAT-fs (loop5): Can't find a valid FAT filesystem [ 1829.219999] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 1829.240358] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:33:14 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x6800) 21:33:14 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x62, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0xe0, 0x4b, 0xad, 0x20, 0x0, 0x3, 0x41000, 0x8, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_config_ext={0x9, 0xfffffffffffffffc}, 0x4108d, 0x3, 0x17c, 0x4, 0x7f, 0x3, 0x1c, 0x0, 0xfffffff7, 0x0, 0x8001}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x1) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000200), 0x8000, 0x0) 21:33:14 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:33:14 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) mount$9p_rdma(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), 0x800010, &(0x7f0000000240)={'trans=rdma,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@rq={'rq', 0x3d, 0x2}}]}}) openat(r0, &(0x7f0000000280)='./file1\x00', 0x0, 0x80) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x10) openat(r1, &(0x7f0000000340)='./file1\x00', 0x441, 0x48) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0xc020660b, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) utimensat(r2, &(0x7f0000000380)='./file1/file0\x00', &(0x7f0000000400)={{0x0, 0x2710}, {r3, r4/1000+60000}}, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r1, 0xc020660b, &(0x7f0000000040)) getdents(r1, &(0x7f0000000540)=""/126, 0x7e) r5 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0), 0x210c00, 0x0) openat(r5, &(0x7f0000000300)='./file0\x00', 0x410001, 0x6d238b5cb5e177cb) 21:33:14 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) 21:33:14 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x12b, 0x0) 21:33:14 executing program 0: pread64(0xffffffffffffffff, &(0x7f0000000140)=""/4096, 0x1000, 0x600) 21:33:14 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x7000000, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1842.792021] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 1842.794460] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 1842.817415] FAT-fs (loop5): bogus number of reserved sectors [ 1842.818262] FAT-fs (loop5): Can't find a valid FAT filesystem 21:33:14 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x6c00) [ 1842.825432] 9pnet: Could not find request transport: rdma 21:33:14 executing program 0: pread64(0xffffffffffffffff, &(0x7f0000000140)=""/4096, 0x1000, 0x600) 21:33:14 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x12d, 0x0) [ 1842.841541] 9pnet: Could not find request transport: rdma 21:33:14 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) [ 1858.611287] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:33:30 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x9000000, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:33:30 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x13b, 0x0) 21:33:30 executing program 0: pread64(0xffffffffffffffff, &(0x7f0000000140)=""/4096, 0x1000, 0x600) 21:33:30 executing program 1: perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:33:30 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x7400) 21:33:30 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0x541b, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) dup2(r0, r1) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) r3 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r3, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:33:30 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{0x0}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) 21:33:30 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) getdents(r1, &(0x7f0000000540)=""/126, 0x7e) umount2(&(0x7f0000000000)='./file0\x00', 0x4) fallocate(r0, 0x0, 0x4, 0x100000000) [ 1858.631766] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:33:30 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x7a00) 21:33:30 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x13d, 0x0) 21:33:30 executing program 0: r0 = syz_open_procfs(0x0, 0x0) pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x600) 21:33:30 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0x541b, 0x0) r2 = dup(r1) r3 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r3, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0x541b, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r2, 0xc0189378, &(0x7f0000000180)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file0\x00'}) [ 1858.680315] FAT-fs (loop5): bogus number of reserved sectors [ 1858.681082] FAT-fs (loop5): Can't find a valid FAT filesystem 21:33:30 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0xf000000, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:33:30 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x80000) 21:33:30 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x13e, 0x0) [ 1858.749515] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 1858.751816] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:33:30 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1002, 0x0) 21:33:30 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{0x0}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) 21:33:30 executing program 0: r0 = syz_open_procfs(0x0, 0x0) pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x600) 21:33:30 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1003, 0x0) [ 1858.845732] FAT-fs (loop5): bogus number of reserved sectors [ 1858.846507] FAT-fs (loop5): Can't find a valid FAT filesystem 21:33:43 executing program 1: perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:33:43 executing program 6: r0 = openat2(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x4001, 0x52, 0x10}, 0x18) perf_event_open(&(0x7f0000000480)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x40188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000200), 0x16}, 0x0, 0x40000000000, 0x2, 0x0, 0xfffffefffffffffd}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = getpgid(0x0) syz_open_procfs(r1, &(0x7f0000000640)='net/hci\x00') perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0xfd, 0x40, 0xa3, 0x6, 0x0, 0x3, 0x42, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x9, 0x4, @perf_bp={&(0x7f00000000c0), 0x3}, 0x280, 0x4, 0x1, 0x1, 0x4, 0x100, 0x20, 0x0, 0x9, 0x0, 0x6}, r1, 0x2, 0xffffffffffffffff, 0xa) r2 = clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0x1) syz_open_procfs(r2, &(0x7f0000000080)='fdinfo/3\x00') syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x88) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) keyctl$set_reqkey_keyring(0xe, 0x7) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000380)=r3, 0x1) 21:33:43 executing program 0: r0 = syz_open_procfs(0x0, 0x0) pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x600) 21:33:43 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) getdents(r0, &(0x7f0000000540)=""/126, 0x7e) 21:33:43 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x48000000, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:33:43 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x100000) 21:33:43 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1004, 0x0) 21:33:43 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{0x0}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) 21:33:43 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1009, 0x0) [ 1872.075927] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 1872.079113] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 1872.122805] FAT-fs (loop5): bogus number of reserved sectors [ 1872.123708] FAT-fs (loop5): Can't find a valid FAT filesystem 21:33:57 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1400, 0x0) 21:33:57 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2}, 0x80, 0x0}}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) r2 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(r2, 0x0, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80000001) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_READ_FIXED={0x4, 0x2, 0x4007, @fd_index=0x8, 0x100, 0x1, 0x8e0, 0xf, 0x0, {0x4}}, 0x9) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random='\t\x00'}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:33:57 executing program 0: syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(0xffffffffffffffff, &(0x7f0000000140)=""/4096, 0x1000, 0x600) 21:33:57 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x4c000000, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1885.360542] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:33:57 executing program 1: perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:33:57 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) 21:33:57 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) getdents(r1, &(0x7f0000000540)=""/126, 0x7e) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r3 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r3, 0x9, 0x0, 0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000280)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index, 0x0, 0x0, 0x0, {}, 0x0, {0x0, r6}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_EPOLL_CTL=@mod={0x1d, 0x1, 0x0, r2, &(0x7f0000000040), r1, 0x3, 0x0, 0x0, {0x0, r6}}, 0x80000000) 21:33:57 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x1000000) [ 1885.419454] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:33:57 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x4100, 0x0) 21:33:57 executing program 0: syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(0xffffffffffffffff, &(0x7f0000000140)=""/4096, 0x1000, 0x600) 21:33:57 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x2000000) 21:33:57 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x68000000, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:33:57 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) keyctl$set_reqkey_keyring(0xe, 0x6) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x6, 0x0, 0x0, 0x0, 0x4000c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x8000, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0x541b, 0x0) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r3, 0x541b, 0x0) dup2(r2, r3) [ 1885.566741] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 1885.569285] FAT-fs (loop5): bogus number of reserved sectors [ 1885.570102] FAT-fs (loop5): Can't find a valid FAT filesystem [ 1885.581179] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:33:57 executing program 0: syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(0xffffffffffffffff, &(0x7f0000000140)=""/4096, 0x1000, 0x600) 21:33:57 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x20001140, 0x0) 21:33:57 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x3000000) 21:33:57 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) 21:33:57 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) getdents(r0, &(0x7f0000000540)=""/126, 0x7e) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000040)={&(0x7f00000001c0)=@expire={0x284, 0x18, 0x100, 0x70bd26, 0x25dfdbfc, {{{@in6=@mcast1, @in6=@dev={0xfe, 0x80, '\x00', 0x2e}, 0x4e22, 0x2, 0x4e22, 0x7, 0x2, 0x80, 0xa0, 0x2f, 0x0, 0xffffffffffffffff}, {@in=@rand_addr=0x64010102, 0x4d4, 0x33}, @in6=@dev={0xfe, 0x80, '\x00', 0x1f}, {0x2, 0x1000, 0xff, 0x3, 0x1000, 0x20, 0xffff, 0x6}, {0x2, 0x6078, 0xf34, 0x3ff}, {0x5, 0x3, 0x479}, 0x70bd29, 0x3505, 0x0, 0x1, 0x3f, 0x80}, 0x1}, [@tmpl={0x184, 0x5, [{{@in6=@private2, 0x4d6, 0x33}, 0xa, @in=@local, 0x3502, 0x1, 0x3, 0x0, 0x4, 0x3ff, 0x8}, {{@in=@multicast1, 0x4d5, 0x5e}, 0x2, @in6=@empty, 0x34ff, 0x1, 0x3, 0x5, 0x80, 0x1, 0x1f}, {{@in6=@loopback, 0x4d4, 0x6c}, 0x2, @in6=@mcast1, 0x3501, 0x0, 0x3, 0x93, 0xb2d4, 0x8000, 0x2}, {{@in=@local, 0x4d5, 0x32}, 0xa, @in6=@dev={0xfe, 0x80, '\x00', 0x31}, 0x34ff, 0x3, 0x3, 0x4, 0x8, 0x28000, 0x10000}, {{@in6=@private2, 0x4d3, 0xff}, 0xa, @in=@multicast1, 0x3504, 0x3, 0x3, 0x4, 0x0, 0xfffffffd, 0x9}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x33}, 0xa, @in=@multicast2, 0x0, 0x4, 0x0, 0x0, 0x7, 0xb9b7, 0xb05d}]}, @extra_flags={0x8, 0x18, 0x1}]}, 0x284}, 0x1, 0x0, 0x0, 0x20000001}, 0x40010) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x191640, 0x0) 21:33:57 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x6c000000, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:33:57 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002740), 0xffffffffffffffff) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_EEE_SET(r2, &(0x7f0000002800)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000940)={0x20, r3, 0x1, 0x0, 0x0, {0x15}, [@ETHTOOL_A_EEE_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}]}, 0x20}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @link_local}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) [ 1885.730744] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 1885.749780] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 1885.762071] FAT-fs (loop5): bogus number of reserved sectors [ 1885.762853] FAT-fs (loop5): Can't find a valid FAT filesystem 21:34:10 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x4000000) 21:34:10 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, 0x0, 0x0, 0x600) 21:34:10 executing program 6: r0 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x13, 0xffffffffffffffff, 0x8000000) r1 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(r0, 0x0, &(0x7f0000000180)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x1, 0x2007, @fd_index, 0x3, 0x0, 0x0, 0x14, 0x1, {0x1, r1}}, 0x5) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r3) r4 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r5, 0xc020660b, &(0x7f0000000040)) openat$incfs(r5, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r4, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r2) [ 1898.912099] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 1898.914627] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:34:10 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) 21:34:10 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:34:10 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) getdents(r0, &(0x7f0000000540)=""/126, 0x7e) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)={'L+'}, 0x16, 0x1) 21:34:10 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x74000000, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:34:10 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x2) [ 1898.934922] FAT-fs (loop5): bogus number of reserved sectors [ 1898.935848] FAT-fs (loop5): Can't find a valid FAT filesystem 21:34:10 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x3) 21:34:10 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x7a000000, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:34:10 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x4) 21:34:10 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x5000000) 21:34:10 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:34:10 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, 0x0, 0x0, 0x600) 21:34:10 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0xc020660b, &(0x7f0000000040)) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000180)={0x1, 0x6}, 0x4) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) [ 1899.050731] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:34:10 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x8) [ 1899.075264] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:34:10 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x9) 21:34:10 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) 21:34:10 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:34:10 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, 0x0, 0x0, 0x600) [ 1899.159369] FAT-fs (loop5): bogus number of reserved sectors [ 1899.160187] FAT-fs (loop5): Can't find a valid FAT filesystem [ 1912.256411] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 1912.269605] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:34:23 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x6000000) 21:34:23 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:34:23 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) 21:34:23 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0xc020660b, &(0x7f0000000040)) getsockopt$inet_tcp_buf(r0, 0x6, 0x8, &(0x7f0000000280)=""/119, &(0x7f0000000040)=0x77) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r2 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r3 = getpgid(0x0) r4 = syz_open_procfs(r3, &(0x7f0000000640)='net/hci\x00') r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_CONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000033c0)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="05000400000000006c000200000008001300f8b810598ba0a91fcf2f9510e8d31e2a04000000c9ed15820d7fca2621f18463d096de415117664787c1000000", @ANYRES32=r6, @ANYBLOB="0c009900000000005a000000080026006414000005001801350000000800a10005000000"], 0x40}}, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000003380)={&(0x7f00000032c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000003340)={&(0x7f0000003300)={0x34, r5, 0x300, 0x70bd27, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x86f, 0x75}}}}, [@NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TSID={0x5, 0xd2, 0x7f}]}, 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x801) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x66, 0x2, 0x6, 0x0, 0x0, 0x2, 0x800a2, 0x5, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2}, 0x0, 0x80000001, 0xfffff000, 0x6, 0xffffffffffffffc0, 0x6180, 0x100, 0x0, 0x9, 0x0, 0x9}, r3, 0xf, 0xffffffffffffffff, 0x1) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f00000001c0)=ANY=[@ANYBLOB="01000000010000b777f30018000000", @ANYRES32=r1, @ANYBLOB="01b90000000000002e2f66696c653000"]) linkat(r2, &(0x7f0000000000)='./file0\x00', r7, &(0x7f0000000100)='./file0\x00', 0x1000) getdents(r2, &(0x7f0000000540)=""/126, 0x7e) recvmsg$unix(r0, &(0x7f0000000600)={&(0x7f0000000340)=@abs, 0x6e, &(0x7f0000000840)=[{&(0x7f00000003c0)=""/198, 0xc6}, {&(0x7f00000004c0)=""/73, 0x49}, {&(0x7f0000000680)=""/154, 0x9a}, {&(0x7f00000005c0)=""/64, 0x40}, {&(0x7f0000000740)=""/113, 0x71}, {&(0x7f00000007c0)=""/110, 0x6e}], 0x6, &(0x7f00000008c0)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}], 0x118}, 0x42) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001e80)={0x0, 0x0, &(0x7f0000001d00)=[{&(0x7f0000000a00)=""/201, 0xc9}, {&(0x7f0000000b00)=""/42, 0x2a}, {&(0x7f0000000b40)=""/192, 0xc0}, {&(0x7f0000000c00)=""/31, 0x1f}, {&(0x7f0000000c40)=""/170, 0xaa}, {&(0x7f0000000d00)=""/4096, 0x1000}], 0x6, &(0x7f0000001e00)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x70}, 0x40) statx(r2, &(0x7f0000001ec0)='./file1\x00', 0x2000, 0xc20, &(0x7f0000001f00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(r4, &(0x7f0000003240)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000003200)={&(0x7f0000002000)={0x11e8, 0x10, 0x20, 0x70bd28, 0x25dfdbff, {0x1a}, [@generic="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", @typed={0x8, 0x7, 0x0, 0x0, @ipv4=@private=0xa010101}, @generic="b88545056c4cf54659dceb8a16b585d6fc0ed0c9a26589fdd6f80c228a00249e760f2e06c68eb1c1fc842948a229dc769d3f7b0bb42063d1945dd686d473022dff4133d0973a9e23ae91974c6798618789a0404c2f802f0fc1516390ee04aa30e991599fb635", @nested={0x117, 0x44, 0x0, 0x1, [@generic="4aebd1ed2d5da6705347d90ad4440e92dd89fcecc29363167755d4be9df0c16e686fa6e6f5ebffbadcddb81f46ed832c0415333414cc0ebd0758fc254733049740c258e54932eb24741f0a3c06aad7de8ab4ca25787577dc37807f0c9698ee6598dd0e50cdeab6550e0a9a31dda1fb9d688f895e71723ef5db2184e9f9cc3aecea8237b0bb342358eec44e60f9d41202e2077330862c47a40db857b8ba2c262d1f6c159a3b33f5c84ba5ce620cf2dbccd0d175d4548014874b463dbd7083a0f8906c9150ec776747475ef28cffcae1dc35c51060caa9e668e8b7208892a90d1b22c16bc240a4555a88be2f0eecbadf", @typed={0x14, 0x55, 0x0, 0x0, @ipv6=@remote}, @typed={0x8, 0x77, 0x0, 0x0, @uid=r8}, @typed={0x8, 0x7d, 0x0, 0x0, @uid}]}, @typed={0x8, 0x5b, 0x0, 0x0, @uid=0xee00}, @typed={0x5, 0x87, 0x0, 0x0, @str='\x00'}, @nested={0x28, 0x34, 0x0, 0x1, [@generic="0619c758", @typed={0x8, 0xc, 0x0, 0x0, @pid=r9}, @typed={0x4, 0x3e}, @typed={0x8, 0x6e, 0x0, 0x0, @uid=r10}, @typed={0x9, 0x67, 0x0, 0x0, @str='vfat\x00'}]}, @typed={0xc, 0xa, 0x0, 0x0, @str='net/hci\x00'}, @typed={0x8, 0x21, 0x0, 0x0, @uid}]}, 0x11e8}, 0x1, 0x0, 0x0, 0x800}, 0x40008040) 21:34:23 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x7b1a0000, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:34:23 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x300) 21:34:23 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0/file0\x00', 0x400400, 0x28) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:34:23 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x0) [ 1912.282531] FAT-fs (loop5): bogus number of reserved sectors [ 1912.283390] FAT-fs (loop5): Can't find a valid FAT filesystem 21:34:24 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x7000000) [ 1925.177876] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 1925.186086] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:34:36 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x0) 21:34:36 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x8000000) 21:34:36 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x25000, 0x0) pidfd_getfd(r0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r1) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000200)={&(0x7f0000001280)={0x160c, 0x15, 0x1, 0x70bd29, 0x25dfdbfb, {0x4}, [@typed={0xc, 0x8c, 0x0, 0x0, @u64=0x10001}, @generic="d58d0337c3cf49323b51876f693361e1b7c5b46b8941649e9626b12b3d5c30c1553d10d4bfae3a9b526c4377cc36a9b69b5a8f756bdb124b340f7077aa631b6190e1fe3fed383c69529be0f99128f79781db28cd28d884f0bf807a7f1e808d740d9bfd47695432772fb0c1a4af6f050c969b173f6af9f0cd3ef467ed335ea58ddeea669838b1f0f005d98278e998a67cde98bc668097121455f46cb89f3396", @typed={0xe, 0x8d, 0x0, 0x0, @str='/dev/vcsa\x00'}, @nested={0x115f, 0x34, 0x0, 0x1, [@generic="b694f40e5b3249ed38d15ffc75c72cc9", @generic="2a50d0b036ea045fd5d0198a804af8a1e4752e083109fea7fd01ca77369e3b1eaf7b0a3a6600bb5a5188d915052f41af74e7a5a1dde1a9023248de7f9c5e74edafd58bd72e9464a00983c548b8fab9fff771140b0d7cc0a952eb5bb8c78b224337e7ba9e4912d9807528b24eab0e0bfd9fd21b382237e5a0ecd59075b2b6a69de744bbe73bb5c5022361f274bee2cab4a56c90a7dd53a593629654412c2f4e60ca598ec34bc91be23d868e54cae0433943606ca099ba3b8e1a7b934766ad1b60c3abf1660981", @generic="c51907b6b5eddeb3e3cc9dae72d9e6012f52205efb9614a5ab1528217f018591e9e62e6b9a5c3eecb9d802bd46b3ba82cdc44b317bb918ed3074745e41a4af0747abfbd8d9a6042290e69ba9f35536c181412c7da652c1fd7bdae79018e99bc398c97e1f83c3ac983e308042bb71dbf2cdb7b182c4174a22f3c2f609cf0fb76dbc6abbe435", @generic="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"]}, @generic="e5d84d23aea4fb5a9db8ea70a600e49bf3a4b87859ab1ec1fa43b087ecb27dcd2f9b2680db1accf7a205fa3f", @nested={0x340, 0x3b, 0x0, 0x1, [@generic="5a1009d7f06af036aaccb35b13617a09ec907cd3acffb59d3b297ef0bcdff57e019497ce03d15f4296ac6d8185d0265e949d5a01f56a309c210adbacb36cef81026a554d89d649b434cb45f3041e2aee68a45ae816274604ac2501ac7cbc2e9e7bd9b063eab6e89dd4d488ed8b73e8f66ce38854be14569db58eff8a38042fbd74ef640c133e4f5537d2e72d4b1f98038c3b244ae8da6da69c2ad56dd71240c4defc7c77fa772ba56ae70896ba8df3507f85d988eb20f67bd39e51e099e5e24ceb3680dfc882c0ca10aae35db0d07df718787c6cc2", @generic="fbd7d23ff001ae3efd985248a7044cf3709c4c5bf3add618de1b117b6761f7e6878a5fb6d7294641378db1c2642475629b867ce8f3dcaf8dd839151afad1e769811d9d82583b3b1194e7e6cfb5ff14f958b2d62804be8d5d1360049ea8fdc9a13c913d4866170d2eac8ac56a8a6350fc247b4fe6744b490f198cc9e06282bcb01f0f5ec16a", @generic="ec815aa033c09e27b6c7153c6d05135094a02cfa71a21fdc82138fc2d40f8f7e6461c3d92e7fb6159b92bd12e17f20e61fd605538623f42caedbd031af7e4ef44933bd373418e3f9b6aaa9d2b98a863669566383217be89d1e75951dd69838e3413894f7e15888e615e2c3ce60092f0d5d198c45094b49a0434b1f05206f", @generic="dd089bfd99680169eac37c3bf8a3154f646997a1067587a8f8d0d96ad196b00cbb4a07ab064da960615970da3ca5025f4a354de0e2d9e2046fa8a6e6aa15fbb09b375e764798144e596bc031fd3796af4dd15676b5e3afecfd6b4e82afdd4e5756108c8a5a7a96d1d7b8be2481e405d0b185056ac9dd4d025d3266286821a3202264b94a53b9677cd26a7222e453060f685406a0e85eda5134b7d21b638414e42b6e30cbd1e4b688ef941592fb6d231cbf62b8445e1cd81f763e707ed001225174238e2acfd829f7f4ced450d96cb798a41bd35f7b1c901fb856258ee728011019b94d3a0a18bc72a7622090bf8ea4c7c98c530b37f53d", @generic="fbd38fc7a3fdc126a08458a180722a796b25b9724c431b27f0756b40042c3f579a8e7bbd8211ccdc630fcdabe06fb18e8a665d221535e6443628a1812047b242f356bd899138df29fdd0a1ace98de8cc587764a12d742c08f9dec9cd93eb21995cc2df3c352f0195795bc2a953"]}, @typed={0x4, 0x37}, @generic="c21b928273e92ae02b79d37e462543d7f5f9dd363d5e8a32bc3a841955c3ae5ef6e7eef5380905b4e2b78c275dbb90a9c19775e9c9162d95732047c638fb2c9f2919aee229ed1c945b40536f5db2bcc7e01aaf1a558611e67ff73856b5381e6b585938f2454e94fda3d3"]}, 0x160c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4) r2 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = syz_open_dev$ptys(0xc, 0x3, 0x0) read(r3, &(0x7f00000002c0)=""/208, 0xd0) faccessat2(r2, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:34:36 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) 21:34:36 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x81000000, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:34:36 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x900) 21:34:36 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:34:36 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x9, 0x2, &(0x7f0000000000), 0x0, &(0x7f0000000240)=ANY=[]) getdents(r0, &(0x7f0000000540)=""/126, 0x7e) [ 1925.215081] FAT-fs (loop3): bogus number of reserved sectors [ 1925.215828] FAT-fs (loop3): Can't find a valid FAT filesystem [ 1925.216813] FAT-fs (loop5): bogus number of reserved sectors [ 1925.217604] FAT-fs (loop5): Can't find a valid FAT filesystem 21:34:36 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x9effffff, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1925.247523] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 1925.250329] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:34:37 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0xf42) 21:34:37 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x0) 21:34:37 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) 21:34:37 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0xa000000) 21:34:37 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:34:37 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0xf0ffffff, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:34:37 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) getdents(r0, &(0x7f0000000540)=""/126, 0x7e) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0x541b, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1, {r2}}, './file0\x00'}) [ 1925.343607] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:34:37 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0x541b, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x726029d4fb0c9567, r2) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) r5 = dup2(r4, r3) r6 = openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)={0x42201, 0x1b9, 0x4}, 0x18) renameat2(r5, &(0x7f0000000180)='./file0\x00', r6, &(0x7f00000002c0)='./file0\x00', 0x1) 21:34:37 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x10000000) 21:34:37 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x0) [ 1925.344778] FAT-fs (loop5): invalid media value (0x00) [ 1925.364084] FAT-fs (loop5): Can't find a valid FAT filesystem [ 1925.377325] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:34:37 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0xfba) 21:34:37 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x1f000000) 21:34:37 executing program 0: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0xc020660b, &(0x7f0000000040)) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000180)={0x1, 0x6}, 0x4) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) [ 1938.312545] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:34:50 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0xfb010000, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:34:50 executing program 0: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0xc020660b, &(0x7f0000000040)) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000180)={0x1, 0x6}, 0x4) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:34:50 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) getdents(r0, &(0x7f0000000540)=""/126, 0x7e) 21:34:50 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) 21:34:50 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(0x0, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:34:50 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x20000000) 21:34:50 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:34:50 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0xfdf) [ 1938.314776] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 1938.351398] FAT-fs (loop5): invalid media value (0x00) [ 1938.352285] FAT-fs (loop5): Can't find a valid FAT filesystem 21:34:50 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x48000000) 21:34:50 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0xfe4) 21:34:50 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) 21:34:50 executing program 0: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0xc020660b, &(0x7f0000000040)) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000180)={0x1, 0x6}, 0x4) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:34:50 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0xfcffffff, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:34:50 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(0x0, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) [ 1938.491606] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 1938.505997] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 1938.514094] FAT-fs (loop5): invalid media value (0x00) [ 1938.514758] FAT-fs (loop5): Can't find a valid FAT filesystem 21:35:08 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x4c000000) 21:35:08 executing program 0: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(0x0, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:35:08 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(0x0, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:35:08 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4305, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ADD_IFACE(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000002100000009001f00706879310000000005002000010000000c000500000000000000f481"], 0x34}}, 0x0) sendmsg$IEEE802154_LLSEC_DEL_KEY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x40, r2, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [@IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x1}, @IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x1}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_SHORT={0x8, 0x2c, 0x676}, @IEEE802154_ATTR_SHORT_ADDR={0x6}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x40}}, 0x4048011) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x40, r4, 0x1, 0x70bd29, 0x25dfdbfd, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0202}}, @IEEE802154_ATTR_DEV_TYPE={0x5, 0x20, 0x1}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x40}}, 0x40041) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:35:08 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x410202, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0xeec6) r2 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$sock_int(r2, 0x1, 0xa, &(0x7f0000000100)=0xfa, 0x4) getdents(r0, &(0x7f0000000540)=""/126, 0x7e) 21:35:08 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0xfe8) 21:35:08 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0xffffe000, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:35:08 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400", 0x15}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) [ 1956.590693] FAT-fs (loop5): invalid media value (0x00) [ 1956.591478] FAT-fs (loop5): Can't find a valid FAT filesystem [ 1956.610037] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 1956.620749] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:35:08 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x420f) 21:35:08 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x68000000) 21:35:08 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x80, 0x0, 0x0, 0x24802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) getdents(r1, &(0x7f0000000540)=""/126, 0x7e) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0xc020660b, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r0) 21:35:08 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0xba0f) 21:35:08 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0xdf0f) 21:35:08 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0xfffff000, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:35:08 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400", 0x15}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) 21:35:08 executing program 0: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0x541b, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x726029d4fb0c9567, r2) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) r5 = dup2(r4, r3) r6 = openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)={0x42201, 0x1b9, 0x4}, 0x18) renameat2(r5, &(0x7f0000000180)='./file0\x00', r6, &(0x7f00000002c0)='./file0\x00', 0x1) [ 1956.771875] FAT-fs (loop5): invalid media value (0x00) [ 1956.772699] FAT-fs (loop5): Can't find a valid FAT filesystem 21:35:08 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x6c000000) 21:35:08 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) [ 1956.792123] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:35:08 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0xe40f) 21:35:08 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r1) r2 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) r3 = syz_mount_image$nfs4(&(0x7f0000000200), &(0x7f00000002c0)='./file0\x00', 0x9, 0x1, &(0x7f0000000400)=[{&(0x7f0000000300)="902532f2ca97b7fbfffae32e4194c6428651fbb5f9f592e394b351733b096ed5b8120061b27858fb90ca70af6b9c28c88ed3612fac1b0ddc0e855cdaf079f72c961fc1f36d69aab7bcb9de8d24edbf51a8a84225b6d550574383607c8951c5d79c409c08444e8e21cb9c990f7b6139383508b9f43af6932a8300d7c767628f7d2baf53d5bc6243f76f4f4811d0c601bc86adc8e342007f9969ca4ed49426562f770192ef9765bac5ad53091a5c76cdd04a30520588fa14d003cedc11c731fea9dac83da81b748fe3ae55", 0xca, 0x9}], 0x2004010, &(0x7f0000000440)={[{'\x00'}], [{@fowner_eq={'fowner', 0x3d, 0xee01}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'syz'}}]}) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r4, 0x541b, 0x0) dup3(r3, r4, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, r0) faccessat2(r2, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:35:08 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0xe80f) 21:35:08 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x80000) 21:35:08 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400", 0x15}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) [ 1956.935212] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 1956.959926] FAT-fs (loop5): invalid media value (0x00) [ 1956.960665] FAT-fs (loop5): Can't find a valid FAT filesystem 21:35:21 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:35:21 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f8", 0x16}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) 21:35:21 executing program 0: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0x541b, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x726029d4fb0c9567, r2) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) r5 = dup2(r4, r3) r6 = openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)={0x42201, 0x1b9, 0x4}, 0x18) renameat2(r5, &(0x7f0000000180)='./file0\x00', r6, &(0x7f00000002c0)='./file0\x00', 0x1) 21:35:21 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x1000000) 21:35:21 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x74000000) 21:35:21 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0xffffff7f, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:35:21 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0xe, 0x1) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:35:21 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) getdents(r0, &(0x7f0000000540)=""/126, 0x7e) getresuid(&(0x7f0000000280)=0x0, &(0x7f00000002c0), &(0x7f0000000300)) getresuid(&(0x7f0000000340), &(0x7f0000000380)=0x0, &(0x7f00000003c0)) getdents64(r0, &(0x7f00000005c0)=""/94, 0x5e) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="0daaa035c554c84721302a9f77d8d6c13ddbaed4c668ee7b731e9960294c4d736fd5f3feaacc6e6427f185f9faa4f2c7867059a26a39a0376f54fb4b8b08726e02f48225fc9dde863e7580048457e54a980fd175f418f79959d609cefc36dedddd4f775c7589a30b097228f7330bb4bf702f3032ef57fd634e87d68938f21616e45e652a1b43eb4f7ef2ed4d6b8adf464caf2dd53a3786731ff34cd41af3e886e6c6a30fc039d496a3e1628b1cc5ba94f93b8c5b0456dd1890376fa2be", 0xbd, 0xffffffff00000000}], 0x800001, &(0x7f0000000400)={[{@data_writeback}, {@dioread_nolock}, {@nodiscard}, {@abort}], [{@uid_gt={'uid>', 0xee01}}, {@euid_lt={'euid<', r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@fowner_gt={'fowner>', r2}}, {@permit_directio}, {@fowner_gt}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) [ 1970.088970] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 1970.102133] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 1970.110049] FAT-fs (loop5): bogus number of FAT sectors [ 1970.110756] FAT-fs (loop5): Can't find a valid FAT filesystem 21:35:21 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x2000000) 21:35:21 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x7a000000) 21:35:21 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0xffffff9e, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:35:21 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f8", 0x16}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) 21:35:21 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x3000000) 21:35:21 executing program 6: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) ioctl$FITHAW(r0, 0xc0045878) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r1) r2 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f00000001c0), r1) sendmsg$NLBL_CALIPSO_C_REMOVE(r1, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ab000000", @ANYRES16=r2, @ANYBLOB="000328bd7000ffdbdf25020000000800010002000000080001000000000008000100010000000800010002000000080001000100000008000100030000000800020002000000"], 0x4c}, 0x1, 0x0, 0x0, 0x40000}, 0x4) r3 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) clock_gettime(0x0, &(0x7f0000000e40)={0x0, 0x0}) recvmmsg(r4, &(0x7f0000000d80)=[{{&(0x7f0000000380)=@l2tp6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000400)=""/90, 0x5a}, {&(0x7f0000000500)=""/52, 0x34}, {&(0x7f0000000540)=""/169, 0xa9}, {&(0x7f0000000600)=""/200, 0xc8}, {&(0x7f0000000700)=""/14, 0xe}, {&(0x7f0000000740)=""/49, 0x31}], 0x6, &(0x7f0000000800)=""/180, 0xb4}, 0x7ff}, {{0x0, 0x0, &(0x7f00000008c0)=[{0xffffffffffffffff}, {&(0x7f0000000940)=""/145, 0x91}, {&(0x7f0000000a00)=""/132, 0x84}], 0x3}, 0xd20}, {{&(0x7f0000000ac0)=@ax25={{0x3, @rose}, [@null, @default, @bcast, @rose, @default, @default, @remote, @default]}, 0x80, &(0x7f0000000c80)=[{&(0x7f0000000b40)=""/119, 0x77}, {&(0x7f0000000bc0)=""/43, 0x2b}, {&(0x7f0000000c00)=""/15, 0xf}, {&(0x7f0000000c40)=""/12, 0xc}], 0x4, &(0x7f0000000cc0)=""/148, 0x94}, 0x7fffffff}], 0x3, 0x40000121, &(0x7f0000000e80)={r5, r6+10000000}) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x10000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x6}, 0x0, 0x1, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r3, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:35:21 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x4000000) [ 1970.240396] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:35:21 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) getdents(r1, &(0x7f0000000540)=""/126, 0x7e) lseek(r0, 0x8, 0x6) unlinkat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) [ 1970.255176] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 1970.279714] FAT-fs (loop5): bogus number of FAT sectors [ 1970.280423] FAT-fs (loop5): Can't find a valid FAT filesystem 21:35:35 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) getdents(r1, &(0x7f0000000540)=""/126, 0x7e) lseek(r0, 0x8, 0x6) unlinkat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 21:35:35 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:35:35 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0x541b, 0x0) r1 = syz_open_dev$ptys(0xc, 0x3, 0x1) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x30000, 0x0) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r3, 0x541b, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)={0x6, 0x6, 0x8, 0x0, 0x0, [{{r0}}, {{}, 0x2}, {{}, 0x36}, {{r1}, 0x2}, {{}, 0xffff}, {{r2}, 0x80}, {{r3}, 0x9}, {{}, 0x8}]}) modify_ldt$write(0x1, &(0x7f0000000000)={0xffff, 0xffffffffffffffff, 0x1000, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1}, 0x10) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) getdents(r4, &(0x7f0000000540)=""/126, 0x7e) 21:35:35 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f8", 0x16}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) 21:35:35 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*\x92\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x91)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xf3\x83\x98\xce\xe7\x91\b\xe9F\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r2) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r2) sendmsg$NLBL_MGMT_C_REMOVEDEF(r0, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012dbd7000fedbdf2505000000080004000100000006000b0018000000080007006401010008000700ac1e000106000b00110000000800040003000000"], 0x44}, 0x1, 0x0, 0x0, 0x400c4}, 0x20000000) sendmsg$IEEE802154_ASSOCIATE_REQ(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x1c, r3, 0x800, 0x70bd28, 0x25dfdbfd, {}, [@IEEE802154_ATTR_CAPABILITY={0x5, 0x11, 0xe}]}, 0x1c}}, 0x40) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0x50, r3, 0x200, 0x70bd2a, 0x25dfdbff, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0202}}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0302}}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x80c0}, 0x4) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:35:35 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0xfffffff0, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:35:35 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x8000000000000) 21:35:35 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x9000000) [ 1983.681547] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 1983.688637] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 1983.721610] FAT-fs (loop3): Unrecognized mount option "" or missing value [ 1983.723170] FAT-fs (loop5): bogus number of FAT sectors [ 1983.724568] FAT-fs (loop5): Can't find a valid FAT filesystem 21:35:35 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0xfffffffc, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:35:35 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x10000000000000) 21:35:35 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x420f0000) 21:35:35 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x9000000) [ 1983.760429] FAT-fs (loop3): Unrecognized mount option "" or missing value [ 1983.804136] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 1983.820022] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:35:48 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, 0x0) 21:35:48 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0xffffffff, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:35:48 executing program 0: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4305, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ADD_IFACE(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000002100000009001f00706879310000000005002000010000000c000500000000000000f481"], 0x34}}, 0x0) sendmsg$IEEE802154_LLSEC_DEL_KEY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x40, r2, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [@IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x1}, @IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x1}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_SHORT={0x8, 0x2c, 0x676}, @IEEE802154_ATTR_SHORT_ADDR={0x6}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x40}}, 0x4048011) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x40, r4, 0x1, 0x70bd29, 0x25dfdbfd, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0202}}, @IEEE802154_ATTR_DEV_TYPE={0x5, 0x20, 0x1}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x40}}, 0x40041) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:35:48 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(0x0, &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) [ 1996.907361] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:35:48 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0xc88cb1dc2d204c4d, 0x0, 0x0, 0x0, {0x73}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:35:48 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0xba0f0000) 21:35:48 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x100000000000000) 21:35:48 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/firmware/acpi', 0x80, 0x24) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002740), 0xffffffffffffffff) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_EEE_SET(r1, &(0x7f0000002800)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000940)={0x20, r2, 0x1, 0x0, 0x0, {0x15}, [@ETHTOOL_A_EEE_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}]}, 0x20}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002740), 0xffffffffffffffff) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_EEE_SET(r5, &(0x7f0000002800)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000940)={0x20, r6, 0x1, 0x0, 0x0, {0x15}, [@ETHTOOL_A_EEE_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}]}, 0x20}}, 0x0) sendmmsg$inet6(r0, &(0x7f0000005580)=[{{&(0x7f0000000040)={0xa, 0x4e23, 0x8, @mcast2, 0x7fffffff}, 0x1c, &(0x7f0000000340), 0x0, &(0x7f0000005b00)=ANY=[], 0x3c0}}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000380)="421113935753660d41d099f86bb036e12558ada9a8456bac54f3e13dc5b7f27949f42da01ab436f46e556f27975185176e34f1d120db3fa713f34afadd0d2adddb80140220c1a315079b3a35087e24298abf996cf29553b7d8c49dd9b23194d65a7d11f1605d8c228cc5daaae38fdf94a1df511d17c799414b11358a690dfbb4cada625403f5d4e31f48c260388c0e2bc9c90279934a71c4078f90e528e9f2005674330e4a5a1115f23856f03b5fddb4f1ac24ef562f069868941a81bccb6f57f516e1ec1cc48d2d02054a681d", 0xcd}, {&(0x7f0000000480)="0807949a9b98c7838d5b8d9f5c892da534c393781dc320abd9e3ee0abf6b33d545c2ccbdc1f8bb3203f14feaeafae6b70aea65078be961691187bc127d662de1b327ab2c3c5188d369d32d0130121980473c9dc62a8af6ba60b89e677fabf53dea39c85383ee13281f98a78068a4c47520bd8f93f127b340e314948f710ef94965a1b0213dfe44", 0x87}, {&(0x7f0000000980)="7d43bc7bfb671cc656f7d04f4672d8439b38dd1e7c0bf02090f757314a0f9e621f117bf5b6bdae8500f50d334a3d55d50472ac6a7074ebe8165cbdfa", 0x3c}], 0x3, &(0x7f0000000a00)=[@dstopts={{0x178, 0x29, 0x37, {0x3a, 0x2b, '\x00', [@ra={0x5, 0x2, 0x3ff}, @enc_lim={0x4, 0x1, 0x9}, @ra={0x5, 0x2, 0x1}, @pad1, @calipso={0x7, 0x48, {0x3, 0x10, 0x7, 0x5, [0x9, 0x9, 0x2, 0x6, 0x8, 0x6, 0x80000000, 0x9]}}, @pad1, @generic={0x3}, @generic={0x4, 0xb2, "20b034efd7005e7ecd2c81461c285f2432af748bfe81143367fd297b43fd995b0b972af0907500eef508e41818d7017f4f22401fea51160d525b346df73c5490b21874d74b9fe3a3beb48942aff598e3898e04db3b5b78340774a40b86db4f35e8f3f25c20c0c96ffe3d3bfb9b66b98161efcf97c6ff1dc1abab8e25b8640e89b763000d24f29f5621d14dda5d309fd0e180d7474cf400ea371d610fd80ac2e20971a96c643c6dbde14b7bbf89db37b7d61d"}, @generic={0x24, 0x4a, "16febdb2e6c5e81e7dd9be754167a2a54741e5b52b9da8f5cc930552e4666b34ff20e01d4c4cfea2e6163024ea4d98021ef33cb63bb989bcbe26d422073d9226bee07ecea0d0328f1c86"}]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0xff}}], 0x190}}, {{&(0x7f0000000bc0)={0xa, 0x4e22, 0x3, @rand_addr=' \x01\x00', 0x1}, 0x1c, &(0x7f0000000d40)=[{&(0x7f0000000c00)="815ee4926d80e83c950eb640e1645d84a8a32f303bb30931f664622855f6212053d549b454a2897651f3d4c55837e52dca04cc2be9091135332733", 0x3b}, {&(0x7f0000000c40)="9c68af79ac27878b31c15e9c52e5acadd0cb75555685c63ddb422ef182689634c314e2e5f8f14f68776a461c8847189101b61ab16193018aaf129a2259007e7169f1f178b96dc36a520159717ab49d37fe7eb9757b85e400b9e9577de7604306f986d29ea3ebf97c23125789ec633efd3667bbaf119db13f27c2b4a8e4f5ef38689788020b98a48d3bc8709247059cbd1ae15184c40e6b449c52be1e6e52cb462c8cb012724c0e6e11ed8ff564197ca08fb7e5d2fd8b509bab807ecf843b809583643f0ba4ecf8ad96c9444aa42c5c6a71be00c48407d3d5bb2f91745f96cafe10", 0xe1}], 0x2, &(0x7f00000005c0)=ANY=[@ANYBLOB="380000000000000029000000040000003303000000000000c910ff010000000000000000000000000001050202000502002340000000000020000000000000000000000000c20400000001000014000000000000002900000034000000030000000000000069fbe05b2e2c22fd02c5a095da51602f9786eaf44a9a601f4b4a9a563326c5fc13063e061f09024cfc2e17b98333b764b3ebdb662a000000000000000000000087e3ae545ca39506a178efe0c6a5f02a19a544966b71474f88dec4330b05f8d385339ee93cdcea5d3b5cd13ca36db657f8e23dcc9ebcdd"], 0x70}}, {{&(0x7f0000000e00)={0xa, 0x4e20, 0x7, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x1000}, 0x1c, &(0x7f0000000f40)=[{&(0x7f0000005a00)="aafc3b2a4432f4e405e7d1796601f8fff1fd5207e391bf17d2f98e29b9b07502a4f2d264cd62d5575e1321d74fe19feac05f8b0fba32e186810c1fb54956e9e661b580c5f375c793c745624305e65dc99481f85e0f7d37832fc313b70a861042c14c8bb174ff1bfe85937a809d7f246170f7a401e43f8990892a600b42223817bde6c5c9cc9de1f2031dd0f93a9c9b0ef12c634d6d68502bd0b8d98e28ada4e6e4886758bc769db5018c07b22ed12f749c096d9b5eda96492e93ec8905a4cc5b5f5bd4675eb46f8be2cb61c1", 0xcc}], 0x1}}, {{&(0x7f0000000f80)={0xa, 0x4e21, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}, 0x9}, 0x1c, &(0x7f0000001480)=[{&(0x7f0000000fc0)="0597e509d8a85b92b70ea735f79577f3f01f3e57dc62260e015ca381b6cf9237721b891822a11e5c7e197ba939a77048ca5ad6bd5828e37fd2e75dea00dc0bc45ce0e41713868f3a14460ffcdee944e335eb3384966e3057841089664cbfe762e33bd9517c957995a7d86eb9e22fbccc89226fa5e22683ae78c1deca85b97226512ce010c033b57da2ecb889c1efe57bd90efad8ff", 0x95}, {&(0x7f0000001080)="bb5abb0f758ae34a62bf09985bc4e04b9c6a41ccec8040e351c462cb091c7a00000000", 0x23}, {&(0x7f00000010c0)="df9c42d1929ad51df1fee0be823659", 0xf}, {&(0x7f0000001100)="23c118341159244fece39ea5b4722f3e4824121f26a68761177027bb9a50dc4e5072925e22966dbfb97ccf46f12e9b0f0ee2e8249c717d63af1777627efe4b34d94f3c1166431919927b92af09cc50a684657fd421da73199268d6bf399026396f0915866b8502aae8f917f7eea6559018f9f8179629efaf51b3050c3f59110518f0aee2266bbb3efeb7d0248b9444566a4ce6324d20c7e9cbd58ca5f0523c9f89d307844eb8bfbdc79cbd74a0b3a823ce822260a3342d664037d9b1c413e22cd6c62f8503939883e07843169ce3c6", 0xcf}, {&(0x7f0000001200)="f8bb388bb7b0569ce03d1b953f2ca14ba66a4edc89d4c164fe08114ec345c9af8d1d81454d7248409fa9b1f0c7e923531354e661ce66fefbbc07c9d40f644f4722882cb65a088f767428cf157d7260803bd006ec6f54fff9632ad96b4a17ebec81848a86e4da2809a79ffecabcc4bdb3c9cdad03ca3ada4ccc", 0x79}, {&(0x7f0000001280)="b07a0508c4d81bd3de78f429c5c042f556564a50c0df30f642d1ce01f4b88b9a52a267b4ae0c657359ac7ba399abe87d3768f40115d4119499fb82c83955c1aaee169dfdf9878a82fe734da6edc8b902873475a9a4c394742fc8456f574275828aaebb12eb2a256d153ed64345f61b11fb737da4407a8986b4ff4e9d21d98ecfd83f0dbadd", 0x85}, {&(0x7f0000001340)="cdaccaef742100e1c6fc2091fe8f2968e23bc1df032dfd03f723677b9d23ffc77131ad2f1de038ce1b4c6838546f4404f4c633270b2463241618160364d4879cde7052b7857ef7ae4fe9734920213022da15634a85e9b2b260e0316a199794e7370cbf41c54fab194e9cdc75eccd73ed51eef6a2f784afdd67fe96504e9eea9e02aaf95c832608b755d33b1d3dd6313f23ca5b", 0x93}, {&(0x7f0000001400)="3372339e7a5d70e685b8585a42f5bd8f0968e9a315fa13d0a2d23312294bea8bd9848d464add26b2468ff84812fa2bb8530cdfc766d90f5fcaa49c91efdf55f7950aa80c99f57dc59e088dc1311c2e90d39bbbfab7d09957af2817fe37ee3a339d71a2136d75bbd7a3783606b353a961339fd4f02fbc9d04aec7", 0x7a}], 0x8, &(0x7f0000001500)=[@dstopts_2292={{0x70, 0x29, 0x4, {0x1d, 0xa, '\x00', [@generic={0x40}, @hao={0xc9, 0x10, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @jumbo={0xc2, 0x4, 0x6}, @calipso={0x7, 0x30, {0x3, 0xa, 0x4, 0xfff, [0x7, 0x100000000, 0x0, 0x800, 0x5]}}, @jumbo]}}}, @hopopts={{0x138, 0x29, 0x36, {0x0, 0x23, '\x00', [@enc_lim={0x4, 0x1, 0x7}, @generic={0x9, 0xbd, "49d79e6e5f184b69936e13c05f9a2e964ba87476c78a52a9a43400b80400a6b6644dfa181ba51b5ea6698c8c48b240cfba9d90b0e4941fb62e76d3f50c5853a52096fa537fd58f977e9e5687ac5b1cd0eae85696494bf913aad3b610c9d295df741b3e0486e4d02bb12a33a91c90bab4a098eceb61f35d59d4adbce0da5bc325d5ba2a253e23ae66dcfecb09d593a2d19922b1d5d996148249cd6c3d74b8cfeda96a0c21b671ed29432787ac3a1f725162cd023e78addaedca58c0dfb9"}, @enc_lim={0x4, 0x1, 0x7}, @hao={0xc9, 0x10, @private1={0xfc, 0x1, '\x00', 0x1}}, @jumbo={0xc2, 0x4, 0x1}, @enc_lim, @generic={0x81, 0x1f, "e6679e10855da7bd8993fb35cceaae5db8ce0328ba033f61fb2ec08f23950f"}, @hao={0xc9, 0x10, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @jumbo={0xc2, 0x4, 0x6}]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x5}}, @dontfrag={{0x14, 0x29, 0x3e, 0xfffffff8}}, @rthdr_2292={{0x88, 0x29, 0x39, {0x8, 0xe, 0x0, 0x20, 0x0, [@private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, @rand_addr=' \x01\x00', @private2, @private0={0xfc, 0x0, '\x00', 0x1}, @private2={0xfc, 0x2, '\x00', 0x1}, @empty]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x8}}, @rthdr={{0x58, 0x29, 0x39, {0x21, 0x8, 0x0, 0x40, 0x0, [@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @private1={0xfc, 0x1, '\x00', 0x1}, @ipv4={'\x00', '\xff\xff', @local}]}}}], 0x2d0}}, {{&(0x7f0000001800)={0xa, 0x4e21, 0x1f, @mcast1, 0x80000000}, 0x1c, &(0x7f00000019c0)=[{&(0x7f0000001e00)="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", 0x1000}, {&(0x7f0000001840)="83f031f7376594838baa16e69589dcf748f6c848af73dcc330bd8e878fe5fcd61008ef9b95d91a", 0x27}, {&(0x7f0000001880)="47ec98720b0fedee1ca1d324d171822abff566228dbf5aa4f5c2fa0859e7f8feafafa216861804a57d68f8900e0638aa0fa17c26cfbd90fe1ca77a5299446514d9cae76ed9f06360afd8ed8dcc3faae1e16b090a67c50127480a51f9766876bb8f6f8464a05084d5d5fc2f591b6fd169585bde2e86d03ba50991ee7a9a3ffb0acb151ad9191f2aa82218611dda75f7feca6d77a6a244ae503f64368871a4d4c118db23d573842b14ac27147969a19ab6fc6146", 0xb3}, {&(0x7f0000001940)="6d871c0f6d7786b4aafc407de567b14c4db1a8503bbaa8ecad04e67d64e33ea0fbee82e4eecac0f4647f56dfea4b81842dd3d5d34f3f2c3fc64d0520e5a0b61552e6b884415662a5f4018b61d67d41e5972c03ebb304fd53c9a7c9ca416100ea3ef3", 0x62}], 0x4, &(0x7f0000001a00)=ANY=[@ANYBLOB="4800000000005d1bf61b2ad74d0ae3d74c7df5a61e8d00360000001d050000e300000007200000000106041f00040000000000000003000000000000000200000000000000050200ff04011f040181000000001400000300000000"], 0x60}}, {{&(0x7f0000001a80)={0xa, 0x4e20, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7c2}, 0x1c, &(0x7f0000001d00)=[{&(0x7f0000001ac0)="27243c9a10970e9289a64160246006cb831d623f92884b6073f00fcf2b7e33beba1c0f16ab2758b3977ed58144212252da6dd2509bdf403804c1c8b54442d92eb285621b9d75e06aa4582fea1339e22387807c38ed5b7b52e9f89ecee1c0c8c6e0c392251f60ddf7d9102b6021c92f416d43c609e0d68bc570535265c5166fffd8f084717771e0a9d8bb658557c62956a897fe88126a67cb3199e858d41011e32f5ba21017bc75b02990afb3408bf1", 0xaf}, {&(0x7f0000001b80)="0663e51eb7dc8f0ea015200891e1a732c44409564f4f0ff86c7711f7e6174fb591e7abf75dec59a32178d673c768334c54a08ee0fef800c21470b477370e72c14d3acd280e912e31c5fca01f4ed732761a596467214f88c2d0e813e25c9f2c901ccda816cfb9a22a23682fe1f104e72a98b4d8d7ee5f3a3dd87ea91be1936d930a9de3ead239940388e0e90923499be4beccc60356fbc873452c5695c6ae04afb5bc370d474ac3ff375d70e37588", 0xae}, {&(0x7f0000001c40)="f6d22d57861efe1277e800ea70e8f924af009457dbc24788d10366778080d17a4e7a85ab4ddd4c7628d94a4283ac0005fddb190b96a6390202e8ba33b173b704750ec615630caf7e5009205dc38b7f965cb904697997a6f493f2e187e0001c9dd123d98337326ef8eb96a53564b7", 0x6e}, {&(0x7f0000001cc0)="70491d9d", 0x4}], 0x4, &(0x7f0000002e00)=ANY=[@ANYBLOB="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"/304], 0x130}}, {{0x0, 0x0, &(0x7f0000001d40)=[{&(0x7f0000002f40)="1da5b5bc96fb428ac207155d2123f424c6257da7af9ef38a85d3be0206a50d553becf97650f2f558bab535d3577ef364cd5c0952b11d1df761134eaecb9f3a4f0e3017151493d236717e4401621deeda89ea1665184c7bc32e2057ae9b733cbb2955f5446c5a702c92ee09c86d4bba7e12880a4857c43b8e6caddb33e6f859ef184f2dbb5317", 0x86}, {&(0x7f0000003000)="a99bb8ffd7e3c159bd5cea38da873f5d6ab60823f2784e844553a51667652cfa8215f2e1f0717ff00ef2dc23fe42fb136d8f3db07a96233e4331d86d7cc8074fac7759d6ae2c379795f3baaa91dcf2e279b2d6166f5336ab1fe81984b6852354d2585031617da5becb52b0b90547af263394f9b1530ad4a0e5c21f281036fc6e226660fb43cf37abcda54a1472be8913940a7cd4a1a4c59f15a00253fd7c3f00aeac08458a510d5a38c71282e7982f5bbc9def0608f1aa69426bcf671529cc76b11d6f0c8e2ab9e56be91b7e8d2a792b05702689421e0a775b0ef0e84f7fe9bc1ab7fce3002ab63d2ec63e6109afa00a9f1c31133a1a8e75fbd35b34b63cf7080a66983eda6478ef71ed0f64f8d95a8a671a3b6e2b5b6af39f1ecdd6ed6893750374489dac57893972625e064a8ddb24cb09495caa7112de4108cabe0e4a7800d38c1e63533e45c219974f68315801ee907440cad7bbb0c759bf3c13b8294a08cb4dcd1ceed93f26ea13fff5eee01f256457a8952034beef841f98508af64b0e82f10aa8aaf8992ca264dfadf38765caac17821fa0d0c8477ba5fe9203cc5752e0872f34268ef7e7b5435ac0020c2241bb195f813a936029fdab829631d66e5371f868cdc13ae09a5b14f5e86570d44ad6c2ef564b14485f9b288017c118ec81416291497d67e430f503bd8fdbd905bd7a1cbea1f15565a236a41731576269563f7274af069fe8eb7e4d857852ae9d0a56b93138782972a8078601a2372f4bd8ce697c595c05e4540904361a51b097b4cdb10fbcda6880df2fb6ceb8767620ca2e9476951728849be88a608efa9db625dc077316bc435794efd4ea67f7b849aa8a497418ae99146d2343f7169bf787b4bfd371c0943c5d84798f2a675a1bdba23a563999069f24cce2604397938609b99dbfa1853fce36dc5e7ad25c76fbd7114105ee314cd8685d3a354f906ff5afd004b69e9f875d3a16cfcec811452560f59a0c4bc1fedf522c7cad6487dde1fda1e76baabcd895dbc65d7b3c051f62dff6b136bd322683c01605e63cf2d64b2c818bbd3733ee4306f9d1f856ba0b1bdab46a836148f3ffaf9e6a4926feca87bd26f42f787da0b0082a564eb49aa21f254f27c5c6c063320fde9123058fcdb15a5049f5f2bf77677d4063faec869a3b6db16bca9510e790a5aea66e18d7681780bfe75fa7b1afa69e7f6e44bf17cbf1a6c18b75454d7a3432c982fe38e3405142b1c4c6b8a073188cb48cf11ae57f2e6d8a2807711e171e76cfe6d89674f53640a7ab84b3e40b197d66d5ad1e52e10b87dd45bc22f4c385905074aee204b577ea688682d0c5ecfc9fc11c774907bab9fd7a1dd2d28d78c783242acfc4b6f1654bc54d43a16cf5bccfd74c14fdef7d29ef7f93f21454b571c27d2b3c29308d842c8b0e34565e03eeca3bbc03783fbf2d9e0c09bbf15ec1e52bbb3d2bb858c72e5d96cdc9049cdc5328ac49ecdf58d538da2f1e5cfc3ab8814b643f4b371a0b766afb11171c11d5ac91aa06123bc7a8ba329cb3da3f70265b9872432089c85fa0f8e7ce296b87654d33db53bda07039d16dc0325b0fad5197911ccdf3bc11c668fbfc7bbdadbd77eddc3a5084a170138b2a111a411f15a6586d95b9c30b6b9516e23a3c38c44b8698fea586b5900ceb15016f3b2219ca0c90b466f0353c18ef973063e4b8d3df381b1a7f245f15dabcff2275b2fb9a7e5e006ac305148ee4fe416dbc4e8f9366c9d54bfdb454361ed2cd07861b86dca70b1a89b2378fab917587e28d3f34775323eb4e21f8fd99a02b65966e91fc65a2366b4b05710b93e7346efea3c3a85a79bbfcfcfb89053cfe7e2723f7a2198a027c2e80a559ae74bd39d2dac29ac819d4d09447a8e07c51567cea6d1c32cf49429595c3979142041112d43bbe59ea0d2db42c55696a99db95e43a54626a2f725f8614eb9d2579bc6af7f7f861efaad9af5e59c2e86b828e5f31ebb723c2427d10f087cb6e5d55146f216ddc73060c01967c2398d090a649a6a703c84e04d248abdc2b47a4149e8cf8236cd5e8cfe3d4c971ab1023aaaf4c070a9559bcd92a064e136ae49c7e5d43562cfeb0e73b6a9b0d97eab5f6b41ff90d136bcc95c4bfadab853fa532d54bc92c551374b30acf6ae8c189815e5f56e18d9cfc64284962293bd9b33cc2cfda024f1815cd1cf061c2519fd52d687dba134da032e91b759535d2403f2126ca4dbc2e63c9ed703b438580be4b06ccb9579ef2e629516db4af1dce46921173e50aacdedba9767b50882d4c3060d07f9a0982c43fb0e145794b48cf13dfe8939523f1a2c442d0212c6ecc4eb2afc1358a04d292a2d12616beece59131aabe0133a29d99d69ce6c93bde5452bd8232d180981dbc29540a8f4e467d28f21596dbf1196ea9469fea96777059adf810079a62b40ec6ca902c0744de90256002c7dd1767c1126f0592d57986e77d3bf0a5342120cd56e25610ca295b7f416604806eb9c08b8f24f6a608cd880b334383e52be76657b4425683b0d6249a777876f071939b6fd125cd6049e01c416156f3336022e5b5be4f3a8a7f188adf21520998327c0b9f128f0eef37aa09fcfea88c3dd67b016c8efc6b4f09f717eb919b48fe3d5c65e91379c9b691a22b0340ba94b30a717faad74371170778b52b64b87c65428a2ef1b7323d53a4edd4c504cc0fda7198d22170cae739733bb671487d33541be3fec10b647d94c1dfd7c1b52579529f7d84f91a8443b819988521e9e88019c31485aa2f916512637a5c743154487f0074cdaf53e39a0255c6e9cfdfc2e4ae2c131f1e06bec2f11bb21e8eef7f23ea3360a5c6f3fd26295517f797d804075f028a3590efc4beca17d72af1fc65fed5101402663392ec44aada1634e75e8b28f9c9745f7b20173f5294aaed0b2288999a21e0a279677e8a3973e66a55cc3a90b2be653be1bdff22c6eab398760c07ff4c527619b37d5ba3b3f758b4823e4dbe1321442dc2a2711e5ad862ffad1b1ca65d943ef38510def100f3cc66dcf4f65783e473cfc2ed108e08683a07ca39e5e4e3fd9e7b92e91c59c93a22a70644ed35a5bf5401843ab75874b7c036309483ff0e7282f0a834b6ea4870fda5074837ec38a92962d4c3fbbf08a1c6d15149b9ffb4cd9749e9e072aa8bafc22c87113ddb152366707395b4bc2ec49238828f83193831e5b1c1d7e4d9af0898afbf993d241ed6fd3f9c8fe4f064346b4a545a36d8e09ba7f1ba43ce4e185d5552e412fbd9c72a83abacd27d83bc1b34c32df866258badd83a2a0c4c1f843125cf4e0eea66b101e3f2127ff95304c05b64a645716fb1d38cbc1d38cdca4b2169f5fe7b8d76b90dde063da92464713c028bf8052378a67a79f96f192522f47f73d978230b8d3af8030f18537128d11d342dbdcf285779689a311efd7890a693485c59d3d21761ee9cb00ba0d85404d337214f9281c4b0a62ce3fdf089c0508ca352d17892c15c745b956a71eb478c74733e5f9cfb415db85301a646db0237bdcd2a8aceaffb8ae2be4e7c263417975f74c7f896ebae73e745d63b5bcf28f7e435dbb5b5e49efd36f3f1153e6ca6b987c94dd538ecdca2a3cf17c4df47fd88e9555433d473f9ed6545d7821f5532c875d186a72c91fc4e94dad68f47d5d349a6ea138611a69339aaccdef8edfe68d1a2bf144e71f91ec656c7d7f039a94f6bfb573369ada574f9e6647b80dc02e4a27513665afd519e8abb7311982aedce3f8771eaea832e1d421ad9f519875978b69f6c7ffc00bca5af1a9b7d7797ddaa9bb88889faf75fdb15dfa47bef1d1f3e7a5a2bbf6861d31e6ad807502d66448c4b5c88b95f9d5194e5f5d4ee856f0ee499b28c506ded1eef559a67e1a64962ec3a58db4f3255f37f26d08715efb7d5e36b71c497646fb292f8285e5137997ffe52ba077a0be6cc916ec8e9ca11f2b444dfb81b656f38b5f3117f279b26cc29b417b62cd1950d252586cc06a4dabf9f509f4fbba79decd428c784af2fb8f5cae1e18ba15897e407a620b4044e6b44030397dbde6da3092bdec41f5b8db6ddc6ae716a527fae8c9618f4c3966466d5290d83d646ac8ea0868510a1d71ebf4e2a1b42f7c8f77855d618c80e6720e416ada9e9734b9ee250a9b9cb1b54040166a6dda9db6ebb8de7676da7930dadfc71ebe16bf71d2ecf6c6710afa19bc1b3bde86a60e44f2a3bf5d78c2c48de45f951cab6c94ee781bf8316f70e5eee4408ab9103630c8c0473787b59e859aa8035177134096f86981f5bac6ce7c002a51267477c77b3cd1e6b3687148095d869f210ed83d189db560d8caa7c379aabe7ba9ab304d0830aedde02f912676d15910c1213b5298bf48b6d914f82ddd9ceacebb6c1d60e6c7945754ce75e0a86d22c55ec0d624156529aee83937b8e658b3fa93b6cfae8cdb7932287a82914b71071cc228480353ab728b89a6938bbc4da5b44aed2b1f7d92a7981029a74eb56795a3e1581f391137d6f24095225ada3e4f767b9e9f64fd487d1b088e4e26497fa4df100cf787f69f0bd2c87052dc46f6afde6a5c056ddc22b87dc74e161f7131d1b9eb6a28ae0744aaa278c9362489f59776fe620093d3a39d105eea05911e85308cc612348a2d08b8805301e2b7384d6221712c20dec92f8818f7f36c24b8b3cf2c332a6c2d6a272367f3e55f1ed88e506cf379d39e05a423bf45e2190720c893156c97f4db65dd377dbfdf24fadcf4fbcda6efe4e0e04db27e16010755364efbd63c19a2c48d304deb528dee08668d70ac5d5eb5f1d48d05d80bb140143782f9c325e7f4cb2033326ccd87bbaa93c52373df5d79b36610c4d35ddbfef04c169b51ae3fe7201b380c865552a61f89b85315008f6627e326c15542bb072dab2f1503b6abc80d22d412adbdc67a801bf25b02ab8ae40e2d2e89e4ac29ff9f15bd3d1d20fb3432c246fb92763faf102cf31dc6ac9d2e481a86cc200fea55c70b0bf3d8e1d900a7d88d91c22aea76b7466ed556e723fcd23118b196f6c9ec5be8032d39302f42d040ac1c8eef790e563e64defafab9c07a626cdad2b57cb8139cbcdde589aed6687c7db02be0b5530ef605192dde8cde25a436247f05756daa8575084d34ca307be959cfa828ecdf836550a0224ab3d11e016f16f143c3d5e755ed2ca1bb259bce8f89fdeea2b384c9cef5fea37e66250cfbdf11128c6eae327becd5f4951ab00262aed79de855f9dc9d26e546cdcb90ddf7af9f6144db434e7cbc7db1d5d6b38b9d0cc5b99e7a73fd766f29b8ba865a44e89c164b284057b601231f2d3ae38e47b9afaa039b3fb5bbeccb6177fa5c1ab1c579df1bbc2d7e5487b296ff1ebbc63f8ff1890cc5223520054a727f77714dfdf045a89a406900c036eb3de553eebbe3613cfb8a0749a6335287d18795359d1f02f919d3ccf5887f88002eba652357d7bf0d0f43abfb9142093433dc578a42aa1c199e0f05f64671943681df301306fb3e6cb67780f82c95f7f79679795599099b6172c79b85019847248cd34cb6d14b4524c71ae692d2ae65b65a201b8eb39172b34933c0cbbaa592521b6b3b73319ada335cc0f1a1597b3767aa8ce47a0ba050151ced9effab202b98fd116060901e0e358ae1ef32d3a9dbfd68cb008bd88808a2e4d16ade8ebb8070224f90af418a881b08d3c2d3eaeb8b3496fe7aa4a6f4587e7307df9a3ff1d2782d1fa7e18c25f9d1f0346e623cf81cdad7a78e84d3a9564156cbc7dc4fe04f1a5e391b3f8e60d212e35660baf92cc291fde97047ece91", 0x1000}], 0x2}}, {{&(0x7f0000004000)={0xa, 0x4e20, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7}, 0x1c, &(0x7f00000043c0)=[{&(0x7f0000004040)="2a5d6cb47937b726e7b2d0f2df1c2ac4e0d1d15a558321b37bddbc8f98cbd9cd0698d79032ce53813eff3bd417d5404a91520d6a8bc35e9a5b7e05230a9eb300d162f879d1d2133a810078c97aea67f5b43abd3cef1e", 0x56}, {&(0x7f00000040c0)="2df39e923cab0baab8fe9e809a8e5c0feb262365f5beef03fa4ef4714f5e50a2fcd45da7e730080cbcb47d5318e918d2536dea5c51a3996f8af13f0ac5a581206818784efa85da17f13a0b5c5ac4d59993d9542711656d851292c093ab71993300c6b5dd966dd28b7ceeaeb48bf73d58933451fb1b0b9b48a8cad8e420070b62bfae5363bd9c64f68d308bf7584670cf85e1b96b870fa4fd1bf38cd0e8f9688bc0ebcd769b2d58761f79f6ead8b4dd9350a57bd71c09d6809a4f5771dc2fb73e777e2316311c7f6b08c8486f3563250e0482c320a4ce4880e5ee157bf1046750f6a0b06f7b0a69c8aacb60c35db38d2cf8bb", 0xf2}, {&(0x7f00000041c0)}, {&(0x7f0000004200)="bd08", 0x2}, {&(0x7f0000004240)="4d030b753a38838e0bfb39f1ff36e11ac0359bd31e5203f955ee73c7abffcef04d7428776435a52f553d696a91e44e01e91567cf768dadc06ba350daf17fea67cc3c654302d6188638fefe118ba92b", 0x4f}, {&(0x7f00000042c0)="b6b3a42534f853abfccda5f13f7608670a66a2f469bfc4dbe82ee0d9614db172eb02dab5af909826625d92f5b7b66cdb9607b2277e35b8ca71d559d3956da1913aafd55c3c4e75a3671b873b7f0f00c8215dc20ff81a3fc2ee6c039dd73f2e8150bb3ee47075b955db471af80ead3751fd97978b9ea79dd683fa1337a5ac7293ccab33fce714360e244e997c4155438454446b8e72b270f8675e7cf2944a82241a6a71e11ffb3a126418d3f8f849531377e5f9f296d7e7c1916e728181667535b6dc681954ad52eccd0a4c55b902cd3b12", 0xd1}], 0x6, &(0x7f0000004440)=[@hoplimit={{0x14, 0x29, 0x34, 0x7fff}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x9}}, @dontfrag={{0x14, 0x29, 0x3e, 0x7ff}}, @dstopts_2292={{0x1078, 0x29, 0x4, {0x84, 0x20b, '\x00', [@generic={0x3, 0x1000, "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"}, @enc_lim={0x4, 0x1, 0x1f}, @calipso={0x7, 0x8, {0x0, 0x0, 0x0, 0xb7a4}}, @enc_lim={0x4, 0x1, 0x6}, @generic={0x6, 0x45, "59791d36917545858f07ce4ea79ab5aa3d80c9597fb1fce69688c9cfed318fac75bc46552a154d91fb8b4399835dd1fb5ef652cca9d9b69b90a9f4d73b61385994934b4c38"}]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x101}}, @pktinfo={{0x24, 0x29, 0x32, {@loopback, r8}}}], 0x1100}}], 0x9, 0x800) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r9 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r10 = syz_io_uring_setup(0x4d4f, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x3, 0x200000}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r13 = io_uring_register$IORING_REGISTER_PERSONALITY(r10, 0x9, 0x0, 0x0) syz_io_uring_submit(r11, r12, &(0x7f0000000280)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index, 0x0, 0x0, 0x0, {}, 0x0, {0x0, r13}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000059c0)=@IORING_OP_WRITEV={0x2, 0x0, 0x4007, @fd_index=0x4, 0x81, &(0x7f0000005980)=[{&(0x7f00000057c0)="c519245856e3a935c9f78ad1979c4e53f4fbb5813bad7be1dbdf692ff23f99f377ce8566a9cfd5b7ebd0f4a9e4e98d5c83f4953ff51a17832059170eadc17cf6b36b4b358c277f2202e902f07c922e86131b1bd19a511a1ebbfa115eb8bbd024fb65206a79eb9a2076a7f8e7b84b7605d3efd1b4f15b586ff965692235926a903bab47587004476fdbc08a53a195afeac768bf80b511943eeea896615438df6452b87077ea3452633da6b6b2949970932033a7e7ed7effa7f70b20785b3847dda93551492567d438c677", 0xca}, {&(0x7f00000058c0)="919858bfc45b38d8704090503de80417a8bfcee5c1194c0e4565bf5563337078de2573487803efad6b31d4124921080f9776a7c4c317649874b6fa08ce1cb904c87398fa1b44237f9403be2362cd88782cfcbc14ce602c39e1a5e6221a32ec98da16df44d8793847a8fb9a433c", 0x6d}, {&(0x7f00000041c0)}, {&(0x7f0000005940)="d2d25cc23b4b50c3d5fb18e19084189397945fb4f6ac2d0bc43c193ceed5a2f9f3827077648efeedfa3a578d179498b2aed578c420608c03f1e3", 0x3a}], 0x4, 0x7, 0x0, {0x3, r13}}, 0x6) getdents(r9, &(0x7f0000000540)=""/126, 0x7e) 21:35:48 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, 0x0) 21:35:48 executing program 0: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4305, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ADD_IFACE(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000002100000009001f00706879310000000005002000010000000c000500000000000000f481"], 0x34}}, 0x0) sendmsg$IEEE802154_LLSEC_DEL_KEY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x40, r2, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [@IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x1}, @IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x1}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_SHORT={0x8, 0x2c, 0x676}, @IEEE802154_ATTR_SHORT_ADDR={0x6}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x40}}, 0x4048011) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x40, r4, 0x1, 0x70bd29, 0x25dfdbfd, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0202}}, @IEEE802154_ATTR_DEV_TYPE={0x5, 0x20, 0x1}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x40}}, 0x40041) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:35:48 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0xdf0f0000) 21:35:48 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0xf, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:35:48 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x200000000000000) 21:35:48 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(0x0, &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:35:48 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) r1 = request_key(&(0x7f00000002c0)='rxrpc\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f0000000340)='\'!%=\x00', r0) add_key$keyring(&(0x7f0000000180), &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r2) r3 = syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xffff, 0x0, 0x0, 0x80028, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r3, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:35:48 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x300000000000000) 21:35:48 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, 0x0) 21:35:48 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x10, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:35:48 executing program 0: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4305, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ADD_IFACE(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000002100000009001f00706879310000000005002000010000000c000500000000000000f481"], 0x34}}, 0x0) sendmsg$IEEE802154_LLSEC_DEL_KEY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x40, r2, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [@IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x1}, @IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x1}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_SHORT={0x8, 0x2c, 0x676}, @IEEE802154_ATTR_SHORT_ADDR={0x6}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x40}}, 0x4048011) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x40, r4, 0x1, 0x70bd29, 0x25dfdbfd, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0202}}, @IEEE802154_ATTR_DEV_TYPE={0x5, 0x20, 0x1}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x40}}, 0x40041) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:36:01 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) getdents(r0, &(0x7f0000000540)=""/126, 0x7e) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0x541b, 0x0) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000000), &(0x7f0000000040)={'L+', 0x6}, 0x16, 0x1) 21:36:01 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x5f, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:36:01 executing program 0: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0xc88cb1dc2d204c4d, 0x0, 0x0, 0x0, {0x73}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:36:01 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x400000000000000) 21:36:01 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0xe40f0000) 21:36:01 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(0x0, &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:36:01 executing program 6: perf_event_open(&(0x7f0000000480)={0x4, 0x80, 0x0, 0x0, 0x0, 0xff, 0x0, 0x4305, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x3244820, 0x0) keyctl$set_reqkey_keyring(0xe, 0x5) r2 = socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), 0xffffffffffffffff) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000300), r0) sendmsg$IEEE802154_ADD_IFACE(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x60, r3, 0x10, 0x70bd29, 0x25dfdbfc, {}, [@IEEE802154_ATTR_HW_ADDR={0xc}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0302}}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}, @IEEE802154_ATTR_DEV_TYPE={0x5, 0x20, 0x1}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy2\x00'}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy0\x00'}, @IEEE802154_ATTR_DEV_TYPE={0x5}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000805}, 0x40010d0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(r2, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = creat(&(0x7f0000000180)='./file0\x00', 0x171) recvfrom$inet6(r4, &(0x7f00000001c0)=""/5, 0x5, 0x10001, &(0x7f0000000200)={0xa, 0x4e24, 0x800, @private2, 0x1}, 0x1c) faccessat2(r1, &(0x7f0000000240)='./file0/file0\x00', 0x4, 0x0) 21:36:01 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4305, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ADD_IFACE(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000002100000009001f00706879310000000005002000010000000c000500000000000000f481"], 0x34}}, 0x0) sendmsg$IEEE802154_LLSEC_DEL_KEY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x40, r2, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [@IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x1}, @IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x1}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_SHORT={0x8, 0x2c, 0x676}, @IEEE802154_ATTR_SHORT_ADDR={0x6}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x40}}, 0x4048011) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x40, r4, 0x1, 0x70bd29, 0x25dfdbfd, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0202}}, @IEEE802154_ATTR_DEV_TYPE={0x5, 0x20, 0x1}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x40}}, 0x40041) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:36:02 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x500000000000000) 21:36:15 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0xe80f0000) 21:36:15 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', 0x0, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:36:15 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:36:15 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x600000000000000) 21:36:15 executing program 0: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0x541b, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x726029d4fb0c9567, r2) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) r5 = dup2(r4, r3) r6 = openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)={0x42201, 0x1b9, 0x4}, 0x18) renameat2(r5, &(0x7f0000000180)='./file0\x00', r6, &(0x7f00000002c0)='./file0\x00', 0x1) 21:36:15 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x400}, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r1, 0xc020660b, &(0x7f0000000040)) openat$cgroup_ro(r1, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000540)=""/126, 0x7e) 21:36:15 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4305, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ADD_IFACE(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000002100000009001f00706879310000000005002000010000000c000500000000000000f481"], 0x34}}, 0x0) sendmsg$IEEE802154_LLSEC_DEL_KEY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x40, r2, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [@IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x1}, @IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x1}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_SHORT={0x8, 0x2c, 0x676}, @IEEE802154_ATTR_SHORT_ADDR={0x6}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x40}}, 0x4048011) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x40, r4, 0x1, 0x70bd29, 0x25dfdbfd, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0202}}, @IEEE802154_ATTR_DEV_TYPE={0x5, 0x20, 0x1}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x40}}, 0x40041) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:36:15 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0xc0, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:36:15 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x700000000000000) 21:36:15 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x8000000000000) 21:36:15 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', 0x0, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:36:15 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0xec0, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:36:15 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000180)='net/ip_vs\x00') keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:36:15 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)=@getae={0x1bc, 0x1f, 0x400, 0x70bd2a, 0x25dfdbfd, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0x2}, @in6=@local, 0x37, 0x3504}, [@user_kmaddress={0x2c, 0x13, {@in6=@remote, @in=@remote, 0x0, 0x2}}, @algo_aead={0x13f, 0x12, {{'gcm(sm4-generic)\x00'}, 0x798, 0x200, "75a05027af4e46d1ca4c4b641e38421d1f4b87bd58c8cc4885ac827f52ca3ab841527896de1b7eedacc30398a393d4f88abfbf318de50b6ff417964f336c7fbe075948986babb3297b3d9b7ab8b90a605f39708abc8d662a070154c5ecf24ad962cb428fc628b6e415c38728c9d8d8fb48bc22c76354bb93bdd036cd02aa0567ecba6e506fc0244f3ec692662e9c7addc0b7aec5a8968a9ed0f925b343d08863826ce72e90bba834e4913bd918753aab95b51a65f606c71ca6a52e2c7a265dabed6ad8fd77b128e7ca35773397f0d2a72847107c96251e527bdce17d4b67fed64afc6fd832ab14837642f1465d7eeb3bacef1b"}}, @replay_val={0x10, 0xa, {0x70bd2b, 0x70bd26, 0xffff}}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x41}, 0x8800) getdents(r0, &(0x7f0000000540)=""/126, 0x7e) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0x541b, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0x541b, 0x0) copy_file_range(r1, 0x0, r2, &(0x7f0000000000)=0x2, 0x8, 0x0) 21:36:15 executing program 0: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0x541b, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x726029d4fb0c9567, r2) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) r5 = dup2(r4, r3) r6 = openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)={0x42201, 0x1b9, 0x4}, 0x18) renameat2(r5, &(0x7f0000000180)='./file0\x00', r6, &(0x7f00000002c0)='./file0\x00', 0x1) 21:36:15 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) 21:36:15 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', 0x0, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) [ 2023.631842] FAT-fs (loop5): invalid media value (0x00) [ 2023.632900] FAT-fs (loop5): Can't find a valid FAT filesystem 21:36:15 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x800000000000000) 21:36:28 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, 0x0, 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:36:28 executing program 5: r0 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x13, 0xffffffffffffffff, 0x8000000) r1 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(r0, 0x0, &(0x7f0000000180)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x1, 0x2007, @fd_index, 0x3, 0x0, 0x0, 0x14, 0x1, {0x1, r1}}, 0x5) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r3) r4 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r5, 0xc020660b, &(0x7f0000000040)) openat$incfs(r5, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r4, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r2) 21:36:28 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x33fe0, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:36:28 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r2 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ASSOCIATE_REQ(r3, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r1, 0x300, 0x70bd26, 0x25dfdbff, {}, [@IEEE802154_ATTR_COORD_HW_ADDR={0xc, 0x9, {0xaaaaaaaaaaaa0202}}, @IEEE802154_ATTR_CHANNEL={0x5, 0x7, 0x9}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x24004001) faccessat2(r2, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:36:28 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x100000000000000) 21:36:28 executing program 0: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0x541b, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x726029d4fb0c9567, r2) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) r5 = dup2(r4, r3) r6 = openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)={0x42201, 0x1b9, 0x4}, 0x18) renameat2(r5, &(0x7f0000000180)='./file0\x00', r6, &(0x7f00000002c0)='./file0\x00', 0x1) 21:36:28 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0/../file0\x00'}) ioctl$F2FS_IOC_FLUSH_DEVICE(r1, 0x4008f50a, &(0x7f0000000040)={0x8, 0xc79a}) getdents(r0, &(0x7f0000000540)=""/126, 0x7e) 21:36:28 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0xa00000000000000) 21:36:28 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x200000000000000) 21:36:28 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x1000000000000000) 21:36:28 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x200005a4, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:36:28 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, 0x0, 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:36:28 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x300000000000000) 21:36:28 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', 0x0, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:36:28 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x400000000000000) 21:36:28 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) getdents(r1, &(0x7f0000000540)=""/126, 0x7e) lseek(r0, 0x7, 0x3) mount$bind(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x4002, 0x0) 21:36:28 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, 0x0, 0x22a000, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$lock(r1, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x4004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffd, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) 21:36:28 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x900000000000000) 21:36:41 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x1f00000000000000) 21:36:41 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x7ffff000, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:36:41 executing program 6: r0 = getpgid(0x0) syz_open_procfs(r0, &(0x7f0000000640)='net/hci\x00') r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x40, 0xfa, 0x0, 0x4305, 0x1842, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000001c0)={0x0, 0x0}) ioctl$F2FS_IOC_RESIZE_FS(r1, 0x4008f510, &(0x7f00000002c0)=0x100000000) fcntl$lock(r1, 0x26, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x81, r2}) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r3) r4 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x6000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000500)={{{@in=@empty, @in6=@loopback, 0x4e22, 0xff01, 0x4e24, 0x74d, 0xa, 0x1a0, 0x120, 0x3c}, {0x8a3, 0x7fffffff, 0x4, 0xddcb, 0x5, 0xfff, 0x3, 0x10000}, {0xffffffffffffffc1, 0x9, 0x5208ae3c, 0xffffffff}, 0x8, 0x6e6bbb, 0x1, 0x1, 0x2, 0x3}, {{@in=@empty, 0x4d5, 0x18}, 0xa, @in=@empty, 0x34ff, 0x1, 0x2, 0xff, 0x8001, 0x7f, 0xaa55}}, 0xe8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r4, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:36:41 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', 0x0, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:36:41 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x420f000000000000) 21:36:41 executing program 0: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0x541b, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x726029d4fb0c9567, r2) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) dup2(r4, r3) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)={0x42201, 0x1b9, 0x4}, 0x18) 21:36:41 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) getdents(r1, &(0x7f0000000540)=""/126, 0x7e) r2 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4, 0x13, 0xffffffffffffffff, 0x8000000) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000000100)={r0, 0x6, 0x10001, 0x100}) r4 = syz_io_uring_setup(0x71fe, &(0x7f0000000180)={0x0, 0xc9df, 0x0, 0x3, 0xffffffff, 0x0, r3}, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000340)=0x0, &(0x7f0000000140)=0x0) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r7 = syz_io_uring_setup(0x71fe, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000340)=0x0, &(0x7f0000000140)=0x0) r10 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) syz_io_uring_submit(r8, r9, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r10, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2}, 0x80, 0x0}}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r7, 0x0) r11 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r7, 0x8000000) syz_io_uring_submit(r11, r9, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80000001) r12 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r12, 0x541b, 0x0) syz_io_uring_submit(r5, r9, &(0x7f0000000000)=@IORING_OP_WRITEV={0x2, 0x3, 0x0, @fd=r12, 0x8001, &(0x7f0000000040)=[{&(0x7f0000000940)="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", 0xff4}], 0x1, 0x18, 0x0, {0x2}}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r4, 0x0) r13 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r4, 0x8000000) syz_io_uring_submit(r13, r6, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80000001) syz_io_uring_submit(r2, r6, &(0x7f0000000000)=@IORING_OP_MADVISE={0x19, 0x0, 0x0, 0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x10}, 0x7) 21:36:41 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, 0x0, 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:36:41 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0xfffffdef, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:36:41 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0xba0f000000000000) 21:36:41 executing program 6: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) r1 = getpgid(0x0) syz_open_procfs(r1, &(0x7f0000000640)='net/hci\x00') r2 = dup3(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x7f, 0x9, 0x1f, 0x0, 0x100000000, 0x100, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x90, 0x1, @perf_bp={&(0x7f0000000180), 0x8}, 0x0, 0x14000000, 0x3, 0x4, 0xfffffffffffffffe, 0x9, 0xffff, 0x0, 0x1abe, 0x0, 0x5}, r1, 0xc, r2, 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r3) r4 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r4, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:36:41 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x2000000000000000) 21:36:41 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x4800000000000000) 21:36:55 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:36:55 executing program 0: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0x541b, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x726029d4fb0c9567, r2) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) dup2(r4, r3) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)={0x42201, 0x1b9, 0x4}, 0x18) 21:36:55 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0xdf0f000000000000) 21:36:55 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000004180), r2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg$unix(r4, &(0x7f0000003f00)=[{{&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000400), 0x0, &(0x7f0000000700)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x80}}, {{&(0x7f0000000780)=@abs, 0x6e, &(0x7f00000008c0)=[{&(0x7f0000000800)=""/33, 0x21}, {&(0x7f0000000840)=""/87, 0x57}, {&(0x7f0000000940)=""/73, 0x49}, {&(0x7f00000009c0)=""/141, 0x8d}], 0x4, &(0x7f0000000a80)=[@cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x50}}, {{&(0x7f0000000b00), 0x6e, &(0x7f0000000cc0)=[{&(0x7f0000000b80)=""/164, 0xa4}, {&(0x7f0000000c40)=""/112, 0x70}], 0x2, &(0x7f00000041c0)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRESDEC=r3, @ANYRES32=0x0, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="2a89c9a1c245289500000000b0baf41a605eae56", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x88}}, {{&(0x7f0000000dc0)=@abs, 0x6e, &(0x7f0000000e80)=[{&(0x7f0000000e40)=""/18, 0x12}], 0x1}}, {{&(0x7f0000000ec0), 0x6e, &(0x7f0000001100)=[{&(0x7f0000000f40)=""/29, 0x1d}, {&(0x7f0000000f80)=""/110, 0x6e}, {&(0x7f0000001000)=""/39, 0x27}, {&(0x7f0000001040)=""/128, 0x80}, {&(0x7f00000010c0)=""/62, 0x3e}], 0x5, &(0x7f0000001180)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x70}}, {{0x0, 0x0, &(0x7f00000034c0)=[{&(0x7f0000003280)=""/25, 0x19}, {&(0x7f00000032c0)=""/87, 0x57}, {&(0x7f0000003340)=""/133, 0x85}, {&(0x7f0000003400)=""/170, 0xaa}], 0x4}}, {{0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f0000003500)=""/71, 0x47}, {&(0x7f0000003580)=""/161, 0xa1}, {&(0x7f0000003640)=""/215, 0xd7}, {&(0x7f0000003740)=""/89, 0x59}, {&(0x7f00000037c0)=""/163, 0xa3}, {&(0x7f0000003880)=""/239, 0xef}, {&(0x7f0000003980)=""/11, 0xb}, {&(0x7f00000039c0)=""/36, 0x24}], 0x8}}, {{&(0x7f0000003a80), 0x6e, &(0x7f0000003c00)=[{&(0x7f0000003b00)=""/154, 0x9a}, {&(0x7f0000003bc0)=""/54, 0x36}], 0x2, &(0x7f0000003c40)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000003c80)=@abs, 0x6e, &(0x7f0000003ec0)=[{&(0x7f0000003d00)=""/195, 0xc3}, {&(0x7f0000003e00)=""/121, 0x79}, {&(0x7f0000003e80)=""/31, 0x1f}], 0x3}}], 0x9, 0x40000040, &(0x7f0000004140)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r5, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) io_uring_enter(r6, 0x45bd, 0x9fce, 0x3, &(0x7f0000000200)={[0x1]}, 0x8) 21:36:55 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'os2.', '\x00'}) getdents(r0, &(0x7f0000000540)=""/126, 0x7e) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000018c0)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f00000019c0)=0xe8) fork() [ 2063.380512] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2 sclass=netlink_route_socket pid=11391 comm=syz-executor.7 [ 2063.392100] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2 sclass=netlink_route_socket pid=11391 comm=syz-executor.7 syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f00000001c0)='./file1\x00', 0x9, 0x9, &(0x7f00000017c0)=[{&(0x7f0000000200)}, {&(0x7f0000000240)="d2f7b8effa1916db729e7b7aa4be151da6caafb4abd1c9b61f434e875f5ab5055767621723aabcd8907174be6d2de171732e2660b8ac5c3a66450b70dd03fd1e8a10f1df9515c98bd6be6147fb5c82817cd006056a9a32c6aed1e779", 0x5c, 0x9}, {&(0x7f00000002c0)="01feeb869f91995b15014481db2d761f5fe477bd16be3c62ca52e506e4b71cc23d2f687b8c0280738396e07c0cfa2b79245f636466a3877c24269de03872e6c0e4faf6349ec832988c0a00b00b7395f2efc7e49fcac5aa651da0c961d75a756c9b61e3af0765bee8199bf1f196b36543ab35be8e51b1227c8c9bc24247f2916868e3e2b8fc9de10604a1c4928264ccde4c40e30deafdb4", 0x97, 0x80000001}, {&(0x7f0000000380)="47972c08296940a9f1a0a31e32a06ea13c8afdc692aacd3c0284e9853204e216f820aa6b5bb3b06cbbed258e4b6833761aefb1f267a5b5928e313ef498fca8f866d97a2b347315b948469c594d8171c79142f512a47c06e19c890298d14fb33e39676ff808b95d801714e0455edcc8e2", 0x70, 0x3}, {&(0x7f00000005c0)="030713a940fe8bc22cb7f5683dc8dc16d2702678104f1f5f5ccf0315df8f3de51f56af3f41172e9b78f71385bb9e4ac70e7d06fa66e6b4f360025fb6c9190f828fad96238ad834dc66136c114ee42bacd8efb6d43380df770be5044131e4647bd3c552a91a0212c37d648f0a18b30054292c468cccb2cbd8b494e322d31d05328d1bd3a0eeb3ca6e518916b5fa6bfecacd0488e24d6e734b40c67c1a37011a668ac87400a210006f6b7339d6ac88fa734c5c7c9e52e54dea2571f252bb8f459d439b30b6fcf28b60325638361a7958717c720f5d1ac5cd46748c109827378c9daa95fb5bf92c453961c2aa59d08542f881865b9e203f9bff67ea0a3026184c08e5e072c9e69dc53ee0059ea77a691202907035f41ab42cb122e56451a2a40ee886af7423979a60113ff1e4cda1b54e9f2c1bb332c0bde834a0e292464b69703241aa72d9acae174cf55feee6565bb36b9890f117ffb74e543c4a8b29280d208d762ad4bdb9ea9ca2b43b4e7fce3464d8fe6aa5cfb5152d8be8dcc8f370bb3a7c794fc927c53f998bbdae8a18c09b509ebe981c83ac6148bd5d196eb680bf1664e76eceeabaa8e3dfe7a2aa2c229dc0028025b966975576431aa132c8285eab76ffe81ebee54477b6530954aa4e59704ba1e460c23860bf6aad733a4621182d02b196aeaa2e02e83d8e0cb919c29177358e4a39198e9a9be775ebbf71ec7b527efa0570e0d12422b1f88895768cd9c9b9c3d20501144ed13c59d0b7900e1f1ea490c2af298d175c2418fc608f8516b9c731cd4cce71180c27a282e6f7711ebc2f3cb61e4c031070266d07528a4f05c7f14a558bb7378976f940e001c686e42cb672ab3932168a797b0c31b3c8f20524f2fe9da3e50cd94af871b8512d0e0c19842faeaae6e7e4b0a583fc618392bb8349fa8049300d7a32f98e1d655332d01ddf4c55bba65be13daed0c92bbc9aab6bef549d42016a991fefc5ece3dc10871894c7d3cfd468a919f4a8aaab4a7b28b3d5a24674eb71b11d2b4a362b27c8548bfe6775854e7503ce11f4c42935b120e2fb073a78fc19a14e29030b27f11bdcf801fe034bdb2a8e09065bafc26cfae6ee9edb77a4c2c61f0e4823ebda5005d1770c55f38901f4a0af03939106d10967909b17a020c9ee5a5dd1b1299587c612b3645c2c2945fab7516de94ddbb67cb3163db597553e8c9f0fd711783878a39b0dacd1bd1e7154fdc757ffde877b2f98e6bd26a8a053e6423c9c617082556d00eeaba273c13b806cea89ea5585f2e35cab46a0e2e06aa4cf1850881542aded02eec4f46c5af6df24c627597c03bcaee53bb66f3e6dba5eaa3579f95bf353cabb39e219285bfcec073cd32a146bb210755f17fe6da285ea963501d1709e1b06b6a52d246c6d3a2a0a3ddbdad54febc218f34a9684f932afbec02b2a627aa9f4c784ca69d52432a4fd8135cbae37498edbdf7827b869e231a1d224a78d77eacaa55cee86fa358a073ed56151779628aa751c18f1b5b6c162b40b5c77cdd727e937694231c64a4eccd797ecdd6b4257193e4742ae9645b7e0959ec759a9bec732ce32104325782762af510860a6efc4526c55d17fd6bf32c026392127b76e969b4e3d7780d6d12d6a42675498c1ff086c26c71f78ee4133538d948c0bd14df7119f8ce8fcbe2fe47b14f68658dba091b3b5f4381a7f24917f551e06075a428aa1db9bae62a9708345d82641aaac24e559eeae3880bd0e67d53600ad8c7c4179be29f98ec5a8548a699b3cb9fd32f430d78aff9fad6e9d7ab45d04cbf8402881bce0f73f9f522b5513ed6d91f5551f145560b6d868abd78eccc3ec4721af8a47d0a670a64bf68cd28c4a957ace53d8f2137e7afe34fbe5a73b246920987c9e5e7d3673848e76032cc530c5ff20a0028848cc32717caac264f01a019bf7045c5d3311404546fa717045e99cf9761b16b8ad206d0d87e7e73f4670f774f33af7f596c978aac508d8b4d37029ccb22e8878fd2be95517a09fc088c814187d2e49c61a208a244ba2343ceba5fb7ed9e787c9aa27dd417f52fdbc838bec07ff9154432dc162c5f638f1798f47ad1de48fd672228899c25603fd57c6817587b12d0292e5479a50ab41f88ed4bfc0ea03116f25d66a6f9a71a613f85982ecc5ce40e0e133c54ff30c07657c9e7b845d47fcfdd766f796677d0d0d89ff486766ede9a9e9d08e43d001c3a7c3960997175b8d629abc30bd6e13ee7b7769c14c66ea6c6edfa8b8ab9f6ba13510b1780044f5e768617670800a0887a8b3ea855cf0619a49f750cc969b47a0dd6661714fcd492e4eea39138a67feb0dca311180d4387ed06e15e0a0ef307bd71ef7d1cd248ec8963a16ab3e2695f7bca3a68decda09a8a5672af676e1b1b62ef6b981fb4f183bf856205616239ba915915d1896c542898afba98dd382167f8795f6bd4934caeef56a6af8292e19cb66bb29fc969d5d4532571c060ff1998283168992dd50e49b1356eb9ad67123fed754c1c694bcbbb510880c462526c59a18b8f0c500944a16fd1949627fd69723199e5d2bc818cb88a869eb302a6f910ee905262268a121312ce03d87ec7c48e0f2a7dfa96b623939d0620c4b6be83176878e512a67a4a99de9d4569a858590e081cea6eb543f8841e6824416eb0205c33dcbca15717524581af9e5807a5fe471e2fa92a4eb8717cd4751e90a9b9d65e8a8368eda693dc965fe0195fd80843efed65ac14e73d6ac58be7e0d8de3770e063a88f6b2ddeed419d139e3ee2d8eac5dec6e0859abaacf5df1db97445a7a9332c019ffe6e83e3703e505dda05eac0084f37c0d062498787a5e4ec70282c57ea746a3f22c9961c035dcb229da9b517ba37e9b930ad45523c92784f8e44d2b3b5742960f117e725b2431ab3a8a2a4d2be565d0e1af95708d6f5b3fe55f9edf4a264aa282c7fda661b8efca9274cc4fcfc0d4556d4d7ae3c3f16a4b44b72cf7306879eff3cba81ba3502c2dd8b33502f2a2b60d267fe6c498a7ac0d10bb89b64617385bb65f2138af582f5cf1cd8d52e2d69bddc0408be053bef6b802d9cd8a6c1efe2c5b3c16514fedf6e324f4e18cdc5da02ed2a3a0c7d48053f89d20b7874e425fe1625142b33512dec5e5159e93ff888179215c81d3f888a95646bd47e1f8ba3442751d56704da43c957ccfeada55910cf12b70cb10ad17620ae67e9f9f27e7a3eb5dda2ab3510ea474fa052918cd3b4afd21def6930a65ad07b890bc5d179aaa382d8e59fc912c1f47db0f17d8c450e8afbea5e6b10bd62feb390e1c30cca37b6c8e3ae4505f72c9c6380e7da89aa0e164af29655afb94000bc0a26665c252d75df83a9e5f7ee74855d61b2850f607bd3ba6888863d0b3d83873fdd9faad1b5ba6d2270430db95b0e57f908210e96fa585778e77fcb147b20a8d2c2d1e51cbebc1f028f1ad2180af343fef56066b6ec6cdd5c6ae4f9b105ff32e80dd130353dbf1593a584a65ce64ba8312a64867c01106ccc680db051ba522ecc01794673d544b9ea2d1b63c13829ed6b10d3c53eba4d6f750a47e4d850625a0186d50b30dd79bdb94ae8486ab19080876f2ce9e0e327529c1a0d70c0f8cb1f2ed7c371f07b441b00fbddabcebaf80e5e62f68baf408a291c939295a92f7a69c3589bb1b946ad88696d42db4f0ebfd8b87ba1cc5c02f7872b2c35ccabdc190c8bad3fc5fd144d381388b2580d85639e66bf3e21940ee6a68dc9fc218967c313a133663a848adbc5d150ae398126f12b29e4af5d002ec4d5667a7919026c5a6350e6fdc472402385d7534d9a5a112547f596bfcef3621490f6b0cb59e8bcbe3eb6ce6866ed55eca997de2419fc73e38b66393dfc5c9610261300ee0f201db75660cd8fc5f901bc755fdff30232478a6f06a12fa7af30b149c1a93257532cb8568a43b795b521800030db1f46c34782b1a819539ae533caa3f7c6c8304eaa3b628bffe4110edefa4c67c84d5e9ead561d781717bcfa080e59e41e3b6635631e64e3dc81812ef468dcff84976cd97286476870fef4c2895965941b7813526fbd26c2b26e20469ab7d429d76145b7f22bb95f1d3a127aade76a287db958b2dd01edaa2b91b7cb3891bf8c2c920ee27ee574051fc0ab490e86c5243d616c9b7fd9820cedf07a95b6f7a783ab8071469ecfdb4b2b70a8d2898b151b2c0207db5bcd2f6e5bf3e5fc6941983adca8bace6d1a20f13cddc9e1c10f55321e1b30577ffa236806e30eb116033397570da86a2f74b15f82db25c05259355cdeab087e53f05c31d8874c656c4fb4d9dc7b4a614670b74bebaa6d8222fedd6a15d5d04cc37a6bbf7a4a89d8a5485e487c6c25179a526c8cef8560121e4ac6b574789f19f1db231ff25d8a913fc1f886ff82fc9e5e518974b7a2c03c7b63dde7476870bd3bcd87cd3d7b2fd23b4612b07c64e3c5e2ef4496ee9b4e036ded53ef3648223e83125991238f2b8ebec9e76605288712abeb5f50a1b740f75662ad521ec23b3e5de8a8cda0d17af1f796ef336619b07a5a5892feaeba4c7c8d3d23d3b8782b4d60ab5b898af16ebd1fc29e9ecd84108d3ff934efac7d88f3e310ce6136fd32219181bc5457766253bd86e1a5e0579d5749ab24071864e33d76ec69ad11710f14c592c5985d464e66e3d83088aa790519a39ae5f3f1a77bae7afc4665a436630720852785b45198c26ecc96bb8e2fd1442f4ee0a4fd76a61fe8cc5c5e378b8d42cff1b33a1cb57f62cf94a9a6a976abe6a460e2c44e9a0dba438982a1b956d52957b5dccd2b4c57e1bd7b94b9068d2cb83fed76a121d761629dde3ed879adb28d00457b447a00aa2cfeba541b3d95e6cf94a18b70a8df8a339c17ad06a16b5eeb300fcf3bd122e5345f336131ea8b9baec5a55018cb9593034b5c2b0bab7a6b2038801a446cce01e7346267fa34fe301e781a0b79c39d6b1ba48aea1c572637ed8e2da45f806449c085a29cfbf445e0b1060586dc1502c070da83ab1f074df21c30cbb712f893f99a341d6f152d82b7aee4a0def0080518d8f1f9f35c8bb25561e7d30941e7d6a3e4ef1237220d5e04d022417663637d3359d2c3feb4d7bf86503f53b7e7870c28bd221b63b36bdff6bcb6805036164175d2bb04f18751b2f5fed70192ba4c9a00790af7625f1c03b81c9a0e01c77898ce79df9ae5a98ed6d9ef32aaadf0ecabaf06aafb27ba459ec44de06dd26bcadb12c876c470c994ddafd7abb7c07ece3371c9f4959eac889e0abd3dba8486dd915f60973d1aa89a5b48d77c4d728d94fb67ce4a5d0da86f8f3f4e107c1709dfbad26ed587519e42573cb431d1ab2e08ee2b29e48cf0f044df39e3d9ee7d4516c05ba02232f5bbbd30843e99aed227ad8ff4b707cab61138b7c74d74c3c966cc450f86d857f0288d59cf175a402969e176c2389a9097c1e19b3f945b1bc2b5bf6fca86f4be746d1f3f809651de95cddac6d1f1e0b469df0b7416d0fc645ad04b6b499ea98cc974247bf4bb4f7b18ae7d65a858aaec8d9c0057cb9999bdf48361c7497a76505c07957f0bd8a1c194b618105b3d46755674d9601b093e134fab6793ca98d2075a5e46d2e1933e94a8ee204a3de25d206b19403fc453388d7c0f18dbedb452773657035dc861731988afd335731ddc2cf72036c61388c5f2ef9465f55d04ad88368755221d40948bc0910989e7d0292aa38f342926d155bd42540e9222c8419192925ba2cb69f3a92a4f68fcf5bbd38464df4759df49e3e9c79ebc41933f1433d5628ca4d8ffcd8f073534cd2d", 0x1000, 0x6}, {&(0x7f0000000400)="78483265b9ed064c9166c284acefe81988cec2ff7b431908304f2891ba69b300f0869bd8baabd09a36ab748cd3702cfd91479bb376536345067ebc19a1f7f7dc2ad95c2d6c20b3963d99519e48184e56b9b36ca2ffdc5a05ab388dad726a659a502d191725f8334c6a2d0144292e335fb15a5df5fad6b79050edb436bac63e3c8e98148fcabe30951cf9e74fa7bdcb353e9b54ca48c9a91855f8abb5d6535bbb7a627074e00048a2af52b8c1d586f710b6463372e3db3f15fc0800d5437b", 0xbe, 0x7}, {&(0x7f00000015c0)="8a6c1c525d9599f3386ce301d289153b10877f5c165ddf3e1a30665f0924772f07e1c75c8cf9ed2dff3b8f305b9756775b9a240fdd9d21db44f1ccf2e97ce498e7f0073c02cb3bdf947c6372a91add93c1dc327676f3b274f0cf21fc62bc3f44920375a853821e4c789a373e8a356eff683bc4513e752a9e0b28f44b060a6519439873ccdfd6ac422e51c7f4841985964e9675ced729e9602ab38dea14ce2f58be4c258ba0f7021b92aae630a10bafe5ffbe043d4be26a2335a34a30adbeb7c64642002efa797dabdf4132f8dd142d3d4723d8eec7e574eba81597ced758494eaa90f393cc4808bc6cd366931b24042af910a4dff5c8", 0xf6, 0x3}, {&(0x7f00000016c0)="59821d4b6f0aadce105a34894d07aead91565517d4aafeb07e00b333773036395f052454ec7534af8e94374178f9c7d222ac27033d54e539b8f00d63c54e18f54e86eadc51f829bd65d3a830670f0d87743d76a171d7d7662c6fca13bda335c7675d32a254fefab8088544d0939b8bef0be68ead8ef8317bd8e7fe93d179812173fc0dbca9ce0465714a8d2ab001f41896119b4e11c5b7b51f28d269ecc90f26e9d2739d9b28dc905bd6d948433c5bad134a7272c67c75b431b26cce929b6dcc79c65bb59af5afb1d7b5db50333591cb60350b298b487eea141a75a2bb6b0c540b804df0dd607240662e8d39fece4a3b7a5725a8", 0xf4, 0x4}, {&(0x7f00000004c0)="22072393ad3349fc5e457bd1e139f13d6a0e976d76ea5459d4dbc0f76205ca2072c6dc9fc23c5c1586acf1a3e6ff25bd7e69b6cb8b03a7cfce6d416de06465e792fcf25c374703ac6fa5eca69dfa8e7605737b954c6832622af14d002a92a94ece4ad60cbbee6bc8e2bdc3356c0020a736f6be", 0x73, 0x1}], 0x2020040, &(0x7f0000001a00)={[{@barrier}], [{@context={'context', 0x3d, 'user_u'}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@subj_user={'subj_user', 0x3d, 'vfat\x00'}}, {@dont_hash}, {@dont_hash}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@fowner_lt={'fowner<', r1}}]}) 21:36:55 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x2, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:36:55 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', 0x0, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:36:55 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x4c00000000000000) 21:36:55 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0x541b, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x726029d4fb0c9567, r2) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) dup2(r4, r3) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)={0x42201, 0x1b9, 0x4}, 0x18) 21:36:55 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x6800000000000000) 21:36:55 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0xe40f000000000000) 21:36:55 executing program 0: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0x541b, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x726029d4fb0c9567, r2) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) dup2(r4, r3) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)={0x42201, 0x1b9, 0x4}, 0x18) 21:36:55 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x3, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:36:55 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x80, 0x0) 21:36:55 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000004180), r2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg$unix(r4, &(0x7f0000003f00)=[{{&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000400), 0x0, &(0x7f0000000700)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x80}}, {{&(0x7f0000000780)=@abs, 0x6e, &(0x7f00000008c0)=[{&(0x7f0000000800)=""/33, 0x21}, {&(0x7f0000000840)=""/87, 0x57}, {&(0x7f0000000940)=""/73, 0x49}, {&(0x7f00000009c0)=""/141, 0x8d}], 0x4, &(0x7f0000000a80)=[@cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x50}}, {{&(0x7f0000000b00), 0x6e, &(0x7f0000000cc0)=[{&(0x7f0000000b80)=""/164, 0xa4}, {&(0x7f0000000c40)=""/112, 0x70}], 0x2, &(0x7f00000041c0)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRESDEC=r3, @ANYRES32=0x0, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="2a89c9a1c245289500000000b0baf41a605eae56", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x88}}, {{&(0x7f0000000dc0)=@abs, 0x6e, &(0x7f0000000e80)=[{&(0x7f0000000e40)=""/18, 0x12}], 0x1}}, {{&(0x7f0000000ec0), 0x6e, &(0x7f0000001100)=[{&(0x7f0000000f40)=""/29, 0x1d}, {&(0x7f0000000f80)=""/110, 0x6e}, {&(0x7f0000001000)=""/39, 0x27}, {&(0x7f0000001040)=""/128, 0x80}, {&(0x7f00000010c0)=""/62, 0x3e}], 0x5, &(0x7f0000001180)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x70}}, {{0x0, 0x0, &(0x7f00000034c0)=[{&(0x7f0000003280)=""/25, 0x19}, {&(0x7f00000032c0)=""/87, 0x57}, {&(0x7f0000003340)=""/133, 0x85}, {&(0x7f0000003400)=""/170, 0xaa}], 0x4}}, {{0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f0000003500)=""/71, 0x47}, {&(0x7f0000003580)=""/161, 0xa1}, {&(0x7f0000003640)=""/215, 0xd7}, {&(0x7f0000003740)=""/89, 0x59}, {&(0x7f00000037c0)=""/163, 0xa3}, {&(0x7f0000003880)=""/239, 0xef}, {&(0x7f0000003980)=""/11, 0xb}, {&(0x7f00000039c0)=""/36, 0x24}], 0x8}}, {{&(0x7f0000003a80), 0x6e, &(0x7f0000003c00)=[{&(0x7f0000003b00)=""/154, 0x9a}, {&(0x7f0000003bc0)=""/54, 0x36}], 0x2, &(0x7f0000003c40)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000003c80)=@abs, 0x6e, &(0x7f0000003ec0)=[{&(0x7f0000003d00)=""/195, 0xc3}, {&(0x7f0000003e00)=""/121, 0x79}, {&(0x7f0000003e80)=""/31, 0x1f}], 0x3}}], 0x9, 0x40000040, &(0x7f0000004140)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r5, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) io_uring_enter(r6, 0x45bd, 0x9fce, 0x3, &(0x7f0000000200)={[0x1]}, 0x8) [ 2063.523299] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3 sclass=netlink_route_socket pid=11409 comm=syz-executor.7 [ 2063.532824] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3 sclass=netlink_route_socket pid=11409 comm=syz-executor.7 21:36:55 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0xe80f000000000000) 21:36:55 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:36:55 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) getdents(r0, &(0x7f0000000540)=""/126, 0x7e) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000040)={'L-', 0x7f}, 0x16, 0x1) 21:36:55 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x4, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 2063.607928] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=4 sclass=netlink_route_socket pid=11426 comm=syz-executor.7 [ 2063.627430] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=4 sclass=netlink_route_socket pid=11426 comm=syz-executor.7 21:37:09 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x6c00000000000000) 21:37:09 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x5, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:37:09 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) keyctl$set_reqkey_keyring(0xe, 0x2) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:37:09 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) getdents(r0, &(0x7f00000001c0)=""/138, 0x8a) [ 2078.044463] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5 sclass=netlink_route_socket pid=11442 comm=syz-executor.7 [ 2078.064335] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5 sclass=netlink_route_socket pid=11442 comm=syz-executor.7 21:37:09 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:37:09 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0x541b, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x726029d4fb0c9567, r2) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) dup2(r4, r3) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)={0x42201, 0x1b9, 0x4}, 0x18) 21:37:09 executing program 0: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0x541b, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x726029d4fb0c9567, r2) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) r5 = dup2(r4, r3) renameat2(r5, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x1) 21:37:09 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000040)={0x2, 0x10000, 0x8001, 0x0, 0x7}) getsockname(r0, &(0x7f00000000c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001140)=0x80) 21:37:09 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0x104, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x4e20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in=@empty, 0x0, 0x2b}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}, [@coaddr={0x14, 0xe, @in=@empty}]}, 0x104}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000000c0)={'wlan0\x00'}) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x9, 0x5, 0xc3, 0xa, 0x0, 0x9, 0x64800, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x173, 0x4, @perf_bp={&(0x7f0000000000), 0x14}, 0x1, 0x8, 0x401, 0x4, 0x10, 0xffffff04, 0x0, 0x0, 0x8001, 0x0, 0x1ff}, 0xffffffffffffffff, 0xd, r0, 0x4) getdents(0xffffffffffffffff, &(0x7f0000000540)=""/126, 0x7e) 21:37:25 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='loginuid\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x0) 21:37:25 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(0x0, r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:37:25 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0xfffffffffffffffc, 0x2, &(0x7f0000000100)=[{&(0x7f00000001c0)="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", 0x126}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000080)=ANY=[@ANYRES32=r0]) syz_io_uring_setup(0x71fe, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000340)=0x0, &(0x7f0000000140)=0x0) r4 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2}, 0x80, 0x0}}, 0x0) getdents(r1, &(0x7f0000000540)=""/126, 0x7e) 21:37:25 executing program 6: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r1) r2 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r2, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:37:25 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x7400000000000000) 21:37:25 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0x541b, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x726029d4fb0c9567, r2) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) dup2(r4, r3) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)={0x42201, 0x1b9, 0x4}, 0x18) 21:37:25 executing program 0: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0x541b, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x726029d4fb0c9567, r2) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) r5 = dup2(r4, r3) renameat2(r5, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x1) 21:37:25 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x6, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 2093.790583] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=6 sclass=netlink_route_socket pid=11484 comm=syz-executor.7 [ 2093.804180] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=6 sclass=netlink_route_socket pid=11484 comm=syz-executor.7 21:37:25 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0x541b, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x726029d4fb0c9567, r2) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) dup2(r4, r3) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)={0x42201, 0x1b9, 0x4}, 0x18) 21:37:25 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x7a00000000000000) 21:37:25 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(0x0, r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:37:25 executing program 2: mlock2(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1) syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') 21:37:25 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x7, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:37:25 executing program 0: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0x541b, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x726029d4fb0c9567, r2) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) r5 = dup2(r4, r3) renameat2(r5, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x1) 21:37:25 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) getdents(r0, &(0x7f0000000540)=""/126, 0x7e) openat(r0, &(0x7f0000000000)='./file1\x00', 0x40000, 0x11a) 21:37:25 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = fsmount(0xffffffffffffffff, 0x1, 0x8) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r0, r1, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r2) r3 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r3, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) [ 2093.993947] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=7 sclass=netlink_route_socket pid=11513 comm=syz-executor.7 [ 2094.006674] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=7 sclass=netlink_route_socket pid=11513 comm=syz-executor.7 21:37:25 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') readv(r0, &(0x7f0000000100)=[{&(0x7f0000000040)=""/191, 0xbf}, {&(0x7f0000001140)=""/246, 0xf6}, {&(0x7f0000001240)=""/135, 0x87}, {&(0x7f0000001300)=""/240, 0xf0}], 0x4) pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x0) 21:37:25 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') r1 = fsmount(r0, 0x1, 0x1) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x200840, 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f00000012c0)={0x0, 0x0, 0x4, 0x0, '\x00', [{0x0, 0xfffffffe, 0x0, 0x3, 0x0, 0x2}, {0x7, 0x2, 0x2, 0x9, 0xffffffffffff2c29, 0x7fffffff}], ['\x00', '\x00', '\x00', '\x00']}) write$binfmt_elf64(r2, &(0x7f0000001140)=ANY=[@ANYBLOB="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"], 0x169) pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x0) 21:37:25 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='loginuid\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x0) 21:37:39 executing program 3: perf_event_open(&(0x7f0000001d80)={0x3, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x3}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0x541b, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c213a0d8e732e66617400020801000470008400f801", 0x17, 0x100000000000000}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) getdents(r1, &(0x7f0000000540)=""/126, 0x7e) 21:37:39 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(0x0, r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:37:39 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:37:39 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='loginuid\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x0) 21:37:39 executing program 0: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0x541b, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x726029d4fb0c9567, r2) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x1) 21:37:39 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0x541b, 0x0) r2 = accept(r0, &(0x7f0000000080)=@nl, &(0x7f0000000000)=0x80) dup2(r1, r2) 21:37:39 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x0) 21:37:39 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x8, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 2107.757552] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8 sclass=netlink_route_socket pid=11553 comm=syz-executor.7 21:37:39 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='loginuid\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x0) [ 2107.781350] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8 sclass=netlink_route_socket pid=11553 comm=syz-executor.7 21:37:39 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x9, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:37:39 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0x541b, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f00000011c0)={{0x1, 0x1, 0x18, r1, {0x200}}, './file0\x00'}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000001200)={0x6, 0xb2ce, 0x0, 'queue0\x00', 0xb56}) read(r1, &(0x7f0000000040)=""/243, 0xf3) pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x0) accept$inet(r0, &(0x7f00000012c0)={0x2, 0x0, @multicast2}, &(0x7f0000001180)=0x10) 21:37:39 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x4}, {0x0, 0x0, 0x6}], 0x0, &(0x7f0000000240)=ANY=[]) getdents(r0, &(0x7f0000000540)=""/126, 0x7e) 21:37:39 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r0, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) [ 2107.874086] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=9 sclass=netlink_route_socket pid=11564 comm=syz-executor.7 [ 2107.885208] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=9 sclass=netlink_route_socket pid=11564 comm=syz-executor.7 21:37:39 executing program 2: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)=0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000080)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000000)='fd/3\x00') r3 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x81, 0x5, &(0x7f00000022c0)=[{&(0x7f0000001140)="11071028381e43cb305ac546e341c67706509d2dbe0e160eee3e1a3ff0c0f68b232dfd1f", 0x24, 0x6}, {&(0x7f0000001180)="b6245a8fd808bf77385b51bb0c87aee78f6f24efd8a3e350d5c8dbde81a9ee8c556ffc0961252e760a", 0x29, 0x3}, {&(0x7f00000011c0)="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", 0x1000, 0x7fffffff}, {&(0x7f00000021c0)="cc65e3208fe4ff12253d34cdf5328f11ef0eee0655752534710f0df8a2d7ffda2dc4ede675c31022fbcaf83b9eed546a98f6b6bc34cb8831ad2f23557a6252d01f053ce32c76cec50d79183ba8ad216b7488e7db956a758ebae9c5c79ee1444bb2220a1e63c62c0dca87abfd9a24947b2696590ed29cf82b67e999525915514ccb8526beb5c2a9d3ff210d407dbb896d7603d9ddf1f39f8a9f44b61afb527fadcb05ad696e60621bb4b919933bcde855c4", 0xb1, 0x1000}, {&(0x7f0000002280), 0x0, 0x5}], 0x8, &(0x7f0000002340)={[{@nr_inodes={'nr_inodes', 0x3d, [0x37, 0x35, 0x4564b2b4d4ed1452]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x2d, 0x70, 0x38, 0x65, 0x37]}}, {@huge_advise}], [{@uid_eq={'uid', 0x3d, 0xee00}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_user={'subj_user', 0x3d, 'fd/3\x00'}}, {@euid_lt={'euid<', 0xee01}}]}) r4 = openat(r3, &(0x7f0000002400)='./file0\x00', 0x4000, 0x5b216387cd2efbd2) pread64(r2, &(0x7f0000000140)=""/4096, 0x1000, 0x0) sendmsg$AUDIT_USER_AVC(r2, &(0x7f0000002540)={&(0x7f0000002280)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000002500)={&(0x7f0000002440)={0xb4, 0x453, 0x200, 0x70bd25, 0x25dfdbfb, "40f30afae8903e9003a6b5f29d131b5bbb7e367649c7e84b46032cbc83b47d7cd99e54dcbbe36120995d017d9e29d0c08cb6a67c4ed672160d5e533f364bfd8eeddcba4e11d044d83860be7fb3efeb3c790cbb3788f14e568fae5553466a963f4bfd8e24409edf4bf8c829479a10ceea94ee5c21a0db2258ad8ba6d5bab4d4faada4f3c1251411296e34779ec4e887a9a5fdb5c81f64b46b3c172859d051e67b27", ["", "", ""]}, 0xb4}}, 0x40) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f00000025c0), r2) r6 = getpgid(0x0) syz_open_procfs(r6, &(0x7f0000000640)='net/hci\x00') ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000002600)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r4, &(0x7f0000002700)={&(0x7f0000002580)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000026c0)={&(0x7f0000002640)={0x64, r5, 0x300, 0x70bd29, 0x25dfdbff, {{}, {@val={0x8, 0x1, 0x33}, @void, @val={0xc, 0x99, {0x101, 0x19}}}}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x46}, @NL80211_ATTR_PID={0x8, 0x52, r6}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x26}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x401, 0x2}}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r7}, @NL80211_ATTR_IFINDEX={0x8}]}, 0x64}, 0x1, 0x0, 0x0, 0x50}, 0x40) 21:37:39 executing program 5: pread64(0xffffffffffffffff, &(0x7f0000000140)=""/4096, 0x1000, 0x0) 21:37:39 executing program 0: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0x541b, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x726029d4fb0c9567, r2) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x1) 21:37:39 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0xa, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 2107.972142] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=10 sclass=netlink_route_socket pid=11584 comm=syz-executor.7 [ 2107.977153] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=10 sclass=netlink_route_socket pid=11584 comm=syz-executor.7 [ 2122.575639] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=11 sclass=netlink_route_socket pid=11594 comm=syz-executor.7 [ 2122.579025] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=11 sclass=netlink_route_socket pid=11594 comm=syz-executor.7 21:37:54 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_bp={&(0x7f0000000100), 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0x541b, 0x0) r1 = syz_io_uring_complete(0x0) fcntl$dupfd(r0, 0x0, r1) fallocate(r0, 0xc, 0x5, 0xbe0) writev(r0, &(0x7f00000007c0)=[{&(0x7f0000000300)="455ab36a634a9942a8c657b205d506438fb659e440ed36a14f7bec4f21acfeaf4bb4113eec23c454fb3a90b85fde252390e5883042f6d1e298836b303b8a4b75699d190cd19da1f2b9c0cfe03e4724d179fef0e3f27f5fec65bc6b6c5ef828a37c199828a041f343ed8c8093d0e47600e7b17a66a625233d98a59e2f6a779527531eb0a6dada1153305d14a01b7cdb103bfd796ad6f68b3e602a07b3c9013a64f393d80c491167b4b9d3c2d06e06c0fab29fd09c1204461624ca10f6038b23be2849ae8aaf2653f82488e8064f25f202a58f6324a786d774d6b332eeb7af45e00f1d3f9a565115e7c2d1da29d46f2be7", 0xf0}, {&(0x7f0000000400)="ae30f551e4be7db5cd588f77d6643e8f6ce02586e2a1b9737e1485a2a3b5ab1d09da9b145d3faea27157", 0x2a}, {&(0x7f0000000440)="1b1d18028c394f00cf45300081dcd558d95f03f94fab31b17f7f5096f85cd93995231d6961d78999cf5fce09e6b55b4ee15b536bcc84fcc3c736640982dc4a55d939d5f7c10f9686ebae011eb35d8329f5fd9fbd74175166bd9410c2b234e9d2826e5967a38215e6da991e8694993d4ac545bd625133fccff047659b0a5a584ab6cf2267c7a456cdc48c912c7f34b0e8404ccbae30bb29328adebb0a459b101c50e3a9089d8d584b03c467ac419d5c2286a87568bbd1530465c64aacbdb9a9cafc310a37fe7a34dcceeb17bcfa111798db", 0xd1}, {&(0x7f00000005c0)="14f17475c2e91c5928eac6b89b0db78968466386af158a714d79ba14ae30304de098d8341e342f09261ec721440da0bdb6c615929680a1419898e6a04d9585793d6188767915b2a533d9507b9dd8829df32df52b771444694edb6cbe08633d808b5cf77875445a189c4ea5a1a995c5b6b665c7a48a1fe96adf", 0x79}, {&(0x7f0000000640)="0b331d16e4f7b1e601d7fe23cbb20dcedd073b8ce0386c4da14d4c6fa0d8577ab80b9e9c5e7465ad6946c95911e00ea7e7df518e00f225b590c027a3e32e2cd248a6b215e62690bb892ff9f024a8d72c01d9756cef23ff17bf0b718cefbc9cf8ceca494f2ec0caf1f1a1f3d124d7c4b040374e5043cc2583627a66662999c9e5c8769ce02e8ab89406d69ee1bd34750b2bb3837b8b7ca62d4985ba8a60e8e478576caac98eae5c8851bf0c8efc7038e35d5dbadf733391fdbc073a7e2e18216db0a73248448e3bec46c96f58f0de79f6be8d30dcca53484b4754", 0xda}, {&(0x7f0000000740)="5ec19a06c887b2934512b3a82de29cf9c6b1d0fd", 0x14}, {&(0x7f0000000780)="a5123e9832e9c36e9e3ff15b4dc69fa051cac307522d9140371a5b3bf824", 0x1e}], 0x7) r2 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaab4, &(0x7f0000000180)=[{&(0x7f0000000140)="eb70058400f80100"/23, 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) getdents(r2, &(0x7f0000000540)=""/126, 0x7e) getdents64(r2, &(0x7f00000001c0)=""/196, 0xc4) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x200, 0x0) 21:37:54 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000001140)=""/4100, 0x1004, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000040)={r0, 0x0, 0x5, 0x81}) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000080)=0x1) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r3, 0xc020660b, &(0x7f0000000040)) write$P9_RRENAMEAT(r3, &(0x7f00000000c0)={0x7, 0x4b, 0x1}, 0x7) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0x541b, 0x0) fcntl$dupfd(r0, 0x406, r2) 21:37:54 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0xb, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:37:54 executing program 5: pread64(0xffffffffffffffff, &(0x7f0000000140)=""/4096, 0x1000, 0x0) 21:37:54 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000500)='cifs.spnego\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) add_key$fscrypt_v1(&(0x7f00000002c0), &(0x7f0000000300)={'fscrypt:', @desc2}, &(0x7f0000000380)={0x0, "253cb09ea24c33d462dc7b61efc1df34ea21f720c132345da87a9979e2f216dd5dfa5011f37bd2d9782095e016e2da0bcf18d8721a50c681e0202ed4efff8d9a", 0x16}, 0x48, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x2010, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_setup(0x71fe, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000340)=0x0, &(0x7f0000000140)=0x0) r4 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2}, 0x80, 0x0}}, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(r2, 0x0, &(0x7f0000000180)=@IORING_OP_READ_FIXED={0x4, 0x2, 0x0, @fd_index=0xa, 0x1, 0xfffffffffffffffb, 0x4, 0x4, 0x1, {0x3}}, 0x1e2c) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:37:54 executing program 2: name_to_handle_at(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@FILEID_BTRFS_WITH_PARENT_ROOT={0x28, 0x4e, {0x33c, 0x4, 0x7fffffff, 0x3, 0x2, 0x6}}, &(0x7f00000000c0), 0x1000) ptrace(0x4208, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x0) r1 = fork() waitid(0x2, r1, 0x0, 0x2, 0x0) 21:37:54 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r0, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:37:54 executing program 0: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0x541b, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x726029d4fb0c9567, r2) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x1) 21:37:54 executing program 5: pread64(0xffffffffffffffff, &(0x7f0000000140)=""/4096, 0x1000, 0x0) 21:37:54 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0xc, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:37:54 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') r1 = syz_io_uring_setup(0x71fe, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000340)=0x0, &(0x7f0000000140)=0x0) r4 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2}, 0x80, 0x0}}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80000001) r6 = socket$nl_generic(0x10, 0x3, 0x10) epoll_create1(0x80000) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, 0x0, &(0x7f0000000080)=@IORING_OP_SEND={0x1a, 0x4, 0x0, r6, 0x0, &(0x7f0000000040)="a3c6fb380c136ff5b71cb8ded09c9f4aaa46f44cd748a03fed97f0c4dd6ae6c5d8b2dc853a792744197f104383fc2b3f2007", 0x32, 0x10, 0x0, {0x0, r7}}, 0xffff) pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x0) [ 2122.695283] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12 sclass=netlink_route_socket pid=11616 comm=syz-executor.7 [ 2122.714552] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12 sclass=netlink_route_socket pid=11616 comm=syz-executor.7 21:37:54 executing program 0: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0x541b, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x726029d4fb0c9567, r1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = dup2(r3, r2) renameat2(r4, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x1) 21:37:54 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/wireless\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x0) r1 = syz_open_dev$hiddev(&(0x7f0000000040), 0x10001, 0x240) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x41) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0x541b, 0x0) dup2(r1, r2) 21:37:54 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r0, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:37:54 executing program 5: r0 = syz_open_procfs(0x0, 0x0) pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x0) 21:37:54 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0xd, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 2122.834615] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=13 sclass=netlink_route_socket pid=11636 comm=syz-executor.7 [ 2122.866695] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=13 sclass=netlink_route_socket pid=11636 comm=syz-executor.7 21:38:08 executing program 4: r0 = getpgid(0x0) syz_open_procfs(r0, &(0x7f0000000640)='net/hci\x00') write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040)=r0, 0x12) pread64(0xffffffffffffffff, &(0x7f0000000140)=""/4096, 0x1000, 0x0) 21:38:08 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:38:08 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4$inet6(r2, 0x0, &(0x7f00000001c0), 0x80000) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x200) 21:38:08 executing program 2: syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') 21:38:08 executing program 5: r0 = syz_open_procfs(0x0, 0x0) pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x0) 21:38:08 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0xe, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:38:08 executing program 0: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0x541b, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x726029d4fb0c9567, r1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = dup2(r3, r2) renameat2(r4, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x1) 21:38:08 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) getdents(r0, &(0x7f0000000540)=""/126, 0x7e) r1 = open(&(0x7f0000000000)='./file0\x00', 0x240000, 0x0) unlinkat(r1, &(0x7f0000000040)='./file0\x00', 0x0) [ 2137.003951] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=14 sclass=netlink_route_socket pid=11658 comm=syz-executor.7 21:38:08 executing program 4: pread64(0xffffffffffffffff, &(0x7f0000000140)=""/4096, 0x1000, 0x0) r0 = socket(0x2b, 0x4, 0x3f) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f00000000c0)={'sit0\x00', &(0x7f0000000040)={'ip6tnl0\x00', 0x0, 0x29, 0x4, 0x0, 0x6, 0x8, @empty, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x700, 0x7, 0x611f, 0x5794}}) sendmsg$ETHTOOL_MSG_EEE_GET(r0, &(0x7f0000001200)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000001140)=ANY=[@ANYBLOB="ac000000", @ANYRES16=0x0, @ANYBLOB="000001800800010200ffffff7f000000000000000000", @ANYRES32=0x0, @ANYBLOB="080003000200000008000100", @ANYRES16=r0, @ANYBLOB="08000300000000002800018014000200000000000000000000000000000000000800030003000000080003000100000014000180080003000200000008000300010000001400018008000300020000000800030000000000240001800800030001000000080003000300000008000300000000000800030002000000"], 0xac}, 0x1, 0x0, 0x0, 0x40}, 0x8404) 21:38:08 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r1, 0xc020660b, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1000}) connect$802154_dgram(r1, &(0x7f0000000040)={0x24, @none={0x0, 0xffff}}, 0x14) pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x0) [ 2137.020765] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=14 sclass=netlink_route_socket pid=11658 comm=syz-executor.7 21:38:08 executing program 5: r0 = syz_open_procfs(0x0, 0x0) pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x0) 21:38:08 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x2, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3ce86d6b66732e6661740002e500000470008400f801", 0x17, 0x4}, {0x0, 0x1, 0x9001000a00}], 0x20000, &(0x7f0000000240)=ANY=[]) getdents(r0, &(0x7f0000000540)=""/126, 0x7e) 21:38:08 executing program 0: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0x541b, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x726029d4fb0c9567, r1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = dup2(r3, r2) renameat2(r4, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x1) 21:38:08 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000040), 0x14001, 0x400000) ioctl$AUTOFS_IOC_ASKUMOUNT(r0, 0x80049370, &(0x7f00000000c0)) ioctl$HIDIOCGPHYS(0xffffffffffffffff, 0x80404812, &(0x7f0000000080)) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='ns\x00') pread64(r1, &(0x7f0000004240)=""/4096, 0x1000, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0x100000000, 0x901) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) recvmmsg$unix(r0, &(0x7f0000003e00)=[{{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001240)=""/177, 0xb1}, {&(0x7f0000001300)=""/194, 0xc2}, {&(0x7f0000001400)=""/157, 0x9d}, {&(0x7f00000014c0)=""/21, 0x15}, {&(0x7f0000001500)=""/140, 0x8c}], 0x5, &(0x7f0000001640)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38}}, {{&(0x7f0000001680)=@abs, 0x6e, &(0x7f0000003a80)=[{&(0x7f0000001700)=""/4096, 0x1000}, {&(0x7f0000002700)=""/196, 0xc4}, {&(0x7f0000002800)=""/141, 0x8d}, {&(0x7f00000028c0)=""/61, 0x3d}, {&(0x7f0000002900)=""/86, 0x56}, {&(0x7f0000002980)=""/4096, 0x1000}, {&(0x7f0000003980)=""/223, 0xdf}], 0x7, &(0x7f0000003b00)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}], 0x40}}, {{&(0x7f0000003b40)=@abs, 0x6e, &(0x7f0000003d80)=[{&(0x7f0000003bc0)=""/86, 0x56}, {&(0x7f0000003c40)=""/216, 0xd8}, {&(0x7f0000003d40)=""/20, 0x14}], 0x3, &(0x7f0000003dc0)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x28}}], 0x3, 0x2, &(0x7f0000003ec0)) r6 = getgid() chown(&(0x7f0000000140)='./file1\x00', 0x0, r6) getgroups(0x4, &(0x7f0000003f00)=[0xee01, 0xffffffffffffffff, 0x0, 0x0]) r8 = getgid() chown(&(0x7f0000000140)='./file1\x00', 0x0, r8) statx(r1, &(0x7f0000004000)='./file0\x00', 0x6000, 0x4, &(0x7f0000004040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r10 = getgid() chown(&(0x7f0000000280)='./file1\x00', 0x0, r10) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000004180)={{0x1, 0x1, 0x18, r0, {0x0, 0x0}}, './file0\x00'}) fsetxattr$system_posix_acl(r2, &(0x7f0000001140)='system.posix_acl_access\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="02000000010004000000000002000000", @ANYRES32=r3, @ANYBLOB="02000600", @ANYRES32, @ANYBLOB="02000500", @ANYRES32=r4, @ANYBLOB="040000000000000008000100", @ANYRES32=r5, @ANYBLOB="6981ca44a3495aed671297e185040646c20e117ac57abc89665d1c4b8b50bf1c9d0d1875259cc0aae5cab57439bbe9eba2b213f741f94b32b43051ceb0f3a1ca06c2a58f05d079995c31d2ed1b7d6936b29256d1d8bf0625", @ANYRES32=r6, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="08000200", @ANYRES32=r9, @ANYBLOB="08000600", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r10, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r11, @ANYBLOB="10000100000000002000000000000000"], 0x7c, 0x1) 21:38:08 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:38:08 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0xf, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 2137.184352] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=15 sclass=netlink_route_socket pid=11689 comm=syz-executor.7 [ 2137.190056] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=15 sclass=netlink_route_socket pid=11689 comm=syz-executor.7 [ 2150.989360] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:38:22 executing program 5: syz_open_procfs(0x0, &(0x7f0000000040)='loginuid\x00') pread64(0xffffffffffffffff, &(0x7f0000000140)=""/4096, 0x1000, 0x0) 21:38:22 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:38:22 executing program 0: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0x541b, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x726029d4fb0c9567, r2) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) r5 = dup2(r4, r3) renameat2(r5, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x1) 21:38:22 executing program 3: ptrace$setsig(0x4203, 0x0, 0x43d, &(0x7f0000000000)={0x3a, 0x7f, 0x8000}) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = signalfd4(r0, &(0x7f0000000100)={[0xcec]}, 0x8, 0x80800) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x7f06a430) getdents(r1, &(0x7f0000000240)=""/127, 0x7f) 21:38:22 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x0) 21:38:22 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_PUBL_GET(r0, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000001500)={0x398, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0xb8, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x699c10c3}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xf6e}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffff8}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}]}]}, @TIPC_NLA_MEDIA={0xe0, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x30}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x912}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffe00}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffff9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff0000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_LINK={0x44, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffc00}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}]}]}, @TIPC_NLA_NODE={0x4c, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY={0x3c, 0x4, {'gcm(aes)\x00', 0x14, "f95e382af3a367eeea50963ffb5f87a8574fe3cd"}}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MEDIA={0x20, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2ec9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}]}, @TIPC_NLA_NET={0x64, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x80000000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7fff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xef}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x71}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x400}]}, @TIPC_NLA_NODE={0xd8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xd70d}, @TIPC_NLA_NODE_KEY={0x41, 0x4, {'gcm(aes)\x00', 0x19, "3808fac9ce22e1e325ccd6b8b5b479a515549211a4b51b7866"}}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ID={0x35, 0x3, "b0cc7c1bcff2e357f076123f289bf78a19a271e1ba11245bb9ac26a413c9593dc936b6c3e1c34d49b9073ec49c04f1427c"}, @TIPC_NLA_NODE_KEY={0x3d, 0x4, {'gcm(aes)\x00', 0x15, "b1ac8373718d6ebe0d0fd7f920679f0da12f99e3c6"}}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x398}, 0x1, 0x0, 0x0, 0x24000000}, 0x208d1) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r1, &(0x7f0000000140)=""/4096, 0x1000, 0x0) pipe(&(0x7f0000000040)) 21:38:22 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r2 = openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) chown(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$cgroup_int(r2, &(0x7f00000001c0)=0x17f8, 0x12) r3 = syz_io_uring_setup(0x4d4f, &(0x7f0000000380), &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000340)=0x0) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r3, 0x9, 0x0, 0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000280)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index, 0x0, 0x0, 0x0, {}, 0x0, {0x0, r6}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_CONNECT={0x10, 0x4, 0x0, 0xffffffffffffffff, 0x80, &(0x7f00000002c0)=@un=@abs={0x1, 0x0, 0x4e22}, 0x0, 0x0, 0x1, {0x0, r6}}, 0xffff) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:38:22 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x11, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:38:22 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='io\x00') ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000040)) pread64(r0, &(0x7f0000000140)=""/4090, 0xffa, 0x0) 21:38:22 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000540)=""/126, 0x7e) 21:38:22 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_mr_cache\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0x541b, 0x0) preadv(r1, &(0x7f00000024c0)=[{&(0x7f0000000000)=""/30, 0x1e}, {&(0x7f0000000080)=""/187, 0xbb}, {&(0x7f0000001140)=""/77, 0x4d}, {&(0x7f00000011c0)=""/80, 0x50}, {&(0x7f0000001240)=""/103, 0x67}, {&(0x7f00000012c0)=""/201, 0xc9}, {&(0x7f00000013c0)=""/225, 0xe1}, {&(0x7f00000014c0)=""/4096, 0x1000}], 0x8, 0xfffffffc, 0x5) 21:38:22 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x12, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:38:22 executing program 0: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0x541b, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x726029d4fb0c9567, r2) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) r5 = dup2(r4, r3) renameat2(r5, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x1) 21:38:22 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0xc020660b, &(0x7f0000000040)) setsockopt$packet_int(r2, 0x107, 0x13, &(0x7f0000000180)=0x3, 0x4) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r3, 0xc020660b, &(0x7f0000000040)) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0/file0\x00', 0xda) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) [ 2151.160341] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2151.164673] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:38:22 executing program 5: syz_open_procfs(0x0, &(0x7f0000000040)='loginuid\x00') pread64(0xffffffffffffffff, &(0x7f0000000140)=""/4096, 0x1000, 0x0) 21:38:22 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:38:22 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000540)=""/126, 0x7e) 21:38:22 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') syz_io_uring_setup(0x72fd, &(0x7f0000000040)={0x0, 0xe378, 0x20, 0x1, 0x22b, 0x0, r0}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000100)=0x0) r3 = syz_io_uring_setup(0x71fe, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000340)=0x0, &(0x7f0000000140)=0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x10010, 0xffffffffffffffff, 0x8000000) r7 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r10 = io_uring_register$IORING_REGISTER_PERSONALITY(r7, 0x9, 0x0, 0x0) syz_io_uring_submit(r8, r9, &(0x7f0000000280)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index, 0x0, 0x0, 0x0, {}, 0x0, {0x0, r10}}, 0x0) syz_io_uring_submit(r6, r5, &(0x7f0000001680)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, r0, 0x0, &(0x7f0000001640)={&(0x7f0000001440)=@pppoe={0x18, 0x0, {0x0, @link_local}}, 0x80, &(0x7f0000001580)=[{&(0x7f00000016c0)=""/193, 0xc1}], 0x1, &(0x7f00000014c0)=""/102, 0x66}, 0x0, 0x40000000, 0x1, {0x1}}, 0x0) r11 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r11, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2}, 0x80, 0x0}}, 0x0) r12 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r3, 0x0) r13 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r3, 0x8000000) syz_io_uring_submit(r13, r5, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80000001) syz_io_uring_submit(r1, r5, &(0x7f0000001400)=@IORING_OP_WRITEV={0x2, 0x5, 0x6000, @fd_index=0x6, 0x4, &(0x7f00000013c0)=[{&(0x7f0000001140)="9549a0b8467d74703b51eb2786d4ca5c6476da43b2c591cb7886a5537a8bdc419ed840dd076e94a755da7174992c207e12d9df41ae4ba1607db3379a283e3cfd537bd06224dff6defb4dd95b5589286fac01892046f9d56d359c9f8f41f48c55def5cdb31879d79cb100c2ad772f5e3e9bdf885b3ed9f4d26d03bd887e11742204f99d7b572d7e07acf3e684c2a561e6f1afa1e35038cad69d393bc076a03f8ad5de018b110a42094ac187daf97632c5eb651b6104e739ca2e6582be47bd3e62a11f4282bb3f745510048d6f36822467149483d735f2d185d9d9db166bc58a1dc55cb1aaf96312649a", 0xe9}, {&(0x7f0000001240)="f0973b657c62b9a51fe9b12adc54c81f91247521419fc192cd55155c4ab9a6db609a2a355c82a48e43ab48c3f6b04b06ed1d98e3d605f6b3d5ff4b7eab5091cd11b24a7b8b63d58d97c35941725c671206f32da155da5c4e404b46affbf26f1b321c31aae3acfcfc472c87cf6b9524729e9749690bdbd93beba20777af0de6cec22138197b91", 0x86}, {&(0x7f0000001300)="922e42c48db57224a8a4fbd7ffb7a8a7bf319227a79bc0cca275a859a9e510a5515700dbb3d00e21219ca2d8300bd73ac771a1c09cd4ae94abdd76f0d900d4a626b89bad9e9781203a2593bd641d993eb6b16c1743544fbb3666e678aae2b1c623a11b803e38f092d9cd3497413ad6e570a0590a474af8b51d6c43aa499c97e475c768f4356907f6d3d8ec8e70df2516e03953281de1a7f2ced00cfb9f33b1a6b972cabec48234ceaccead3d9d1757ea57fd95ae30d60f73ea7d55a146", 0xbd}], 0x3, 0x8}, 0x8b35) r14 = accept4$unix(r0, &(0x7f00000015c0)=@abs, &(0x7f0000001540)=0x6e, 0x80800) r15 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r12, r2, &(0x7f00000017c0)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd=r14, 0x4, 0x0, 0x0, 0x4, 0x0, {0x0, r15}}, 0xc5f) pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x0) 21:38:37 executing program 4: syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(0xffffffffffffffff, &(0x7f0000001280)=""/4096, 0x1000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_EXPIRE(r0, 0x810c9365, &(0x7f0000001140)={{0x1, 0xffff}, 0x100, './file0\x00'}) 21:38:37 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = fork() perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x2, 0x0, 0x29, 0x3, 0x0, 0x2, 0x10000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xffff, 0x4, @perf_config_ext={0x8000, 0x6}, 0xa003, 0x8, 0x9, 0x6, 0x8, 0x190, 0x4, 0x0, 0x6eb, 0x0, 0x80000001}, r0, 0x5, 0xffffffffffffffff, 0x11) pipe2(&(0x7f0000000000), 0x800) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) getdents(r1, &(0x7f0000000540)=""/126, 0x7e) 21:38:37 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:38:37 executing program 5: syz_open_procfs(0x0, &(0x7f0000000040)='loginuid\x00') pread64(0xffffffffffffffff, &(0x7f0000000140)=""/4096, 0x1000, 0x0) 21:38:37 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x18, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:38:37 executing program 0: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0x541b, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x726029d4fb0c9567, r2) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) r5 = dup2(r4, r3) renameat2(r5, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x1) 21:38:37 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:38:37 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') syz_io_uring_setup(0xe1a, &(0x7f0000000040)={0x0, 0x8718, 0x10, 0x0, 0x10b, 0x0, r0}, &(0x7f0000ff4000/0xc000)=nil, &(0x7f0000ff8000/0x2000)=nil, &(0x7f00000000c0), &(0x7f0000000100)=0x0) pipe(&(0x7f0000001140)={0xffffffffffffffff}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002740), 0xffffffffffffffff) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_EEE_SET(r3, &(0x7f0000002800)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000940)=ANY=[@ANYBLOB="200000c1", @ANYRES16=r4, @ANYBLOB="01000000000000000000150000000c00018008000100", @ANYRES32=r6, @ANYBLOB], 0x20}}, 0x0) r7 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x0, 0x20}, &(0x7f00000a0000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000001240)=0x0) r10 = io_uring_register$IORING_REGISTER_PERSONALITY(r7, 0x9, 0x0, 0x0) syz_io_uring_submit(r8, r9, &(0x7f0000000280)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index, 0x0, 0x0, 0x0, {}, 0x0, {0x0, r10}}, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000001200)=@IORING_OP_CONNECT={0x10, 0x2, 0x0, r2, 0x80, &(0x7f0000001180)=@xdp={0x2c, 0x6, r6, 0x2d}, 0x0, 0x0, 0x1, {0x0, r10}}, 0xd59) pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x0) 21:38:37 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='loginuid\x00') pread64(r0, 0x0, 0x0, 0x0) 21:38:37 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x2f, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:38:37 executing program 4: r0 = syz_open_dev$hidraw(&(0x7f00000000c0), 0x7fffffff, 0x80643) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0x541b, 0x0) r2 = getpgid(0x0) syz_open_procfs(r2, &(0x7f0000000640)='net/hci\x00') perf_event_open(&(0x7f0000002140)={0x3, 0xcd, 0xdf, 0x5, 0x5b, 0x1f, 0x0, 0x5c0e, 0x48, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xb7, 0x2, @perf_config_ext={0x9b36, 0x1f}, 0x190a3, 0x9d, 0x4000000, 0x7, 0x7f, 0x7, 0x1, 0x0, 0x2477, 0x0, 0x80}, r2, 0x2, 0xffffffffffffffff, 0x9) ioctl$BTRFS_IOC_SUBVOL_CREATE(r0, 0x5000940e, &(0x7f0000001140)={{r1}, "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"}) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000100), 0x482002, 0x0) write$P9_RLERRORu(r3, &(0x7f00000021c0)={0xd, 0x7, 0x2, {{}, 0x7fffffff}}, 0xd) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/arp\x00') ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000000)=0x0) syz_open_procfs(r5, &(0x7f0000000080)='net/nfsfs\x00') pread64(r4, &(0x7f0000000140)=""/4096, 0x1000, 0x0) 21:38:37 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r1, 0xc020660b, &(0x7f0000000040)) readlinkat(r1, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/105, 0x69) getdents(r0, &(0x7f0000000540)=""/126, 0x7e) [ 2165.669520] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=47 sclass=netlink_route_socket pid=11788 comm=syz-executor.7 [ 2165.678068] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=47 sclass=netlink_route_socket pid=11788 comm=syz-executor.7 21:38:37 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x0) r1 = open$dir(&(0x7f00000025c0)='./file0\x00', 0x2, 0x51) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000002600), 0x12580, 0x0) r3 = getpgid(0x0) syz_open_procfs(r3, &(0x7f0000000640)='net/hci\x00') stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r4, 0x0) r5 = getgid() chown(&(0x7f0000000140)='./file1\x00', 0x0, r5) r6 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r6, 0x541b, 0x0) r7 = socket$inet_icmp(0x2, 0x2, 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000002640)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) r9 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r9, 0x541b, 0x0) r10 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r10, 0x541b, 0x0) r11 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002780)={&(0x7f0000000040)=@kern={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000002540)=[{&(0x7f0000001140)={0x160, 0x28, 0x1, 0x70bd2c, 0x25dfdbfb, "", [@nested={0x93, 0x21, 0x0, 0x1, [@typed={0x14, 0x32, 0x0, 0x0, @binary="ae58dee49ab6c8969445a1c8c3a3269d"}, @generic="8745acc02d38c13bd5238229ecc2f42c90396ac9109fb3c902c3dc501e512e1cc81f51905507733f7c85a300ae8f1a4162e86af7a20bf7e0eace829cb9b2e13e0fc847542c1b0ee9c4a6de1886dc8c07190a9a3a43f7175d6bd4cd28f9c374cd443ee46a2a3cc06e30788a43676b99c5562872", @typed={0x8, 0x2f, 0x0, 0x0, @u32=0x2}]}, @typed={0x7, 0x26, 0x0, 0x0, @str='./\x00'}, @generic="7f2a4ae41b67b4024876a31436fc90c7366c4e1a3856d6021c76bf0236b93543630c9f0b72a849f1eacb34b6d94c7352dbcaecd1519711ee30daf8d4839f88d76cca6620c607542c2dc9165f6ba6307228349c70c581cbfa8de3ffcf40d36939af13c00b284f1e14409df1ffa528dc6fb300e41ede94c6ce64bbda994b8c7b13e96ae170e81690a40b2a7c14d3c57b5b43e6e1013f6bb2a88f86eb", @nested={0x18, 0x42, 0x0, 0x1, [@typed={0x14, 0xc, 0x0, 0x0, @ipv6=@dev={0xfe, 0x80, '\x00', 0x30}}]}]}, 0x160}, {&(0x7f0000001300)={0x1238, 0x3c, 0x400, 0x70bd29, 0x25dfdbfc, "", [@nested={0x10f, 0x62, 0x0, 0x1, [@generic="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", @generic="6bc466bc", @typed={0x8, 0x43, 0x0, 0x0, @u32=0x4}]}, @generic="d974e28420dd9c6589b8ddd19c23e97388671b492684eeb76de122239cd00e0512b37feeb848a0e1ad57141d5946ff94920d0bf51f4b38eac984aab4329a40f8d339edad72d1454ee17d8bd9c1cfabeffa5707d1de6773163c474bb8701164f014b3c1482b5e940c70219107bd781c7e3609d5eeb5bbd6fb0675f9f3309a8fdb5afc0012afc268921c2b32df371f173798f016eb4899458c9c6ce44898ddf685436674afe43901322dd4144f0a43003dab5a62b6011ecb1c38c560d7e871721aa6af16a2e692ba54b4c0", @generic="a9509491178d31ab2e6e4ca907b131b2a9352aad72091f29d75f2a195b52f010896703e9f10473ebfef3a207cea4e492e11e1e97b196a970", @nested={0x1014, 0x3a, 0x0, 0x1, [@typed={0x8, 0x3d, 0x0, 0x0, @uid}, @generic="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", @typed={0x8, 0x8f, 0x0, 0x0, @fd}]}]}, 0x1238}], 0x2, &(0x7f0000002680)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, r0, r1, r0]}}, @rights={{0x28, 0x1, 0x1, [r0, r2, 0xffffffffffffffff, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, r4, r5}}}, @rights={{0x1c, 0x1, 0x1, [r6, r7, r8]}}, @rights={{0x24, 0x1, 0x1, [r9, r10, r11, 0xffffffffffffffff, r0]}}], 0xe0, 0x20000004}, 0x20000000) 21:38:37 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) mount(&(0x7f0000000180)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='ocfs2_dlmfs\x00', 0x800, &(0x7f00000002c0)='\\%\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:38:51 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r1) r2 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(r1, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x481203}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0x7c, 0x0, 0x100, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x1}, {0x5, 0x3, 0x7}, {0x5}, {0x5}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x554d83dd1bcebcd2}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x6}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x7}, {0x5, 0x3, 0x6}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0xffffffffffffffff}]}, 0x7c}, 0x1, 0x0, 0x0, 0x4040}, 0xd0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000340), &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r2, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:38:51 executing program 4: syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0x541b, 0x0) readv(r0, &(0x7f00000013c0)=[{&(0x7f0000000040)=""/237, 0xed}, {&(0x7f0000001140)=""/185, 0xb9}, {&(0x7f0000001200)=""/17, 0x11}, {&(0x7f0000001240)=""/210, 0xd2}, {&(0x7f0000001340)=""/70, 0x46}], 0x5) 21:38:51 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) [ 2179.757264] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=95 sclass=netlink_route_socket pid=11816 comm=syz-executor.7 21:38:51 executing program 0: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0x541b, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x726029d4fb0c9567, r2) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) r4 = dup2(0xffffffffffffffff, r3) renameat2(r4, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x1) 21:38:51 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x5f, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:38:51 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0x541b, 0x0) pread64(r1, &(0x7f0000000040)=""/192, 0xc0, 0x200) 21:38:51 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x8, 0x8, 0x0, 0x0, 0x0, 0x5, 0x4828, 0x7, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffff32c, 0x1, @perf_config_ext={0x1, 0x9}, 0x1000c, 0x4, 0x1000, 0x2, 0x3, 0xffffffff, 0xcbd, 0x0, 0x0, 0x0, 0xff}, 0xffffffffffffffff, 0x3, r0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) getdents(r1, &(0x7f0000000540)=""/126, 0x7e) [ 2179.766688] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=95 sclass=netlink_route_socket pid=11816 comm=syz-executor.7 21:38:51 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:38:51 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) openat(r0, &(0x7f0000000000)='./file0\x00', 0x4442, 0x23) getdents(r0, &(0x7f0000000540)=""/126, 0x7e) 21:38:51 executing program 6: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x208318d00, 0x0, 0x0, 0x0, {0x7}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r1) r2 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x81, 0x2b, 0x7f, 0xc0, 0x0, 0x5, 0x20, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8, 0x4, @perf_config_ext={0x7, 0x6}, 0x4, 0x4aa, 0x100, 0x6, 0x8, 0x9, 0x3, 0x0, 0x2c2688c0, 0x0, 0x4}, r4, 0x2, r0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r2, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:38:51 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x73, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:38:51 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x0) openat(r0, &(0x7f0000001140)='./file0\x00', 0x800, 0x3) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x4, 0xa, 0x101, 0x0, 0x0, {0x1, 0x0, 0x9}}, 0x14}, 0x1, 0x0, 0x0, 0x4000014}, 0x800) [ 2179.898547] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=115 sclass=netlink_route_socket pid=11839 comm=syz-executor.7 21:38:51 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) [ 2179.922405] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=115 sclass=netlink_route_socket pid=11839 comm=syz-executor.7 21:38:51 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:38:51 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x6, 0x42e6, 0x2, &(0x7f0000000100)={[0x8]}, 0x8) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) creat(&(0x7f00000001c0)='./file0\x00', 0x99) getdents(r0, &(0x7f0000000540)=""/126, 0x7e) 21:38:51 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000001140)={0x1bc, 0x0, 0x800, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0x5c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0xd8000000, @private1, 0x6}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x7, @mcast1, 0x4}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_LINK={0x6c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6e7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xab}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}]}]}, @TIPC_NLA_MEDIA={0xbc, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffff7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}]}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x40}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8}]}]}, @TIPC_NLA_NODE={0x8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x1c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2d81}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4d}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}]}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x2000c850}, 0x20004004) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000040)=0x4) 21:38:51 executing program 0: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0x541b, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x726029d4fb0c9567, r2) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) r4 = dup2(0xffffffffffffffff, r3) renameat2(r4, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x1) 21:39:07 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r1, 0xc020660b, &(0x7f0000000040)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000080)=ANY=[@ANYBLOB="0147dc52a5ec2a7a7a8807bc000000000018002000", @ANYRES32=r0, @ANYBLOB="ff000000000000002e2f66696c653000"]) pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x0) 21:39:07 executing program 0: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0x541b, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x726029d4fb0c9567, r2) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) r4 = dup2(0xffffffffffffffff, r3) renameat2(r4, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x1) 21:39:07 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x8, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:39:07 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) getdents(r0, &(0x7f0000000540)=""/126, 0x7e) openat(r0, &(0x7f0000000000)='./file0\x00', 0x511000, 0x18) 21:39:07 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:39:07 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r1, 0xc020660b, &(0x7f0000000040)) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x4, 0x5e8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20001140], 0x0, &(0x7f0000000040), &(0x7f0000001140)=[{0x0, '\x00', 0x0, 0xfffffffffffffffc}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{0x9, 0x1, 0x171ec, 'caif0\x00', 'wg0\x00', 'veth0_virt_wifi\x00', 'veth0_to_bond\x00', @empty, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @multicast, [0x0, 0xff, 0xff, 0x7f, 0xff], 0x6e, 0x106, 0x13e, [], [@common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x26b9, 'syz1\x00', {0xd51c}}}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00', 0x7, 0x1, {0x9}}}}], @common=@dnat={'dnat\x00', 0x10, {{@multicast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x2, [{0x5, 0x5, 0x88a8, 'veth1_to_hsr\x00', 'veth1_to_hsr\x00', 'vxcan1\x00', 'bond_slave_0\x00', @remote, [0x0, 0xff, 0x0, 0xff, 0x101], @empty, [0xff, 0xff, 0xff, 0x2d0eaff919229fe7, 0xff, 0xff], 0xe6, 0xe6, 0x136, [@ip6={{'ip6\x00', 0x0, 0x50}, {{@mcast1, @mcast2, [0xff000000, 0xff000000, 0xffffff00, 0xff], [0xffffffff, 0xff, 0xff, 0xffffffff], 0x4, 0x2c, 0x50, 0x8, 0x4e23, 0x4e21, 0x4e23, 0x4e23}}}], [], @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz0\x00', {0x10000}}}}}, {0x5, 0x0, 0x6006, 'ip6gre0\x00', 'ip6tnl0\x00', 'veth1_to_batadv\x00', 'veth0_macvtap\x00', @link_local, [0x0, 0xff, 0xff, 0xff], @multicast, [0xff, 0x0, 0xff, 0x0, 0xff, 0xff], 0xde, 0xde, 0x126, [@owner={{'owner\x00', 0x0, 0x18}, {{0xee01, 0xee01, 0xffffffffffffffff, 0xee01, 0x1, 0x4}}}, @cpu={{'cpu\x00', 0x0, 0x8}}], [], @common=@ERROR={'ERROR\x00', 0x20, {"2cae77a7fea7c0d5a825a4d981136b6a642c1dc8f5f2353e50d4dc06b7b2"}}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{0x16adf63b83eb9f0c, 0x22, 0x800, 'veth0_virt_wifi\x00', 'bridge_slave_0\x00', 'ip6tnl0\x00', 'veth1_virt_wifi\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x40}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, [0xff], 0xae, 0x146, 0x18e, [@time={{'time\x00', 0x0, 0x18}, {{0x7fff, 0x2030947, 0x148a4, 0x82b3, 0x3, 0x8, 0x2}}}], [@common=@ERROR={'ERROR\x00', 0x20, {"707ae3e75f848c66e876ae18b1a25abc74c918e2d05b4142f951da204c75"}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x1f, 'syz1\x00', {0x2bf4}}}}], @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x80, 0x9, {0x80000000}}}}}]}]}, 0x660) pread64(r0, &(0x7f0000000140)=""/4081, 0xff1, 0x200000) 21:39:07 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r1) r2 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f00000002c0)="a3b0d6923e247f7f6bb70137983ca4da3ebf2528f58b27c7cbb6a22a685ca20d6391a81d33532e6ee8c509568cada6e269a05b71b50bbe5cce653c3454e0d24dc439b566b0474e105ce4b4", 0x4b, r0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002740), 0xffffffffffffffff) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_EEE_SET(r3, &(0x7f0000002800)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r4, @ANYBLOB="01000000000000000000150000000c00018008000100", @ANYRES32=r6, @ANYBLOB="2fc4e1c252cf2d8fd2796d73e2b7ecff0f0000597e38d484865d8cfdead608fded7c5f79c4896847fe3f62c56fac8de7db"], 0x20}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x11, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r2, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:39:07 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:39:07 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_CONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={0x34, r2, 0x5, 0x0, 0x0, {{0x2}, {@val={0x8, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1464}, @NL80211_ATTR_CHANNEL_WIDTH={0x8}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x5}]]}, 0x34}}, 0x0) sendmsg$NL80211_CMD_SET_NOACK_MAP(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, 0x0, 0x100, 0x70bd29, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_NOACK_MAP={0x6, 0x95, 0x8}, @NL80211_ATTR_NOACK_MAP={0x6, 0x95, 0x7fff}, @NL80211_ATTR_NOACK_MAP={0x6, 0x95, 0x7}, @NL80211_ATTR_NOACK_MAP={0x6, 0x95, 0x40}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4008010}, 0x10) 21:39:07 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0xa, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:39:07 executing program 3: mount$cgroup(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x20000, &(0x7f0000000240)={[{@clone_children}, {@release_agent={'release_agent', 0x3d, './file0'}}, {@name={'name', 0x3d, ',\'&],!([&^'}}, {@cpuset_v2_mode}, {@release_agent={'release_agent', 0x3d, './file0'}}]}) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x885f, 0x0, 0x0, 0x3}, 0x0, 0x84000000000000, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) close_range(r0, r1, 0x0) getdents(r0, &(0x7f0000000540)=""/126, 0x7e) 21:39:07 executing program 2: syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') 21:39:07 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:39:07 executing program 0: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0x541b, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x726029d4fb0c9567, r2) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) r5 = dup2(r4, r3) renameat2(r5, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x1) 21:39:07 executing program 6: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000001c0)={0x0, 0x0}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x82000, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x8}, 0x0, 0x100000001, 0x5, 0x2, 0xc21}, r0, 0xffffffff7ffffffe, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r1) r2 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) keyctl$set_reqkey_keyring(0xe, 0x3) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r2, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000180)='\x9c*}((,\x00') 21:39:07 executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040)={[0x10001]}, 0x8, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000100)={0x0, @multicast2, @empty}, &(0x7f0000001140)=0xc) r3 = openat$incfs(r0, &(0x7f0000001200)='.pending_reads\x00', 0x400000, 0x48) setsockopt$IP_VS_SO_SET_DELDEST(r3, 0x0, 0x488, &(0x7f0000001240)={{0x3a, @rand_addr=0x64010102, 0x4e24, 0x0, 'nq\x00', 0xc, 0x10000, 0x4}, {@remote, 0x4e23, 0x10000, 0x8, 0x6, 0x1}}, 0x44) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @loopback, @dev}, &(0x7f00000011c0)=0xc) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001380)={'sit0\x00', &(0x7f0000001300)={'ip6gre0\x00', 0x0, 0x29, 0xe0, 0x0, 0x0, 0x2, @dev={0xfe, 0x80, '\x00', 0x29}, @loopback, 0x20, 0x0, 0x58, 0x200}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000001440)={'syztnl1\x00', &(0x7f00000013c0)={'sit0\x00', 0x0, 0x4, 0x7, 0x3f, 0x21, 0x14, @mcast2, @mcast1, 0x7800, 0x8000, 0x0, 0x1000}}) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002740), 0xffffffffffffffff) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_EEE_SET(r7, &(0x7f0000002800)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000940)={0x20, r8, 0x1, 0x0, 0x0, {0x15}, [@ETHTOOL_A_EEE_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}]}]}, 0x20}}, 0x0) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000001680)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001640)={&(0x7f00000016c0)=ANY=[@ANYBLOB="94010000", @ANYRES16=r1, @ANYBLOB="00082bbd7000fedbdf25190000002c000180140002006261746164765f736c6176655f30000014000200000000000000000000000000000000004c00018008000100", @ANYRES32=r2, @ANYBLOB="14000200766972745f776966693000000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000300020000000800030002000000140002006d6163767461703000000000000000000c00018008000300030000001400018008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="44000180140002006d6163736563300000000000000000000800030001000000080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="14000200627269646765300000000000000000003c0001801400020069703667726574617030000000000000080003000000000008000300030000001400020063616966300000000000000000000000180001801400020076657468315f746f5f626f6e640000003000018008000100", @ANYRES32=r5, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="14000200767863616e310000000000000000000008000100", @ANYRES32=r6, @ANYBLOB="200001801400020073797a6b616c6c65723000000000000008000100", @ANYRES32=r10, @ANYBLOB="cad056ba0f73948c2b2c980bc320e383415c203ffacbf380c3632404b856c3d2eed08f94f8d74c37916c159868cdcc4be8c812234855c543b426fb39d9dfc6281c7e9db589f6182f61e1c300002c0ab9038c"], 0x194}, 0x1, 0x0, 0x0, 0x40808}, 0xc891) r11 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r11, &(0x7f0000000140)=""/4096, 0x1000, 0x0) 21:39:07 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:39:07 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') fsmount(r0, 0x0, 0xf3) pread64(r0, &(0x7f0000001240)=""/4086, 0xff6, 0x10000) r1 = openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000040), 0x2, 0x0) flistxattr(r1, &(0x7f0000001140)=""/230, 0xe6) 21:39:07 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x25, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 2195.581412] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2195.592206] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:39:20 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x401, 0x0, 0x5, 0x0, 0x1fc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) getdents(r0, &(0x7f0000000540)=""/126, 0x7e) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x2106, 0x159) getdents64(r1, &(0x7f0000000040)=""/31, 0x1f) 21:39:20 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x5f, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:39:20 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r1, 0xc020660b, &(0x7f0000000040)) setsockopt$bt_hci_HCI_TIME_STAMP(r1, 0x0, 0x3, &(0x7f0000000040), 0x4) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0x541b, 0x0) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r3, 0x541b, 0x0) ioctl$BTRFS_IOC_RESIZE(r3, 0x50009403, &(0x7f0000000080)={{r2}, {@void, @actul_num={@void, 0x8, 0x67}}}) 21:39:20 executing program 0: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0x541b, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x726029d4fb0c9567, r2) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) r5 = dup2(r4, r3) renameat2(r5, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x1) 21:39:20 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0x541b, 0x0) write$binfmt_elf64(r0, &(0x7f0000000840)={{0x7f, 0x45, 0x4c, 0x46, 0x50, 0x5, 0xf8, 0x0, 0x5, 0x2, 0x3e, 0x1f, 0xfa, 0x40, 0xc8, 0xaef4, 0x3e, 0x38, 0x1, 0x5b5, 0x101, 0x3}, [{0x60000000, 0x0, 0x8965, 0xa14, 0xfffffffffffffffd, 0x5, 0xc60, 0x2}], "c2a99fa80db3830eec4114a43ef110ff635e67e1fe1183cff7b611c77510e98916a4eb59b9"}, 0x9d) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r1) r2 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) sendmsg$inet6(r3, &(0x7f0000000800)={&(0x7f0000000180)={0xa, 0x4e23, 0x4667, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x953e}, 0x1c, &(0x7f0000000740)=[{&(0x7f00000001c0)="b5ccf6427c1418b56ce17ff9212250da9d2794248624e135d9f65c5ef85cd10aa7bad44ef6e43f823e95b3893afb5dfa", 0x30}, {&(0x7f00000002c0)="3f3a2b3ffc57ed1e9a2af245819e67ff2a5db6894df9ab5b02f75c84746e1795c57fdb1dd6edc40ecfa94fd4b71859a678a6c6b8a03fb2897f9a24f0d28a38e000366a803d3cf5dfb29844d7c54b46833792262611b6bf8297b10d7555f11dc2a78a482837238a52360f7c428ecec2314cfef9d4298636f34c13b5e68c60f3fe429af41b3aadf5dfdc904665216880dc00bc", 0x92}, {&(0x7f0000000200)="86a4ae417207e49ecb", 0x9}, {&(0x7f0000000380)="948bc0a58c392d064e6f6f1ed02325ec017d8f161e4f819716e60af1203bf9835a8068b7a2085063f808c7d96c070456c68e4eb82d564eb4264d519db7923950c0b5e89d3bca6e7ce3f72b4dc81a870ee80f8c2834195821cda4eab9e5dc0eff63c69d22f68e51439e91", 0x6a}, {&(0x7f0000000400)="c680048f17fa6b741a32f90e40bc2350bb9936f4b86e4e62ca6d3d2e8fe0c9af3b84e0e4aea0235d89", 0x29}, {&(0x7f0000000440)}, {&(0x7f0000000500)="1ad808448ec785c5202af068f5275af8bab9a8586b40bfafcafe07a189e98861eb49254e4a33ee191d4864d07a97d72468f0ad086d9ab31db2431569340baaf4a9afb790de873c8e4d77e7b126f90dd7a57fdd9f19281c81750bb639fba29dcc040c410fcc3eb6c3b468dfc326c1a582874a", 0x72}, {&(0x7f0000000580)="2862c9c25fc9c70cc57e310744eb84d5c6c8c6c117e9f68a560de2d86d20ea1632a2fdb31b6a684b92d0ad2ed35416e1861d10fc105cef95c606c0c9aac2054ff4b9e039077be6844a9c40b26ed042530be06c6feeea80d1b16f6200afa780ec675ccf34311afb607ece1d8cbd3a3f25b872d64cb55fc85e2e7072ef47fd154a0c6dda2fe1c48e607f6a7ef143600b04c6e37a19b9e746e9d1da462cee26fe29cd4ac35ad3b42b6452213b0a4cf8e284ab3c179ce9993293cf6a27c9eb748304d381e8c579", 0xc5}, {&(0x7f0000000680)="fe0c453bfdb62ce48a71a0e2c012bfb808c3c24e4f285d5797287b41d7f781d616cb970f857f14099966597654", 0x2d}, {&(0x7f00000006c0)="d268e8138843d335f2506c8337ff91d09b17979f4af2839eee5f86531596d9434e544df33991ea7daaef4efdb464fdac71e36dd6d6afbade316d50f292f8faaeb0b3392d0bd4103f1f90a4b4aa52cef67964d20d9a1557900f99461a660eca56f3696c63d85ad1bfe322febcf1860067dba28f9dfa320101541efed88494", 0x7e}], 0xa, &(0x7f0000000940)=[@dstopts_2292={{0x30, 0x29, 0x4, {0x27, 0x2, '\x00', [@ra={0x5, 0x2, 0x9}, @hao={0xc9, 0x10, @local}]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x6}}, @dstopts={{0xa8, 0x29, 0x37, {0x84, 0x11, '\x00', [@pad1, @generic={0x5, 0x71, "dbb5ead38abf233bee89c4c6f04152ab1753bc3fbc4a028b5188f97f16b032cee2a8724ff2bae26222683b7222e3b332b779ea0dc8bb80c0de9ada84aece2a304d128f577bde9b5793b625dd5c48a63140eca8310f8551b7deeb54c94831577ef547380634533138d68e06240c6db5e707"}, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0xd}, @pad1, @ra, @padn]}}}, @rthdr={{0x58, 0x29, 0x39, {0x0, 0x8, 0x2, 0x8, 0x0, [@mcast2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private2={0xfc, 0x2, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x1}}, @dontfrag={{0x14, 0x29, 0x3e, 0x401}}, @dontfrag={{0x14}}], 0x190}, 0x8000) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r2, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:39:20 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') readv(r0, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000080)=""/106, 0x6a}, {&(0x7f0000001140)=""/250, 0xfa}], 0x3) r1 = mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) preadv(r1, &(0x7f0000000500)=[{&(0x7f0000000600)=""/249, 0xf9}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r1, 0x80047213, &(0x7f0000000100)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x100000000}, 0x8020, 0x0, 0x4, 0x0, 0x0, 0x4e7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0xff, 0xb91, 0x0, 0x0, 0xffffffffffffffff}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x4000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_dev$loop(&(0x7f0000000180), 0x3, 0x0) mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) r4 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000080), 0x80800, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(r4, 0xd0009412, &(0x7f0000001e00)={0x0, 0x401}) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) [ 2209.225692] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2209.232563] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:39:20 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 21:39:20 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:39:21 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x26b5, 0xd3e, 0x1, &(0x7f0000000040)={[0x4]}, 0x8) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x628800, 0x2) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) syz_io_uring_setup(0x5de3, &(0x7f0000000380)={0x0, 0x62c, 0x20, 0x1, 0x1db, 0x0, r0}, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000400)) syz_io_uring_setup(0x50b4, &(0x7f0000000440)={0x0, 0xed0a, 0x2, 0x1, 0x2f4, 0x0, r0}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff3000/0xd000)=nil, &(0x7f00000004c0), &(0x7f0000000500)=0x0) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000640)=@IORING_OP_WRITE={0x17, 0x3, 0x4000, @fd_index=0xa, 0x414, &(0x7f00000005c0)="5e05f7dced35da5c063d0c19e2da9b817abbd85c4c8d571be6bd1e4f842636bdc968eb2c0e528de9c401241f87699928c9292b9f9a5677df433d8bf0ab4ec9f92d5803", 0x43, 0x2, 0x0, {0x0, r4}}, 0x8) pwrite64(r0, &(0x7f00000001c0)="013b8908018baf8ecd9de56c861ab84275f1e340eb1f04dfbadf0dcb5efc7e0138b23150520b35495bb68dc708a0d0a57367c71ba8e6de456efd154357dbc77a9cedca2479f853884f306b7e7da235a82de33b0ed49e847adbc42c0633bea884f061bdc0b244159208a9553c90001cd9f6970e9096ce7cbaf1fd943d05dc7a48136743197051dfcf89fbf6a86940b30afa0586dd5c4317af98f27ae01060f1e7afd89707b56aed37776d08c490a77477ab39364b62fc035af98a9ee60e313023efd57d0760988f3ca46db5eee189439637f419557859c403a0d2a391115c3e", 0xdf, 0x9) getdents(r1, &(0x7f0000000540)=""/126, 0x7e) write$tun(r0, &(0x7f00000002c0)={@val={0x0, 0x11}, @void, @x25={0x0, 0x1, 0x1, "718035ffc58faebd17f9a956eaa9375a2ac86f25e6a1a08117527df48acff8387b4339f939f349e4d3a90efd3952aac40603984f0e42722a59a9dc0a8ec601f556d8217d350a8e324ccde4954e5142944ae129027c32307f477bddbc9d8d2f8f50543792b1d114521f3d713b6222fec9b104787b21e309cd085afc1814ac7efbc2797aaa86865eafa336676e8f6934bc225f7fb9c7a0f4a56bb1b1ff458319ba2ed737b362e08787902d"}}, 0xb1) 21:39:21 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x300, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:39:21 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_names\x00') sendmsg$AUDIT_LIST_RULES(r1, &(0x7f0000001140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x10, 0x3f5, 0x4, 0x70bd28, 0x25dfdbfd, "", ["", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x20000000}, 0x4004081) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000001180)={{0x1, 0x1, 0x18, r1, @out_args}, './file0\x00'}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001200), r1) sendmsg$NL80211_CMD_STOP_P2P_DEVICE(r2, &(0x7f00000012c0)={&(0x7f00000011c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001280)={&(0x7f0000001240)=ANY=[@ANYBLOB="14400000", @ANYRES16=r3, @ANYBLOB="02022cbd7000fcdbdf255a000000"], 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x40080) 21:39:21 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, 0x0, 0x4, 0x0) [ 2223.309009] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:39:35 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 21:39:35 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'wlan0\x00'}) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:39:35 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, 0x0, 0x4, 0x0) 21:39:35 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0xc020660b, &(0x7f0000000040)) ioctl$SNDRV_TIMER_IOCTL_STOP(r2, 0x54a1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x2) r3 = openat(r1, &(0x7f00000001c0)='./file1\x00', 0x531801, 0xa0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r3, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0xee01}}, './file0\x00'}) openat$cgroup_ro(r4, &(0x7f0000000240)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) getdents(r1, &(0x7f0000000540)=""/126, 0x7e) chroot(&(0x7f0000000000)='./file0\x00') 21:39:35 executing program 2: r0 = msgget$private(0x0, 0x2c) msgrcv(r0, &(0x7f0000000040)={0x0, ""/248}, 0x100, 0x2, 0x2000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/raw6\x00') pread64(r1, &(0x7f0000000140)=""/4096, 0x1000, 0x400000000000000) 21:39:35 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:39:35 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') r1 = syz_open_procfs$userns(0x0, &(0x7f0000000080)) close(r1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0xc020660b, &(0x7f00000000c0)={0x0, 0x0, 0xfffffffffffffffc, 0x80000001, 0xffffffff, 0x8000}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000180)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="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"]) pread64(r3, &(0x7f0000001140)=""/4073, 0xfe9, 0x4170) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x40000) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r4, 0x0) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r5, 0x0) r6 = socket$nl_sock_diag(0x10, 0x3, 0x4) close_range(r6, r0, 0x2) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140), 0x1002084, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, r4}}, {@debug={'debug', 0x3d, 0x1}}, {@access_user}, {@access_uid={'access', 0x3d, 0xee00}}, {@cache_loose}, {@version_L}, {@noextend}, {@msize={'msize', 0x3d, 0x8}}], [{@smackfsroot={'smackfsroot', 0x3d, 'task\x00'}}, {@uid_lt={'uid<', r5}}, {@measure}, {@euid_gt={'euid>', 0xee00}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@hash}]}}) 21:39:35 executing program 0: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0x541b, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x726029d4fb0c9567, r2) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) r5 = dup2(r4, r3) renameat2(r5, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x1) [ 2223.329676] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:39:35 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x800, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) getdents(r1, &(0x7f0000000540)=""/126, 0x7e) 21:39:35 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, 0x0, 0x4, 0x0) 21:39:35 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x2, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:39:35 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 21:39:35 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x200000000000, 0x0, 0x0, 0x8, 0xffffffff, 0x8, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaab05, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1401000a00}], 0x0, &(0x7f0000000240)=ANY=[]) getdents(r0, &(0x7f0000000540)=""/126, 0x7e) 21:39:35 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:39:35 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002740), 0xffffffffffffffff) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) r5 = eventfd(0x8) sendfile(0xffffffffffffffff, r5, &(0x7f0000000080)=0x200, 0x867) sendmsg$ETHTOOL_MSG_EEE_SET(r1, &(0x7f0000002800)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000940)={0x20, r2, 0x1, 0x0, 0x0, {0x15}, [@ETHTOOL_A_EEE_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}]}, 0x20}}, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x9, r4, 0x1, 0x6, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1f}}, 0x14) [ 2223.490375] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2223.492946] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:39:35 executing program 0: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0x541b, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x726029d4fb0c9567, r2) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) r5 = dup2(r4, r3) renameat2(r5, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x1) 21:39:35 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) [ 2237.867767] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:39:49 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x34, 0x3, 0x1, 0x1f, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0xe0, 0xa93}, 0x8820, 0x100000000, 0x40, 0x0, 0xffffffffffffffff, 0xff, 0x5, 0x0, 0x2, 0x0, 0x8}, 0xffffffffffffffff, 0x0, r0, 0x1) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) getdents(r1, &(0x7f0000000540)=""/126, 0x7e) 21:39:49 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000040)) 21:39:49 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x3, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:39:49 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/route\x00') pread64(r0, &(0x7f0000001080)=""/4089, 0xffffff4b, 0x100000001) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f00000000c0)) ioctl$BLKGETSIZE64(r0, 0x80081272, &(0x7f0000000000)) fcntl$getownex(r0, 0x10, &(0x7f0000000040)) [ 2237.918364] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2238.007744] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2238.014112] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:39:49 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:39:49 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0xe, 0x3) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:39:49 executing program 0: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0x541b, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x726029d4fb0c9567, r2) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) r5 = dup2(r4, r3) renameat2(r5, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x1) 21:39:49 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) 21:39:49 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x4, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:39:49 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:39:49 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgid(0x0) syz_open_procfs(r0, &(0x7f0000000640)='net/hci\x00') perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x9, 0x8, 0x20, 0x1, 0x0, 0xb58, 0x40900, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x43c, 0x1, @perf_config_ext={0x8, 0x8001}, 0x2, 0x5, 0x0, 0x4, 0xffffffff80000001, 0x2, 0xcbd, 0x0, 0x80}, r0, 0xf, 0xffffffffffffffff, 0x1) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) getdents(r1, &(0x7f0000000540)=""/126, 0x7e) 21:39:49 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4308, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r2, 0x0, 0x9, 0x1) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:39:49 executing program 0: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0x541b, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x726029d4fb0c9567, r2) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) r5 = dup2(r4, r3) renameat2(r5, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x1) 21:39:49 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r1, 0xc020660b, &(0x7f0000000040)) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0x541b, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0x4}}, './file0\x00'}) pread64(r0, &(0x7f0000001140)=""/4096, 0x1000, 0x0) 21:39:49 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x5, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:39:49 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) 21:39:49 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x200, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x9, 0x0, 0x4, 0x1, 0x0, 0x0, 0x10200, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x0, 0x20, 0x5d, 0x9, 0xfffffffffffffff7, 0x4, 0x101, 0x0, 0x3, 0x0, 0x7ff}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x3) shmat(r1, &(0x7f0000ffc000/0x2000)=nil, 0x0) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x8000000000000000, 0x0, &(0x7f0000000180), 0x84000, &(0x7f0000000240)=ANY=[@ANYRES64=r0, @ANYRESHEX=r1, @ANYBLOB="e6dd38477161b590e4d8b26c6c5be53f82b17825e8148654b27b4b547c1e3e336638f4beca7fefc8bed5516db99c6e8c5ad2e53f6249da54ed1e2ec61d1212da9c36dc6ed411c3c4fcf4943982b045629926a5558e2081c0e4679baf626ba9a94a0d028ba2d22b4576fcac60ad94edc7186df18c47ed118d2053a80087f4d30828b1a36d6b4ddd1b4e2435a3cd5ae6317682ad561eb051cafefe9d18c3ad3d491ec762e448e46154e42de0b5d5b2dfe7cb76e61fe5d512c363a80c912fb5602d5740385e0a2436b4bea850ad7532ea3962c94438f1d71ec0308df5dd2414abe50a1476f98e", @ANYRES32=r2, @ANYRES16=r1]) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x200, 0x100) getdents(r3, &(0x7f0000000540)=""/126, 0x7e) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0xfd, 0x7, 0x3f, 0xd5, 0x0, 0x5, 0x8000, 0xe, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000040)}, 0x1840, 0x7812, 0x67d, 0x8, 0x100000001, 0x6, 0x6, 0x0, 0x2, 0x0, 0x6}, 0xffffffffffffffff, 0xe, r4, 0x8) [ 2238.153461] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2238.163381] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:40:03 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:40:03 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x6, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:40:03 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r1) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) sendmsg$IEEE802154_ASSOCIATE_REQ(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x1c, r2, 0x800, 0x70bd28, 0x25dfdbfd, {}, [@IEEE802154_ATTR_CAPABILITY={0x5, 0x11, 0xe}]}, 0x1c}}, 0x40) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, r2, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x8054) r3 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) getdents(r4, &(0x7f0000000540)=""/126, 0x7e) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r5, 0xc020660b, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f00000002c0)={0x5, 0x80, 0x70, 0x0, 0x5, 0x9, 0x0, 0x2, 0x1801, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2, @perf_config_ext={0xffffffffffffffff, 0x7f}, 0x10030, 0x6, 0x2, 0x6, 0xff, 0x8, 0x5, 0x0, 0x0, 0x0, 0x5}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x7, 0x5, 0x81, 0x9, 0x0, 0x9, 0x10000, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000000), 0x3}, 0x10100, 0x6, 0xd632, 0x9, 0x9, 0x20, 0x7bc, 0x0, 0x1, 0x0, 0x1000}, 0x0, 0xb, r3, 0x3) getdents64(r4, &(0x7f0000000240)=""/79, 0x4f) 21:40:03 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fd\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r1, 0xc020660b, &(0x7f0000000040)) openat(r0, &(0x7f0000000080)='./file1\x00', 0x2000, 0x7d) r2 = socket$nl_generic(0x10, 0x3, 0x10) pread64(r2, &(0x7f0000001080)=""/4111, 0xffffffffffffffda, 0x3f) 21:40:03 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000500)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdow\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)\xb5nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6s\xe3F\x9cX1\x18\xaf\x96(;\xff\xcaWDo\x9dC\xfb\xf0@ S\x94\x1e9\x8b\xb4\x98\xff~\x00SK\x15\xd26v\xa9c\x8e\xdajm\xc4\x8c\xee\x11\x82\xdc]\x0f\xdf\xf7\x149\xea\x90\xce\xa4`\xef\x1e&\x92\xb1k\v%\xf9\x0e\f\xe3\xd2\xe1\xcc-\xa3$\xfc\xcc \x16\xe0\x13\x11\xcbd\n\xcft\x86uC\xf5\xfd5\x18\xa0&\xd0\x10&\x83P\x9f\xff\xff\xff\xff\x92\x9fe\xd0\xe3y\xab\xb0_\xa4\x8eW\xcb\xf2\xe0\x8f\x13%+\x0ec\x87\xea\xef&\xf6\x05\xe1\x1c\xea\xc9\x15\xd8D\xe8F\x0f\x7f-\"\xb7\x03\xf0\"]\xf3\xb1\x8f\x1a\x00\x1d\xaa\xac\xd3v\xf2K\xfaD\xfc:\xbd6\x04T\xd8\x9c\x03\xd0\x19Z\x87\x83\x0e\xb5\xa3w\x12V\xc72\xfc\xa5\xb4\xed\xac|\x83\xd6\xfa\xec\xb4\xa5\xce\xf1\x02\x00\x00\x00\x00\x00\x00\x00$\x10\xcf\xf8\xda!\xdf\xd6+!\xfd\xe8\a\xbc\xfa?\x88\"\xfb\xa2\xa7\xf3\xc5\xc95\x1ef?\xfd+\x06\x85\xd0\xa6+\x14\x85\x9fq\xbf7$\xc0\xa5\x12\xf3\xb8\xcbF\xec\xb0z\x94*.\xcb3\x1e\xcf\x9c\xc90\xfb\xf3\xb7\xcb\x9f\xa9\xc7wo\x1cz\x91\x90 \xbfqQ\x01\x9f$t\x98\xeb\x16:k\x8a\x10\xbb\xcey\xde\xbd\xcd\x9c\x9e\xe0\xf1\xf0R\xd2\xe1@\xe5\xa2\xf1TL^ \x94\xa2\xbcr\xed{^B`\xea\x917\xban{|bw^\x9fnY\xffM\x9c\vO\x00\xcc\xd1(\xcaj\x00t\x87NM\x8d\xd8\x04\xf3\xa0\xba\xc1\xcc\xea\v^W\xf9\bD\xc7\xa2\\\xa9\f\xd7\xe7\xdb\xde\xea\xb9\xbc7\xd0\xcb6\xb7\x8aY+\x1b\xd0\x95EO', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r2 = openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8400, 0xe) add_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000002c0)="d77c621731eb38f660366d9fa9828197ce8f68b2ce15ea163253a2dfef21e618fa87a6e28d64bd34725d4043574b7764a753bef68d309ae6526e966aa001aed285a5b19aac62a789db1213e97c00c88dde004484700c6cf57da299ab9fa93567d9321c510a38acceaf1d25ccf157da715655b4a8448f1b416c3f1ff364d93575266d965a315fbad12143debd980b213e6b0ad3a8d172d130821adcd913025ae207e1f1b9072914f70a4d74b9b0f1de61ee6b4c285cf7260998f38e3411af846934b0bffcbd432b27", 0xc8, 0xfffffffffffffffb) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg$unix(r2, &(0x7f0000003a80)=[{{&(0x7f0000000740), 0x6e, &(0x7f0000000a80)=[{&(0x7f00000007c0)=""/149, 0x95}, {&(0x7f0000000940)=""/178, 0xb2}, {&(0x7f0000001280)=""/4096, 0x1000}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000000880)=""/111, 0x6f}, {&(0x7f0000000a00)=""/76, 0x4c}], 0x6, &(0x7f0000000b00)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x58}}, {{&(0x7f0000000b80), 0x6e, &(0x7f0000000200)=[{&(0x7f0000000c00)=""/222, 0xde}], 0x1, &(0x7f0000003bc0)=ANY=[@ANYBLOB="1c00feffffffffff0000000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000a05e9c7f21d7f5cd37d2f81911dac609d6ea1eda161e50cbeb98bd72b4fbd0f5f154abf4ec11127d171c211d1121dfb8d868707f89d0b216fa292f6149f5dcb99b779980899a06603413", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x98}}, {{&(0x7f0000000dc0)=@abs, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000e40)=""/244, 0xf4}, {&(0x7f0000000f40)=""/236, 0xec}], 0x2, &(0x7f0000001040)=[@cred={{0x1c}}], 0x20}}, {{&(0x7f0000001080), 0x6e, &(0x7f0000003500)=[{&(0x7f0000001100)=""/94, 0x5e}, {&(0x7f0000001180)=""/16, 0x10}, {&(0x7f0000003280)=""/82, 0x52}, {&(0x7f0000003300)=""/226, 0xe2}, {&(0x7f00000011c0)}, {&(0x7f0000003400)=""/206, 0xce}], 0x6, &(0x7f0000003580)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x48}}, {{&(0x7f0000003600)=@abs, 0x6e, &(0x7f0000003980)=[{&(0x7f0000003680)=""/160, 0xa0}, {&(0x7f0000003740)=""/185, 0xb9}, {&(0x7f0000003800)=""/139, 0x8b}, {&(0x7f00000038c0)=""/177, 0xb1}], 0x4, &(0x7f0000003cc0)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000100000002000000484de159f97b0a85e5eb55c159afbf1813e24198ef329799fc919a032e7269e5bc89a0d54d7e6d72b6fde8f9a7c9e16376c9d5d01be102f7526a47b71fb3f081ed6b791bdf929f7f32c133a0ab36d2d06501cfbfa2733800c1ea5bf5cc27546aac51c093f06451e9e188c32d4ce0d9194e1ab46e32f5bdd2a0877fcaf6fe58343204e940c8bbd97d0f0bf63bcfd8fe836984f3f6401519fd1158cc7ad2982a7631747a8baf78ed08e1e1b74f21259605582f1e0fda7fac86ad6d2c43aa4474917c751f3a1dafeae5b4d375b5918d97d690", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0xb8}}], 0x5, 0x40, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r4, 0xc020660b, &(0x7f0000000040)) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x81, 0x6, 0xff, 0xf3, 0x0, 0x7, 0x60, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ea, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x4000, 0x6, 0x2, 0x2, 0x8001, 0x6, 0x4, 0x0, 0x4, 0x0, 0x3}, r3, 0x2, r4, 0x9) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:40:03 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, 0x0, 0x4, 0x0) 21:40:03 executing program 2: pread64(0xffffffffffffffff, &(0x7f0000000140)=""/4096, 0x1000, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) close(r0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="04ea7a37ce62d7"], 0x14}}, 0x0) syz_io_uring_setup(0x4, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)) r3 = syz_io_uring_complete(r2) faccessat2(r3, &(0x7f00000001c0)='./file0\x00', 0x160, 0x300) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), r1) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r3, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r4, 0x100, 0x70bd26, 0x25dfdbff, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x15f}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x8001) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000001180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001140)={&(0x7f0000000100)={0x24, r4, 0x300, 0x70bd2c, 0x25dfdbfd, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x3}]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x400c0d0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="0246000000f709002e6c653000"]) dup3(r5, r0, 0x80000) ioctl$sock_bt_hci(r5, 0x400448ca, &(0x7f0000000040)="eb74dfa2a6fc508f92ff98fc16ac6aa8d963e3725add3a937a375a323f5c80dd5e05cbceb1612e987a543c9776d9b0091e32d9989b778d013d5dc809b9a476abac3c52827365942878782765338e656e918c6e31a7f3fe48b3f925581da6690578ce3a842800a83c5bb9ce05617061e9426d0343fe8bd044eb6aec8c") 21:40:03 executing program 0: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0x541b, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) r4 = dup2(r3, 0xffffffffffffffff) renameat2(r4, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x1) [ 2251.970600] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2251.987855] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:40:03 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x0) r1 = getpgid(0x0) syz_open_procfs(r1, &(0x7f0000000640)='net/hci\x00') r2 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x41040, 0x10) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x20, 0x81, 0x40, 0x1, 0x0, 0xc9, 0x98400, 0x6, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x48020, 0x2, 0x3f, 0x0, 0x20, 0x3, 0x67f, 0x0, 0x71fc, 0x0, 0x4}, r1, 0x5, r2, 0x2) 21:40:03 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:40:03 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x100000000, 0x7, &(0x7f00000015c0)=[{&(0x7f00000001c0)="3536a5cfe08784fdd643688de50aca6c0727e54cf71428f57b3895b7284c908275f37a18ca0b4cbbea5539a41353d0a7f2e6e63d504066491a33472446813099fd8a0f7072f0b77190fd1b48111cf53780", 0x51, 0x8}, {&(0x7f0000000240)="5a444644e0f8a4bd23f2f130e4bd0c65df7902fdcbda5fbe7e541030b791cb06b7aae46ef224d94599739b11c95d11f0e19afb15e6ed45f5fc823c74c2fb9be894ccb0ea02d5dd30a4d2a387045433334d2bb63c518bb30dafd1e8dac303a10c902b353c32aaf7e081f3d77625855c4a4e03c44f9255971be2bae880186e6b0ab25a0f02117dab8834eaf9b0", 0x8c, 0xffff}, {&(0x7f0000000300)="fad7a88f7b91bbc6fdc7735c239d4273e1aa159c0b6ed892b0883f87d4cd3251e0003a8aca7d5c5169162947aeec41b190aca534c6e4884afdbfac47713541b1de13b9ff19104cb3f7cc14542c98cf7ccef4299037859dbfe24ec40d71716bed25d55c1963f98ad4139f34f2b2879415b536a42271cf67365293b69f5090448dbf6eefdbb397797938d049", 0x8b, 0x6ad4d851}, {&(0x7f00000003c0)="10c1e6ddad32dd621f0c0adb9a21945067b81781d32f73d45563de3c6e6e1943577ceea2d0f53c40c9152e7f90ccb6289e8a08a1e1821c3804caa07cf38d8fac89a2bc2a87944a127046a854294135c8d500334c6e8eb03994997175c1a0eb8ad2da9dccbb5656b1cece7e7d6d8642d70c3706ca35e35b7a347d673a9889976ec65eedbb4049e42bc4ad6b5264b7172299d665cc2bb85387508bad6c823d065ce95e4eee2d90e99e0ff224f0998569fb219eafeb5db4d93e2f11dc3c1a22ddee9e919fb837e761ab150880f1bb46933d46b6fbe8", 0xd4, 0x7}, {&(0x7f00000005c0)="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", 0x1000, 0x59}, {&(0x7f00000004c0)="22352d5dd174592bcdff5dc27a9757d6866759f3503857dbac2999371f1f5de35063eb31239f7fce548aab1d8ad31706289ee2235854e48adfb89ecd8c0dff0d019a0aa1d72b900d866e812523b854", 0x4f, 0x3ff}, {&(0x7f0000000100)="a811fb0c0f67ff2aa0f490065bca012398671a37c66d7cf336b97e304a3f9798fcc642727f851e14e3f9ba815ff6f43161904bab4d0352811e955864100b", 0x3e, 0xf49}], 0x2000000, &(0x7f0000001680)={[{@shortname_mixed}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x35, 0x35, 0x62, 0x34, 0x65, 0x65, 0x64], 0x2d, [0x38, 0x39, 0x36, 0x62], 0x2d, [0x35, 0x62, 0x61, 0x37], 0x2d, [0x31, 0x62, 0x63, 0x60], 0x2d, [0x30, 0x31, 0x37, 0x39, 0x61, 0x32, 0x33, 0x39]}}}, {@subj_role={'subj_role', 0x3d, '{'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}]}) getdents(r0, &(0x7f0000000540)=""/126, 0x7e) 21:40:03 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x7, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:40:03 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, 0x0, 0x4, 0x0) 21:40:03 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') sendmsg$nl_netfilter(r0, &(0x7f0000001280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000100)={&(0x7f0000001140)={0x108, 0xc, 0x8, 0x201, 0x70bd25, 0x25dfdbfe, {0x0, 0x0, 0x9}, [@generic="ce02e1e16430f4b3ecfe25422cb244ca1498abff07e88e152cbe1dc723c834f77e66b8b06c083bbfb7c2db", @generic="1cbb88f5a00eb74c527a966fc69c3843b34157a77ef447749a7a371825dbc70029d4c4fca571020c53245db43cbf176ae11a061b657327bf93f4a8136fc8d25586d4366f003b24ccfd713b1fcf48c4ed255d84d6c612659cb73e6ae1471e80f94a0a79b527c83b8c87d8cc573b7a1295daa3910c26549fe672e20d2526bb6439d0a1ad5a2bd02bb922dc5dfc2fd47df82fe0b72f0cb881f10a643e303c4408ff38993eda13398923458c93bd2855fa37f5278217d87738125e27e7881627549debb6b630e8c2153bb4"]}, 0x108}, 0x1, 0x0, 0x0, 0x24000004}, 0x14081) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0x541b, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x34, 0x0, 0x1, 0x70bd26, 0x25dfdbfd, {{}, {}, {0x18, 0x17, {0x12, 0x7fff, @l2={'eth', 0x3a, 'gre0\x00'}}}}, ["", "", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x4000080) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0x541b, 0x0) pread64(r2, &(0x7f0000000140)=""/4096, 0xfffffffffffffdc3, 0x2) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r3, 0x541b, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f00000013c0)={{0x81, 0x8}, {0x3, 0x73}, 0xa8, 0x4, 0x1}) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x5033f52fcddf3199) ioctl$TUNGETFEATURES(r4, 0x800454cf, &(0x7f0000000080)) [ 2252.197121] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2252.212308] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:40:03 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) getdents(r0, &(0x7f0000000540)=""/126, 0x7e) r1 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000000)) write$binfmt_elf64(r1, &(0x7f00000005c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x9, 0x80, 0x3f, 0x4, 0x3, 0x6, 0xff00, 0x16f, 0x40, 0x31c, 0x2, 0x0, 0x38, 0x1, 0x401, 0x7, 0x20}, [{0x7, 0x7d64, 0x5, 0x1, 0x10001, 0xffffffffffffff7f, 0x7, 0x2}, {0x2, 0x5, 0xffffffffffffffff, 0x703, 0x5, 0x0, 0x30, 0x4}], "8281cd89c6c5131c16c2c27011aa3716f6340bdbfe12e198344f6240e3545aa01530df41ed2eb7a413daad9d8144aeee48df3e719a22017b9dcce64e9ab4fac4ee6c7b52bd45dc5207982008bf47f88f942d50af9c98ff562c35907554c2ba1c382daed39aea65411efd2240f7451f02aa995b0897c38acc958fe45fa911e85f6825a29d0b660f19895ff3f05d81c3e7de2ceb1340f14892d33384ae71b67ccfe6d9e044b1400a52a0623628c6a5fb3cb925f2aacb7de9f5b19be0daecd5f3368d54ace6f10a159bb8403ef76bb763e7dcac4ac4a0d75da0e91722935f2d1a41c1e196aa", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xb94) 21:40:19 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0xc020660b, &(0x7f0000000040)) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r3, 0xc020660b, &(0x7f0000000040)) r4 = syz_open_dev$vcsu(&(0x7f0000000180), 0x916, 0x200) openat$incfs(r4, 0x0, 0xa8000, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:40:19 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0xc020660b, &(0x7f0000000040)) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000000040)=""/12) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0x541b, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000080)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') clock_gettime(0x0, &(0x7f0000001140)={0x0, 0x0}) utimensat(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000001180)={{0x0, 0x2710}, {r3, r4/1000+10000}}, 0x0) pread64(r2, &(0x7f0000000140)=""/4096, 0x1000, 0x0) 21:40:19 executing program 3: r0 = getpgid(0x0) syz_open_procfs(r0, &(0x7f0000000640)='net/hci\x00') r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44000, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext, 0x102, 0x0, 0x0, 0x7, 0x5, 0x50000}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r4, 0xc020660b, &(0x7f0000000040)) write$P9_RREADLINK(r4, &(0x7f0000000040)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r3, 0x541b, 0x0) lseek(r3, 0x2, 0x4) ioctl$AUTOFS_IOC_CATATONIC(r1, 0x9362, 0x0) getdents(r2, &(0x7f0000000540)=""/126, 0x7e) 21:40:19 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, 0x0, 0x4, 0x0) [ 2267.523612] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2267.525817] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:40:19 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:40:19 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x8, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:40:19 executing program 0: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0x541b, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) r4 = dup2(r3, 0xffffffffffffffff) renameat2(r4, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x1) 21:40:19 executing program 2: syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x6000, 0x0) 21:40:19 executing program 2: umount2(&(0x7f0000000080)='./file0\x00', 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0x541b, 0x0) ioctl$BTRFS_IOC_SET_FEATURES(r1, 0x40309439, &(0x7f0000000040)={0x0, 0x0, 0xa}) 21:40:19 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0xc020660b, &(0x7f0000000040)) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000200)={'filter\x00', 0x0, 0x4, 0x17, [0x3f, 0xfff, 0x9, 0x32, 0x0, 0x2], 0x3, &(0x7f0000000100)=[{}, {}, {}], &(0x7f00000001c0)=""/23}, &(0x7f0000000280)=0x78) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) getdents(r1, &(0x7f0000000540)=""/126, 0x7e) getdents(r1, &(0x7f0000000000)=""/80, 0x50) 21:40:19 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0x9, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:40:19 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:40:19 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:40:19 executing program 4: r0 = getpgid(0x0) syz_open_procfs(r0, &(0x7f0000000640)='net/hci\x00') r1 = getpgid(0x0) syz_open_procfs(r1, &(0x7f0000000640)='net/hci\x00') r2 = syz_open_procfs(r1, &(0x7f0000000000)='stat\x00') pread64(r2, &(0x7f0000000140)=""/4096, 0x1000, 0x0) 21:40:19 executing program 0: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0x541b, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) r4 = dup2(r3, 0xffffffffffffffff) renameat2(r4, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x1) [ 2267.651325] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2267.658165] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:40:19 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x9, 0x7, 0x9, 0x4, 0x0, 0x7f, 0x20, 0xc, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7ff, 0x1, @perf_config_ext={0x0, 0x9}, 0x210, 0x2, 0xffffff7f, 0x9, 0x8c, 0x9, 0x5, 0x0, 0x2, 0x0, 0x100000000}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x6) dup2(r0, r1) syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') r2 = syz_open_dev$mouse(&(0x7f0000000100), 0x8, 0x1) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002740), 0xffffffffffffffff) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_EEE_SET(r3, &(0x7f0000002800)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000940)={0x20, r4, 0x1, 0x0, 0x0, {0x15}, [@ETHTOOL_A_EEE_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}]}, 0x20}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r2, 0x89f6, &(0x7f00000001c0)={'syztnl0\x00', &(0x7f0000000140)={'sit0\x00', r6, 0x4, 0x1, 0x4, 0x1, 0x15, @local, @private0, 0x8, 0x700, 0x315, 0x3}}) 21:40:33 executing program 0: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x726029d4fb0c9567, r2) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) r5 = dup2(r4, r3) renameat2(r5, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x1) 21:40:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0x541b, 0x0) pwrite64(r1, &(0x7f0000000080)="5df2194ad762efdedb91711c3cfdd5f29be9d7cc39fe61cb2dc0449d830b966661d533ea7551dc945fca248f705460f6a9f6f241c6915dabe777e49600dd890398bdc982bd4145543bbeccf9180fbd6611eb8a2a937ffbcf341387add3e30cccd696fc9907dbbb38e54d6e1674eee14ba27a6c876386de21ae3b2e0a", 0x7c, 0x2000000008001) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0x541b, 0x0) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r3, 0x541b, 0x0) pread64(r3, &(0x7f0000001140)=""/4096, 0xffffffffffffff5c, 0x14) [ 2281.419803] ------------[ cut here ]------------ [ 2281.424530] WARNING: CPU: 0 PID: 12214 at kernel/cgroup/cgroup.c:1395 cset_cgroup_from_root+0x1a8/0x2a0 [ 2281.425755] Modules linked in: [ 2281.426156] CPU: 0 PID: 12214 Comm: syz-executor.4 Not tainted 5.10.226 #1 [ 2281.426989] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 21:40:33 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='cpuset\x00') pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0xc0102, 0x2) 21:40:33 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdb4b, 0x28800, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) [ 2281.428000] RIP: 0010:cset_cgroup_from_root+0x1a8/0x2a0 [ 2281.428656] Code: 50 08 00 be ff ff ff ff 48 c7 c7 08 3a 02 85 e8 6e 9e ad 02 31 ff 41 89 c4 89 c6 e8 d2 49 08 00 45 85 e4 75 07 e8 78 50 08 00 <0f> 0b e8 71 50 08 00 48 89 ea 83 e5 07 48 b8 00 00 00 00 00 fc ff [ 2281.430887] RSP: 0018:ffff888047897b98 EFLAGS: 00010016 [ 2281.431532] RAX: 00000000000008c1 RBX: ffff888018364c00 RCX: ffffc900019a0000 [ 2281.432404] RDX: 0000000000040000 RSI: ffffffff81384ec8 RDI: 0000000000000005 [ 2281.433269] RBP: ffffffff85676efc R08: 0000000000000000 R09: 0000000000000003 [ 2281.434131] R10: 0000000000000000 R11: 0000000000000001 R12: 0000000000000000 [ 2281.434994] R13: ffff888016cf0000 R14: ffff888046dcb400 R15: 0000000000000000 [ 2281.435862] FS: 00007f98edfbb700(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 2281.452749] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2281.453452] CR2: 0000001b2cf21000 CR3: 000000004545e000 CR4: 0000000000350ef0 [ 2281.454313] Call Trace: [ 2281.454637] ? __warn+0xe2/0x1f0 [ 2281.455050] ? cset_cgroup_from_root+0x1a8/0x2a0 [ 2281.455627] ? report_bug+0x1c1/0x210 [ 2281.456096] ? handle_bug+0x41/0x90 [ 2281.460560] ? exc_invalid_op+0x14/0x50 [ 2281.461047] ? asm_exc_invalid_op+0x12/0x20 [ 2281.461578] ? cset_cgroup_from_root+0x1a8/0x2a0 [ 2281.462152] ? cset_cgroup_from_root+0x1a8/0x2a0 [ 2281.462727] ? cset_cgroup_from_root+0x1a8/0x2a0 [ 2281.463305] cgroup_path_ns_locked+0x6c/0x110 [ 2281.463854] proc_cpuset_show+0x19a/0x510 [ 2281.464393] proc_single_show+0x121/0x1f0 [ 2281.464902] seq_read_iter+0x510/0x12b0 [ 2281.465400] seq_read+0x3dd/0x5b0 [ 2281.465824] ? seq_read_iter+0x12b0/0x12b0 [ 2281.466349] ? fsnotify_perm.part.0+0x22d/0x620 [ 2281.466919] ? security_file_permission+0xb1/0xe0 [ 2281.467508] ? seq_read_iter+0x12b0/0x12b0 [ 2281.468023] vfs_read+0x228/0x620 [ 2281.468462] __x64_sys_pread64+0x201/0x260 [ 2281.468978] ? ksys_pread64+0x1b0/0x1b0 [ 2281.469466] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2281.470103] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2281.470729] do_syscall_64+0x33/0x40 [ 2281.471184] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2281.471806] RIP: 0033:0x7f98f0a45b19 [ 2281.472271] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2281.474500] RSP: 002b:00007f98edfbb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000011 [ 2281.475424] RAX: ffffffffffffffda RBX: 00007f98f0b58f60 RCX: 00007f98f0a45b19 [ 2281.476303] RDX: 0000000000001000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2281.477167] RBP: 00007f98f0a9ff6d R08: 0000000000000000 R09: 0000000000000000 [ 2281.478029] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2281.478894] R13: 00007ffe1eb80b4f R14: 00007f98edfbb300 R15: 0000000000022000 [ 2281.479774] irq event stamp: 154 [ 2281.480189] hardirqs last enabled at (153): [] _raw_spin_unlock_irqrestore+0x38/0x40 [ 2281.481334] hardirqs last disabled at (154): [] _raw_spin_lock_irq+0x3e/0x40 [ 2281.482380] softirqs last enabled at (0): [] copy_process+0x16ed/0x7800 [ 2281.483378] softirqs last disabled at (0): [<0000000000000000>] 0x0 21:40:33 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x24, 0x10, 0x1, 0xf, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x5, 0x0, 0x0, 0x1, [@generic='H']}]}, 0x24}}, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80101) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x62, 0x24}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2c0480d0}, 0x4040054) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 2281.484141] ---[ end trace a5e1bf88a9dfcd91 ]--- 21:40:33 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:40:33 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:40:33 executing program 2: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=0x0) r1 = syz_open_procfs(r0, &(0x7f00000000c0)='net/netlink\x00') ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1, {0x6}}, './file0\x00'}) openat(r2, &(0x7f0000000080)='./file0\x00', 0x4000, 0xc2) pread64(r1, &(0x7f0000000140)=""/4096, 0x1000, 0x0) 21:40:33 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) getdents(r0, &(0x7f0000000540)=""/126, 0x7e) open(&(0x7f0000000000)='./file0\x00', 0x511042, 0x12) 21:40:33 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) r2 = open_tree(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x8000) ioctl$F2FS_IOC_PRECACHE_EXTENTS(r2, 0xf50f, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:40:33 executing program 2: recvmmsg$unix(0xffffffffffffffff, &(0x7f0000003080)=[{{0x0, 0x0, &(0x7f0000001100)=[{&(0x7f0000000040)=""/4096, 0x1000}, {&(0x7f0000001040)=""/2, 0x2}, {&(0x7f0000001080)=""/91, 0x5b}], 0x3}}, {{&(0x7f0000001140)=@abs, 0x6e, &(0x7f00000015c0)=[{&(0x7f00000011c0)=""/37, 0x25}, {&(0x7f0000001200)=""/171, 0xab}, {&(0x7f00000012c0)=""/244, 0xf4}, {&(0x7f00000013c0)=""/51, 0x33}, {&(0x7f0000001400)=""/24, 0x18}, {&(0x7f0000001440)=""/10, 0xa}, {&(0x7f0000001480)}, {&(0x7f00000014c0)=""/208, 0xd0}], 0x8, &(0x7f0000001640)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xd8}}, {{&(0x7f0000001740), 0x6e, &(0x7f0000002b40)=[{&(0x7f00000017c0)=""/4096, 0x1000}, {&(0x7f00000027c0)=""/48, 0x30}, {&(0x7f0000002800)=""/106, 0x6a}, {&(0x7f0000002880)=""/138, 0x8a}, {&(0x7f0000002940)=""/50, 0x32}, {&(0x7f0000002980)=""/214, 0xd6}, {&(0x7f0000002a80)=""/127, 0x7f}, {&(0x7f0000002b00)=""/37, 0x25}], 0x8, &(0x7f0000002bc0)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}}, {{0x0, 0x0, &(0x7f0000003000)=[{&(0x7f0000002c80)=""/249, 0xf9}, {&(0x7f0000002d80)=""/198, 0xc6}, {&(0x7f0000002e80)=""/177, 0xb1}, {&(0x7f0000002f40)=""/37, 0x25}, {&(0x7f0000002f80)=""/107, 0x6b}], 0x5}}], 0x4, 0x20, &(0x7f0000003180)={0x0, 0x989680}) syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') 21:40:33 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:40:33 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x2}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) 21:40:33 executing program 0: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x726029d4fb0c9567, r2) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) r5 = dup2(r4, r3) renameat2(r5, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x1) 21:40:33 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x40000000}, 0x0, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x0) r1 = dup3(r0, r0, 0x0) dup3(r0, r1, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) pidfd_getfd(0xffffffffffffffff, r2, 0x0) r3 = accept4$unix(r1, &(0x7f0000000240), &(0x7f00000002c0)=0x6e, 0x80800) write$binfmt_elf64(r3, &(0x7f00000005c0)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x2, 0x0, 0x0, 0x8000, 0x3, 0x6, 0x2, 0x1fd, 0x40, 0x2df, 0x9471, 0x5, 0x38, 0x1, 0x1, 0x4, 0x8}, [{0x2, 0x3, 0x1, 0x5, 0x2, 0x6, 0x6, 0xb81}], "4438ace1e2704836a2e807feb6e32f04383c94bf4e2123ba80d537e5b21f4c4a220799a0c75b6429ebcccdba288dc3cd17bf", ['\x00', '\x00', '\x00', '\x00']}, 0x4aa) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r4, 0x541b, 0x0) r5 = accept4(r1, &(0x7f00000001c0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, &(0x7f0000000040)=0x80, 0x800) ioctl$FITRIM(r5, 0xc0185879, &(0x7f0000000100)={0x2, 0x5, 0x1000}) r6 = geteuid() r7 = getgid() chown(&(0x7f0000000140)='./file1\x00', 0x0, r7) fchown(r4, r6, r7) getdents(r2, &(0x7f0000000540)=""/126, 0x7e) 21:40:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r1, 0xc020660b, &(0x7f0000000040)) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) pread64(r0, &(0x7f0000000140)=""/4096, 0x1000, 0x0) [ 2281.704281] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2281.712880] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 21:40:33 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0xc100, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe4}, 0x0, 0xe, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) 21:40:33 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0x541b, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) faccessat2(r1, &(0x7f0000000140)='./file0\x00', 0x4, 0x0) r4 = dup2(r3, 0xffffffffffffffff) renameat2(r4, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x1) VM DIAGNOSIS: 21:40:33 Registers: info registers vcpu 0 RAX=dffffc0000000060 RBX=00000000000003fd RCX=0000000000000000 RDX=00000000000003fd RSI=ffffffff822da1dc RDI=ffffffff879ef140 RBP=ffffffff879ef100 RSP=ffff888047897548 R8 =0000000000000001 R9 =0000000000000003 R10=000000000000000a R11=0000000000000001 R12=0000000000000020 R13=fffffbfff0f3de75 R14=fffffbfff0f3de2a R15=dffffc0000000000 RIP=ffffffff822da230 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f98edfbb700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000001b2cf21000 CR3=000000004545e000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=000000000000000000000000000000ff XMM01=25252525252525252525252525252525 XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000 XMM04=000000000000000000000000000000ff XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=0000000000000000 RBX=ffffffff85023940 RCX=ffffffff81279b47 RDX=fffffbfff0a04729 RSI=0000000000000004 RDI=ffffffff85023940 RBP=0000000000000001 RSP=ffff88803c6cf8f0 R8 =0000000000000000 R9 =ffffffff85023943 R10=fffffbfff0a04728 R11=0000000000000001 R12=0000000000000003 R13=fffffbfff0a04728 R14=0000000000000001 R15=1ffff110078d9f1f RIP=ffffffff81279bc2 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000555572eba400 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe4e00000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f03eaf853a4 CR3=000000003c78a000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=ffffffffffffffffffffffffffffffff XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000 XMM04=000000000000000000000000000000ff XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000