7eac35774b856ec1765c663034690e9ae2bbc24e383562c400604dcc3d66ea9a996534005adb2334ac62fca1f32730a6d001eea6594c48499da033699324a8b271ca81c40a39c64bea56ed36b1b05042fe8f6f91ded35406bc2ec70178dab8087450b6008da30705b92635911a5712ec63be7f978db41c10ba53cfe73a2c82016ea1a982e5bcd9bba30f6fe1a11e722e837ee51fadbdda8ddd18bd3c447e5d788358e79c6a6f1f82e7e316586ee63c0631fb7bc757bd66a11425", 0xbd4}], 0x0, &(0x7f0000001400)={[{@dots}, {@dots}]}) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) openat(0xffffffffffffffff, &(0x7f0000001840)='./file0\x00', 0x103243, 0x125) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) mount$9p_tcp(&(0x7f0000001880), &(0x7f00000018c0)='./file0/file0\x00', &(0x7f0000001900), 0x858000, &(0x7f0000001a00)={'trans=tcp,', {}, 0x2c, {[{@cache_loose}, {@access_uid}, {@access_any}]}}) read(r1, &(0x7f00000002c0)=""/225, 0xe1) r3 = openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f00000003c0)={0x0, 0x8001, 0x7}) ioctl$BTRFS_IOC_SCRUB(r3, 0xc400941b, &(0x7f00000007c0)={r4, 0x0, 0x1}) 23:09:41 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x3, 0xffffffffffffffff, 0x5) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9c000000", @ANYRES16=0x0, @ANYBLOB="010027bd7000fcdbdf25040000003423baa10c00038008000300000000004400d841ac257b65d0be0000080004009600000006000f00faff000005000d00010000000800080400010000260002004e2400000800030000000000080003000300000008000600070000000800060037000000240073697000060002008700000008000b00732469700e4565e4fdc80a2f07f900"/160], 0x9c}, 0x1, 0x0, 0x0, 0x48000}, 0x4004) read(r0, &(0x7f00000002c0)=""/225, 0xe1) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = dup2(r3, r2) lseek(r4, 0x7, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r5, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r6, r1) r7 = open_tree(r0, &(0x7f0000000040)='./file0\x00', 0x100) renameat(r6, &(0x7f0000000000)='./file0\x00', r7, &(0x7f00000000c0)='./file0\x00') io_uring_setup(0x1b33, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000480)=0x1) 23:09:41 executing program 7: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) dup2(r1, r1) r5 = syz_io_uring_complete(0x0) r6 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r5, 0xc018937c, &(0x7f0000000440)=ANY=[@ANYBLOB="050000000100000018000000", @ANYRES32=r6, @ANYBLOB="01000000000000002e2f66696c653000"]) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = syz_open_dev$hidraw(&(0x7f0000000000), 0x4, 0x2) r10 = openat$cgroup_freezer_state(r5, &(0x7f0000000040), 0x2, 0x0) r11 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x3) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000100)=[r8, r5, r2, r9, r10, r11, r3], 0x7) fcntl$dupfd(r7, 0x0, r5) ioctl$SNDRV_TIMER_IOCTL_TREAD(r5, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') [ 1833.605677] FAT-fs (loop6): invalid media value (0x0c) [ 1833.606620] FAT-fs (loop6): Can't find a valid FAT filesystem 23:09:41 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x5, 0x5, &(0x7f00000005c0)=[{&(0x7f00000000c0)="6e6115e3da3389701f0cb881da2549544ed2023b91e32519001c57b28ebfba3b16ce7d5ce8d60228dd2f0b56ff4b7f5b8179c6938374ed2bded8381d000d3fcf73a8409b34fd1e05a1fe64da46ab61079adc55f20d60d89af61d", 0x5a, 0x1f}, {&(0x7f0000000180)="fda3805d9f8ffc160e2804832648bc0caa7feff3750b785f0a786100f5c7877291b603bb8711f25905f8766fb18b29b72d490f6625d7a71c63e84dca1aa443127a31481aa7f16af990c81497a73d929d642c28379692d88ea267f22d5124315376f37a299505538eedb8af29ddd395878b5eb1b98e393b81585ee385c072bdced1bcd565cb642bf2640fe51d534c31bb35d2f84bb984166d7ce5c38a433f2fe62c02bdae09c62793eb8071d2d189cc94e2eb77c2b71f45e3108116e062379225a2d579cf20084d044e2d9842c97fb70820f023610e84e2fb9116b6e0423b7589249a3d300e6c0824b1088da3eb104a", 0xef, 0x401}, {&(0x7f00000004c0)="b0d402b6cfb37c02b7e0a69ae9ce0a9f95fd6bbfc69ff3ad3087705ecd659b8513f54980358a827fe9811fd469d211584f81fc5c346ca6507dcb831b88af025a4cbf8db37927f91f40711f44e467af3a26370ee0bf507a038d6d969e239bfaf30833da8b740f2fc82fd55cd8dca5d86bb3e361765ec025e7e3dcb984bfa72e04625a839b0ce7914a17b5d78026a637c416a1b79b30b35dc4bf79c06d3f03d4024216f3dd5bc0e94654f36d81954f5e0ea210126cdd38ffe127b3dc8a2454294657bc00f9a0beff5ef3bc4841bdcff608246017020afe7ebc3d43131b118710bd5469fa", 0xe3, 0x10001}, {&(0x7f0000000280)="99d58e98c2036462d32f38ca14f71356", 0x10, 0x1}, {&(0x7f00000003c0)="e8124d262e49f3790e6bdb2deebed51e5704a2b6b8949b06c09a0526bd2d54b8a7d6941c5096078a983bfd71f2845f74a501af5015025e6e4bb2420a2e585cc0cbcfdcac41857be988bd8613dca1f720954e557ceb2ca1", 0x57, 0x5}], 0x81, &(0x7f0000000640)={[{@nr_inodes={'nr_inodes', 0x3d, [0x36, 0x0, 0x6b, 0x38, 0x31, 0x6d, 0x30, 0x6d, 0x5d, 0x67]}}, {@huge_never}, {@huge_always}, {@huge_within_size}, {@mode}, {@size={'size', 0x3d, [0x32, 0x70, 0x74, 0x37, 0x32, 0x78]}}, {@huge_advise}], [{@smackfstransmute={'smackfstransmute', 0x3d, '#'}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}, {@measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}]}) 23:09:41 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) dup2(r1, r1) r5 = syz_io_uring_complete(0x0) r6 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175}) fallocate(r2, 0x55, 0x8000, 0x5) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r5, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r6, {0x1}}, './file0\x00'}) pipe(&(0x7f0000000280)={0xffffffffffffffff}) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x8, 0x74, 0x6, 0x20, 0x0, 0x7, 0x2000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52, 0x4, @perf_config_ext={0x7, 0x800}, 0x800a, 0x8, 0x8, 0x1, 0x8, 0x7, 0x101, 0x0, 0x2, 0x0, 0x8000}, 0xffffffffffffffff, 0x7, r8, 0x2) fcntl$dupfd(r7, 0x0, r5) fcntl$setlease(r0, 0x400, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r5, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:09:41 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) r2 = syz_open_procfs(r1, &(0x7f0000000080)='stack\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x200000, 0x0) dup2(r4, r3) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140), 0x2881, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000000c0)=0xc78, 0x1) ioctl$NS_GET_PARENT(r2, 0xb702, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r7 = dup2(r6, r5) lseek(r7, 0x7, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000180)) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x0, 0x0, 0x175, 0x0, r7}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) 23:09:54 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="98000000200039040000000000000000020000000dc0c23671f1a964651e4d52c3dc9432e6af519d60c901a7ea83dce8f6a9c36adbbf7c23348ed7953cc124f0f2e2f1324bf1187b4e1f5a7bf5116e03f38056144e4fd6711849a6579e46004fbfb9ae80572129d57aa41a4c792b56978ebd2e72f57ca14145d7bcd879afed4e97abd691d56cf2d815f272170c0011000000000000000000bb3e3c7562af739c74b82fd57e7bd51e163e9c2394948632056b9357f234b64631cba457c59e6d0eae9098c89e3c7aa8b1cbc03bd674263161cff69945516e14595dfad881c353d7fb9bbdc2fb19f3306b4f29f5ac8dddb92ee4fe33f6e190dffd186aa055b9a9547a834f1d6190acda5d78a8cff254a2de72f20938d689ca4044e9b0a3ee3627818c70cc78d1fe11e55c898d61e09dd9cc4bdefd952f33d4697d06ffd93de78dd16ff6fabb99fb6b42eb449d317ff0f62c982878d984496c08a7a672102affbb245b18bb390e66298d7220110693dd4d00d4a7b9a75298857b75fa243b23c8cf9643bb00000000006dabf39491a19826dd17133c71e29784f2335028a747a6113ad6efdfbffa7205050056d0ee75b2f729232cc5bd028e654e69b60ba5313c46aa44ffefefa1dd182aa574a6fa732d6708584982012bb16aaceda807d810ad63ccfa5203bc3b2fac19fa9b5cd3d3f3e3cd43ced0a0870700adae78cb262f235c0401058ea209faecd0a5262bbda1d50def7cbef31c9b3ac3140d4741d25a4f0277c0ede8517e65b43a81d4e70e4f7c8f3e4c6b059a695c"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x7, 0x4) add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) add_key$keyring(&(0x7f0000000740), &(0x7f0000000780)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) unshare(0x48020200) 23:09:54 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="98000000200039040000000000000000020000000dc0c23671f1a964651e4d52c3dc9432e6af519d60c901a7ea83dce8f6a9c36adbbf7c23348ed7953cc124f0f2e2f1324bf1187b4e1f5a7bf5116e03f38056144e4fd6711849a6579e46004fbfb9ae80572129d57aa41a4c792b56978ebd2e72f57ca14145d7bcd879afed4e97abd691d56cf2d815f272170c0011000000000000000000bb3e3c7562af739c74b82fd57e7bd51e163e9c2394948632056b9357f234b64631cba457c59e6d0eae9098c89e3c7aa8b1cbc03bd674263161cff69945516e14595dfad881c353d7fb9bbdc2fb19f3306b4f29f5ac8dddb92ee4fe33f6e190dffd186aa055b9a9547a834f1d6190acda5d78a8cff254a2de72f20938d689ca4044e9b0a3ee3627818c70cc78d1fe11e55c898d61e09dd9cc4bdefd952f33d4697d06ffd93de78dd16ff6fabb99fb6b42eb449d317ff0f62c982878d984496c08a7a672102affbb245b18bb390e66298d7220110693dd4d00d4a7b9a75298857b75fa243b23c8cf9643bb00000000006dabf39491a19826dd17133c71e29784f2335028a747a6113ad6efdfbffa7205050056d0ee75b2f729232cc5bd028e654e69b60ba5313c46aa44ffefefa1dd182aa574a6fa732d6708584982012bb16aaceda807d810ad63ccfa5203bc3b2fac19fa9b5cd3d3f3e3cd43ced0a0870700adae78cb262f235c0401058ea209faecd0a5262bbda1d50def7cbef31c9b3ac3140d4741d25a4f0277c0ede8517e65b43a81d4e70e4f7c8f3e4c6b059a695c"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) add_key$keyring(&(0x7f0000000740), &(0x7f0000000780)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) unshare(0x48020200) [ 1847.118250] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1847.123012] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.7'. 23:09:54 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) dup2(r1, r1) r5 = syz_io_uring_complete(0x0) r6 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e4, 0x1, 0x3, 0x175}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r5, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r6, {0x1}}, './file0\x00'}) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r5) ioctl$SNDRV_TIMER_IOCTL_TREAD(r5, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:09:54 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) unshare(0x48020200) 23:09:54 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00']}, 0x2c7) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:09:54 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) add_key$keyring(&(0x7f0000000740), &(0x7f0000000780)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) unshare(0x48020200) 23:09:54 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x5, 0x5, &(0x7f00000005c0)=[{&(0x7f00000000c0)="6e6115e3da3389701f0cb881da2549544ed2023b91e32519001c57b28ebfba3b16ce7d5ce8d60228dd2f0b56ff4b7f5b8179c6938374ed2bded8381d000d3fcf73a8409b34fd1e05a1fe64da46ab61079adc55f20d60d89af61d", 0x5a, 0x1f}, {&(0x7f0000000180)="fda3805d9f8ffc160e2804832648bc0caa7feff3750b785f0a786100f5c7877291b603bb8711f25905f8766fb18b29b72d490f6625d7a71c63e84dca1aa443127a31481aa7f16af990c81497a73d929d642c28379692d88ea267f22d5124315376f37a299505538eedb8af29ddd395878b5eb1b98e393b81585ee385c072bdced1bcd565cb642bf2640fe51d534c31bb35d2f84bb984166d7ce5c38a433f2fe62c02bdae09c62793eb8071d2d189cc94e2eb77c2b71f45e3108116e062379225a2d579cf20084d044e2d9842c97fb70820f023610e84e2fb9116b6e0423b7589249a3d300e6c0824b1088da3eb104a", 0xef, 0x401}, {&(0x7f00000004c0)="b0d402b6cfb37c02b7e0a69ae9ce0a9f95fd6bbfc69ff3ad3087705ecd659b8513f54980358a827fe9811fd469d211584f81fc5c346ca6507dcb831b88af025a4cbf8db37927f91f40711f44e467af3a26370ee0bf507a038d6d969e239bfaf30833da8b740f2fc82fd55cd8dca5d86bb3e361765ec025e7e3dcb984bfa72e04625a839b0ce7914a17b5d78026a637c416a1b79b30b35dc4bf79c06d3f03d4024216f3dd5bc0e94654f36d81954f5e0ea210126cdd38ffe127b3dc8a2454294657bc00f9a0beff5ef3bc4841bdcff608246017020afe7ebc3d43131b118710bd5469fa", 0xe3, 0x10001}, {&(0x7f0000000280)="99d58e98c2036462d32f38ca14f71356", 0x10, 0x1}, {&(0x7f00000003c0)="e8124d262e49f3790e6bdb2deebed51e5704a2b6b8949b06c09a0526bd2d54b8a7d6941c5096078a983bfd71f2845f74a501af5015025e6e4bb2420a2e585cc0cbcfdcac41857be988bd8613dca1f720954e557ceb2ca1", 0x57, 0x5}], 0x81, &(0x7f0000000640)={[{@nr_inodes={'nr_inodes', 0x3d, [0x36, 0x0, 0x6b, 0x38, 0x31, 0x6d, 0x30, 0x6d, 0x5d, 0x67]}}, {@huge_never}, {@huge_always}, {@huge_within_size}, {@mode}, {@size={'size', 0x3d, [0x32, 0x70, 0x74, 0x37, 0x32, 0x78]}}, {@huge_advise}], [{@smackfstransmute={'smackfstransmute', 0x3d, '#'}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}, {@measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}]}) 23:09:54 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x3, 0xffffffffffffffff, 0x5) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9c000000", @ANYRES16=0x0, @ANYBLOB="010027bd7000fcdbdf25040000003423baa10c00038008000300000000004400d841ac257b65d0be0000080004009600000006000f00faff000005000d00010000000800080400010000260002004e2400000800030000000000080003000300000008000600070000000800060037000000240073697000060002008700000008000b00732469700e4565e4fdc80a2f07f900"/160], 0x9c}, 0x1, 0x0, 0x0, 0x48000}, 0x4004) read(r0, &(0x7f00000002c0)=""/225, 0xe1) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = dup2(r3, r2) lseek(r4, 0x7, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r5, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r6, r1) r7 = open_tree(r0, &(0x7f0000000040)='./file0\x00', 0x100) renameat(r6, &(0x7f0000000000)='./file0\x00', r7, &(0x7f00000000c0)='./file0\x00') io_uring_setup(0x1b33, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000480)=0x1) [ 1847.127024] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1847.151948] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.1'. 23:09:54 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r0, &(0x7f00000002c0)=""/225, 0xe1) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) socketpair(0x25, 0x4, 0x80000001, &(0x7f0000000000)={0xffffffffffffffff}) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SURVEY(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="1c000000fd5834a34da6a7f4fca9701359d0e981ead1bb03e767cec802f88e538c11579d9c45e888a06af98286a33362c3074a4a6e757c6de6a484812d135a98025a4e38a4f31f9e1e7e2ee9eb91b12ec079e4e8658f1bccc72c9c9724e0f1437e20b595239f1d7393e7ef02426e8e805ee2e18788ccabc0830b712547c9b138583567aaf843fb9972371f7dc51b627930be3d0891ddca2acbd0beff26cb9cadda02b997d1976cb024c7773354", @ANYRES16=0x0, @ANYBLOB="081000579c99e2c264ae08d1143cd97f4b0c5200000000070000000000000800030078fa6595c76798ce1c9561a7a097e95b043e32df637cadbfc665d42cca2597e800e599db2533e32912b7c4ecc962cec2e5c437733c422d3ed18e57e07faf995ee91965545351708cc21e9a26677c2b1eac4fc8addde7ae9cd03ed46da81d60766500009c497a174274caf0fddca3e08280f3634d93ed1c9cfe11f8887997b592a81532ecd93786acbf07a5a0c8e73d13ff14b43340bf8cd9bf72d3ae27a0f276c9963591ef6d8b581c766a33c30fe2a42ee5b88371783e31add165f38b37865b8754a81da7a188e2bfac23fe94ed09cc5c56f17c31cb4bad153fd6ee4c00d14189095309cce924600e79b3bcb611ec0128b09c2c126a354f78b8454447f187425c4f801af377144d58415c275e245010ff719e9192d65993da2cd4ecadf9d9181e917b201c661c0b9d99afbaf7fe32f9e2e6ef8be2d113c0ece1c0c34040782378784c0000000000e4748d1f7374799570c2153d4ec09eff6cbdb874fd632e58a64ccaf2583f066587fef817468354a4790542712cdabfe15e487f5038303a05b89f55c64b110bc8e8ec03e8053ff893d8338ebd733d2c7c26b2e8a9a02fc4100162d37556491ce9a821e05ec11909d36b4d0df54fe075eea08f52e6cd80af919fc8c64435c14d8a7d9176ad03762cba498aa93520f69d04021b06b6cf48f32740e7178739d663a59f75b93aed352e9e8d21251eb32f22c4297c27d88c687af01f9809786b04275a3df261f6c235934d91c27322d0adff80e3c9ca64fe84369ef4c3f7badc980d1f16c7189e9996008a4f7002f17e114cf05ceafb0d0886a732fb28d3a6f232758ba3984776cc36e524eaff61a90e65b4b2618c1c92d90bd5aadcda983ab642e087a871da060eda263f2e40eb2d22018610f1a0bf1a0ab7221a745e0512458d1e4f24356f493b4c8de6c8ad15a84bf9", @ANYRES32=0x0, @ANYBLOB], 0x1c}}, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) lseek(r3, 0x800, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='blkio.bfq.io_serviced_recursive\x00', 0x0, 0x0) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r7 = dup2(r6, r5) lseek(r7, 0x7, 0x0) r8 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r8, r7, 0x0, 0x7ffffff9) fstat(r8, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r2, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000680)={{}, {0x1, 0x4}, [{}, {0x2, 0x6}], {0x4, 0x2}, [{}, {0x8, 0x3}, {0x8, 0x1, r4}, {0x8, 0x1, r9}], {0x10, 0x4}, {0x20, 0x4}}, 0x54, 0x3) fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)={{}, {}, [{0x2, 0x2, 0xffffffffffffffff}, {0x2, 0x5, 0xffffffffffffffff}], {0x4, 0x1}, [{0x8, 0x1, 0xffffffffffffffff}, {0x8, 0x1, r4}, {0x8, 0x3, 0xee01}, {0x8, 0x2, 0xee01}], {0x10, 0x5}}, 0x54, 0x0) 23:09:54 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', 0x5, 0x5, &(0x7f00000005c0)=[{&(0x7f00000000c0)="6e6115e3da3389701f0cb881da2549544ed2023b91e32519001c57b28ebfba3b16ce7d5ce8d60228dd2f0b56ff4b7f5b8179c6938374ed2bded8381d000d3fcf73a8409b34fd1e05a1fe64da46ab61079adc55f20d60d89af61d", 0x5a, 0x1f}, {&(0x7f0000000180)="fda3805d9f8ffc160e2804832648bc0caa7feff3750b785f0a786100f5c7877291b603bb8711f25905f8766fb18b29b72d490f6625d7a71c63e84dca1aa443127a31481aa7f16af990c81497a73d929d642c28379692d88ea267f22d5124315376f37a299505538eedb8af29ddd395878b5eb1b98e393b81585ee385c072bdced1bcd565cb642bf2640fe51d534c31bb35d2f84bb984166d7ce5c38a433f2fe62c02bdae09c62793eb8071d2d189cc94e2eb77c2b71f45e3108116e062379225a2d579cf20084d044e2d9842c97fb70820f023610e84e2fb9116b6e0423b7589249a3d300e6c0824b1088da3eb104a", 0xef, 0x401}, {&(0x7f00000004c0)="b0d402b6cfb37c02b7e0a69ae9ce0a9f95fd6bbfc69ff3ad3087705ecd659b8513f54980358a827fe9811fd469d211584f81fc5c346ca6507dcb831b88af025a4cbf8db37927f91f40711f44e467af3a26370ee0bf507a038d6d969e239bfaf30833da8b740f2fc82fd55cd8dca5d86bb3e361765ec025e7e3dcb984bfa72e04625a839b0ce7914a17b5d78026a637c416a1b79b30b35dc4bf79c06d3f03d4024216f3dd5bc0e94654f36d81954f5e0ea210126cdd38ffe127b3dc8a2454294657bc00f9a0beff5ef3bc4841bdcff608246017020afe7ebc3d43131b118710bd5469fa", 0xe3, 0x10001}, {&(0x7f0000000280)="99d58e98c2036462d32f38ca14f71356", 0x10, 0x1}, {&(0x7f00000003c0)="e8124d262e49f3790e6bdb2deebed51e5704a2b6b8949b06c09a0526bd2d54b8a7d6941c5096078a983bfd71f2845f74a501af5015025e6e4bb2420a2e585cc0cbcfdcac41857be988bd8613dca1f720954e557ceb2ca1", 0x57, 0x5}], 0x81, &(0x7f0000000640)={[{@nr_inodes={'nr_inodes', 0x3d, [0x36, 0x0, 0x6b, 0x38, 0x31, 0x6d, 0x30, 0x6d, 0x5d, 0x67]}}, {@huge_never}, {@huge_always}, {@huge_within_size}, {@mode}, {@size={'size', 0x3d, [0x32, 0x70, 0x74, 0x37, 0x32, 0x78]}}, {@huge_advise}], [{@smackfstransmute={'smackfstransmute', 0x3d, '#'}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}, {@measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}]}) 23:09:55 executing program 5: openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x0, 0x0, 0x0, 0x37, 0x0, 0x5e, 0xc2160, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x0, 0x800, 0x0, 0x0, 0x0, 0xa418b6d, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x8, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r1, &(0x7f00000002c0)=""/225, 0xe1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x7ffffff9) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000040)='/dev/sg#\x00') r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) dup2(r0, 0xffffffffffffffff) r5 = syz_io_uring_complete(0x0) r6 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r5, 0xc018937c, &(0x7f0000000440)=ANY=[@ANYBLOB="011800"/12, @ANYRES32=r6, @ANYBLOB="01000000000000002e2f66696c653000"]) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r5) ioctl$SNDRV_TIMER_IOCTL_TREAD(r5, 0x40045402, &(0x7f0000000480)=0x1) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r5, 0x80047210, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:09:55 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="98000000200039040000000000000000020000000dc0c23671f1a964651e4d52c3dc9432e6af519d60c901a7ea83dce8f6a9c36adbbf7c23348ed7953cc124f0f2e2f1324bf1187b4e1f5a7bf5116e03f38056144e4fd6711849a6579e46004fbfb9ae80572129d57aa41a4c792b56978ebd2e72f57ca14145d7bcd879afed4e97abd691d56cf2d815f272170c0011000000000000000000bb3e3c7562af739c74b82fd57e7bd51e163e9c2394948632056b9357f234b64631cba457c59e6d0eae9098c89e3c7aa8b1cbc03bd674263161cff69945516e14595dfad881c353d7fb9bbdc2fb19f3306b4f29f5ac8dddb92ee4fe33f6e190dffd186aa055b9a9547a834f1d6190acda5d78a8cff254a2de72f20938d689ca4044e9b0a3ee3627818c70cc78d1fe11e55c898d61e09dd9cc4bdefd952f33d4697d06ffd93de78dd16ff6fabb99fb6b42eb449d317ff0f62c982878d984496c08a7a672102affbb245b18bb390e66298d7220110693dd4d00d4a7b9a75298857b75fa243b23c8cf9643bb00000000006dabf39491a19826dd17133c71e29784f2335028a747a6113ad6efdfbffa7205050056d0ee75b2f729232cc5bd028e654e69b60ba5313c46aa44ffefefa1dd182aa574a6fa732d6708584982012bb16aaceda807d810ad63ccfa5203bc3b2fac19fa9b5cd3d3f3e3cd43ced0a0870700adae78cb262f235c0401058ea209faecd0a5262bbda1d50def7cbef31c9b3ac3140d4741d25a4f0277c0ede8517e65b43a81d4e70e4f7c8f3e4c6b059a695c"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x7, 0x4) add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) add_key$keyring(&(0x7f0000000740), &(0x7f0000000780)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) unshare(0x48020200) 23:09:55 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', 0x5, 0x5, &(0x7f00000005c0)=[{&(0x7f00000000c0)="6e6115e3da3389701f0cb881da2549544ed2023b91e32519001c57b28ebfba3b16ce7d5ce8d60228dd2f0b56ff4b7f5b8179c6938374ed2bded8381d000d3fcf73a8409b34fd1e05a1fe64da46ab61079adc55f20d60d89af61d", 0x5a, 0x1f}, {&(0x7f0000000180)="fda3805d9f8ffc160e2804832648bc0caa7feff3750b785f0a786100f5c7877291b603bb8711f25905f8766fb18b29b72d490f6625d7a71c63e84dca1aa443127a31481aa7f16af990c81497a73d929d642c28379692d88ea267f22d5124315376f37a299505538eedb8af29ddd395878b5eb1b98e393b81585ee385c072bdced1bcd565cb642bf2640fe51d534c31bb35d2f84bb984166d7ce5c38a433f2fe62c02bdae09c62793eb8071d2d189cc94e2eb77c2b71f45e3108116e062379225a2d579cf20084d044e2d9842c97fb70820f023610e84e2fb9116b6e0423b7589249a3d300e6c0824b1088da3eb104a", 0xef, 0x401}, {&(0x7f00000004c0)="b0d402b6cfb37c02b7e0a69ae9ce0a9f95fd6bbfc69ff3ad3087705ecd659b8513f54980358a827fe9811fd469d211584f81fc5c346ca6507dcb831b88af025a4cbf8db37927f91f40711f44e467af3a26370ee0bf507a038d6d969e239bfaf30833da8b740f2fc82fd55cd8dca5d86bb3e361765ec025e7e3dcb984bfa72e04625a839b0ce7914a17b5d78026a637c416a1b79b30b35dc4bf79c06d3f03d4024216f3dd5bc0e94654f36d81954f5e0ea210126cdd38ffe127b3dc8a2454294657bc00f9a0beff5ef3bc4841bdcff608246017020afe7ebc3d43131b118710bd5469fa", 0xe3, 0x10001}, {&(0x7f0000000280)="99d58e98c2036462d32f38ca14f71356", 0x10, 0x1}, {&(0x7f00000003c0)="e8124d262e49f3790e6bdb2deebed51e5704a2b6b8949b06c09a0526bd2d54b8a7d6941c5096078a983bfd71f2845f74a501af5015025e6e4bb2420a2e585cc0cbcfdcac41857be988bd8613dca1f720954e557ceb2ca1", 0x57, 0x5}], 0x81, &(0x7f0000000640)={[{@nr_inodes={'nr_inodes', 0x3d, [0x36, 0x0, 0x6b, 0x38, 0x31, 0x6d, 0x30, 0x6d, 0x5d, 0x67]}}, {@huge_never}, {@huge_always}, {@huge_within_size}, {@mode}, {@size={'size', 0x3d, [0x32, 0x70, 0x74, 0x37, 0x32, 0x78]}}, {@huge_advise}], [{@smackfstransmute={'smackfstransmute', 0x3d, '#'}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}, {@measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}]}) [ 1847.443319] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. 23:10:09 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) dup2(r1, r1) r5 = syz_io_uring_complete(0x0) r6 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r5, 0xc018937c, &(0x7f0000000440)=ANY=[@ANYBLOB="010008000000000018000000", @ANYRES32=r6, @ANYBLOB="01000000000000002e2f66696c653000"]) pipe(&(0x7f0000000280)={0xffffffffffffffff}) r8 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x686100, 0x0) ioctl$SG_GET_REQUEST_TABLE(r8, 0x2286, &(0x7f0000000540)) fcntl$dupfd(r7, 0x0, r5) ioctl$SNDRV_TIMER_IOCTL_TREAD(r5, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:10:09 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) unshare(0x48020200) [ 1862.232969] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1862.244084] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.6'. 23:10:09 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x7, 0x4) add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) add_key$keyring(&(0x7f0000000740), &(0x7f0000000780)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) unshare(0x48020200) 23:10:09 executing program 2: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0x4c) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) dup2(r1, r1) r5 = syz_io_uring_complete(0x0) r6 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r5, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r6, {0x1}}, './file0\x00'}) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r5) ioctl$SNDRV_TIMER_IOCTL_TREAD(r5, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:10:09 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r1, &(0x7f00000002c0)=""/225, 0xe1) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x0, 0x0, 0x175}) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) close_range(r0, r1, 0x0) 23:10:09 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', 0x5, 0x5, &(0x7f00000005c0)=[{&(0x7f00000000c0)="6e6115e3da3389701f0cb881da2549544ed2023b91e32519001c57b28ebfba3b16ce7d5ce8d60228dd2f0b56ff4b7f5b8179c6938374ed2bded8381d000d3fcf73a8409b34fd1e05a1fe64da46ab61079adc55f20d60d89af61d", 0x5a, 0x1f}, {&(0x7f0000000180)="fda3805d9f8ffc160e2804832648bc0caa7feff3750b785f0a786100f5c7877291b603bb8711f25905f8766fb18b29b72d490f6625d7a71c63e84dca1aa443127a31481aa7f16af990c81497a73d929d642c28379692d88ea267f22d5124315376f37a299505538eedb8af29ddd395878b5eb1b98e393b81585ee385c072bdced1bcd565cb642bf2640fe51d534c31bb35d2f84bb984166d7ce5c38a433f2fe62c02bdae09c62793eb8071d2d189cc94e2eb77c2b71f45e3108116e062379225a2d579cf20084d044e2d9842c97fb70820f023610e84e2fb9116b6e0423b7589249a3d300e6c0824b1088da3eb104a", 0xef, 0x401}, {&(0x7f00000004c0)="b0d402b6cfb37c02b7e0a69ae9ce0a9f95fd6bbfc69ff3ad3087705ecd659b8513f54980358a827fe9811fd469d211584f81fc5c346ca6507dcb831b88af025a4cbf8db37927f91f40711f44e467af3a26370ee0bf507a038d6d969e239bfaf30833da8b740f2fc82fd55cd8dca5d86bb3e361765ec025e7e3dcb984bfa72e04625a839b0ce7914a17b5d78026a637c416a1b79b30b35dc4bf79c06d3f03d4024216f3dd5bc0e94654f36d81954f5e0ea210126cdd38ffe127b3dc8a2454294657bc00f9a0beff5ef3bc4841bdcff608246017020afe7ebc3d43131b118710bd5469fa", 0xe3, 0x10001}, {&(0x7f0000000280)="99d58e98c2036462d32f38ca14f71356", 0x10, 0x1}, {&(0x7f00000003c0)="e8124d262e49f3790e6bdb2deebed51e5704a2b6b8949b06c09a0526bd2d54b8a7d6941c5096078a983bfd71f2845f74a501af5015025e6e4bb2420a2e585cc0cbcfdcac41857be988bd8613dca1f720954e557ceb2ca1", 0x57, 0x5}], 0x81, &(0x7f0000000640)={[{@nr_inodes={'nr_inodes', 0x3d, [0x36, 0x0, 0x6b, 0x38, 0x31, 0x6d, 0x30, 0x6d, 0x5d, 0x67]}}, {@huge_never}, {@huge_always}, {@huge_within_size}, {@mode}, {@size={'size', 0x3d, [0x32, 0x70, 0x74, 0x37, 0x32, 0x78]}}, {@huge_advise}], [{@smackfstransmute={'smackfstransmute', 0x3d, '#'}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}, {@measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}]}) 23:10:09 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x3, 0xffffffffffffffff, 0x5) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9c000000", @ANYRES16=0x0, @ANYBLOB="010027bd7000fcdbdf25040000003423baa10c00038008000300000000004400d841ac257b65d0be0000080004009600000006000f00faff000005000d00010000000800080400010000260002004e2400000800030000000000080003000300000008000600070000000800060037000000240073697000060002008700000008000b00732469700e4565e4fdc80a2f07f900"/160], 0x9c}, 0x1, 0x0, 0x0, 0x48000}, 0x4004) read(r0, &(0x7f00000002c0)=""/225, 0xe1) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = dup2(r3, r2) lseek(r4, 0x7, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r5, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r6, r1) r7 = open_tree(r0, &(0x7f0000000040)='./file0\x00', 0x100) renameat(r6, &(0x7f0000000000)='./file0\x00', r7, &(0x7f00000000c0)='./file0\x00') io_uring_setup(0x1b33, 0x0) 23:10:09 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="98000000200039040000000000000000020000000dc0c23671f1a964651e4d52c3dc9432e6af519d60c901a7ea83dce8f6a9c36adbbf7c23348ed7953cc124f0f2e2f1324bf1187b4e1f5a7bf5116e03f38056144e4fd6711849a6579e46004fbfb9ae80572129d57aa41a4c792b56978ebd2e72f57ca14145d7bcd879afed4e97abd691d56cf2d815f272170c0011000000000000000000bb3e3c7562af739c74b82fd57e7bd51e163e9c2394948632056b9357f234b64631cba457c59e6d0eae9098c89e3c7aa8b1cbc03bd674263161cff69945516e14595dfad881c353d7fb9bbdc2fb19f3306b4f29f5ac8dddb92ee4fe33f6e190dffd186aa055b9a9547a834f1d6190acda5d78a8cff254a2de72f20938d689ca4044e9b0a3ee3627818c70cc78d1fe11e55c898d61e09dd9cc4bdefd952f33d4697d06ffd93de78dd16ff6fabb99fb6b42eb449d317ff0f62c982878d984496c08a7a672102affbb245b18bb390e66298d7220110693dd4d00d4a7b9a75298857b75fa243b23c8cf9643bb00000000006dabf39491a19826dd17133c71e29784f2335028a747a6113ad6efdfbffa7205050056d0ee75b2f729232cc5bd028e654e69b60ba5313c46aa44ffefefa1dd182aa574a6fa732d6708584982012bb16aaceda807d810ad63ccfa5203bc3b2fac19fa9b5cd3d3f3e3cd43ced0a0870700adae78cb262f235c0401058ea209faecd0a5262bbda1d50def7cbef31c9b3ac3140d4741d25a4f0277c0ede8517e65b43a81d4e70e4f7c8f3e4c6b059a695c"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) add_key(0x0, 0x0, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) add_key$keyring(&(0x7f0000000740), &(0x7f0000000780)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) unshare(0x48020200) [ 1862.273664] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.0'. 23:10:10 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r0, &(0x7f00000002c0)=""/225, 0xe1) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x0, 0x0, 0x175}) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) r2 = signalfd(r1, &(0x7f0000000040), 0x8) io_uring_register$IORING_UNREGISTER_FILES(r2, 0x3, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r6, r5) r7 = getpgrp(0x0) r8 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r8, 0xffffffffffffffff) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x60, 0x0, 0x100, 0x70bd27, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x38, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xfffffffa}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7fff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x45}]}, @TIPC_NLA_MON={0x14, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1934}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x8000}, 0x20004000) fcntl$lock(r6, 0x6, &(0x7f0000000080)={0x2, 0x0, 0x5a1, 0x6, r7}) ioctl$BTRFS_IOC_INO_PATHS(r1, 0xc0389423, &(0x7f0000000180)={0x0, 0x18, [0x7ff, 0x8000, 0x7, 0x55], &(0x7f00000000c0)=[0x0, 0x0, 0x0]}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r3, 0x6612) 23:10:10 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000), 0x0, 0x5, 0x5, &(0x7f00000005c0)=[{&(0x7f00000000c0)="6e6115e3da3389701f0cb881da2549544ed2023b91e32519001c57b28ebfba3b16ce7d5ce8d60228dd2f0b56ff4b7f5b8179c6938374ed2bded8381d000d3fcf73a8409b34fd1e05a1fe64da46ab61079adc55f20d60d89af61d", 0x5a, 0x1f}, {&(0x7f0000000180)="fda3805d9f8ffc160e2804832648bc0caa7feff3750b785f0a786100f5c7877291b603bb8711f25905f8766fb18b29b72d490f6625d7a71c63e84dca1aa443127a31481aa7f16af990c81497a73d929d642c28379692d88ea267f22d5124315376f37a299505538eedb8af29ddd395878b5eb1b98e393b81585ee385c072bdced1bcd565cb642bf2640fe51d534c31bb35d2f84bb984166d7ce5c38a433f2fe62c02bdae09c62793eb8071d2d189cc94e2eb77c2b71f45e3108116e062379225a2d579cf20084d044e2d9842c97fb70820f023610e84e2fb9116b6e0423b7589249a3d300e6c0824b1088da3eb104a", 0xef, 0x401}, {&(0x7f00000004c0)="b0d402b6cfb37c02b7e0a69ae9ce0a9f95fd6bbfc69ff3ad3087705ecd659b8513f54980358a827fe9811fd469d211584f81fc5c346ca6507dcb831b88af025a4cbf8db37927f91f40711f44e467af3a26370ee0bf507a038d6d969e239bfaf30833da8b740f2fc82fd55cd8dca5d86bb3e361765ec025e7e3dcb984bfa72e04625a839b0ce7914a17b5d78026a637c416a1b79b30b35dc4bf79c06d3f03d4024216f3dd5bc0e94654f36d81954f5e0ea210126cdd38ffe127b3dc8a2454294657bc00f9a0beff5ef3bc4841bdcff608246017020afe7ebc3d43131b118710bd5469fa", 0xe3, 0x10001}, {&(0x7f0000000280)="99d58e98c2036462d32f38ca14f71356", 0x10, 0x1}, {&(0x7f00000003c0)="e8124d262e49f3790e6bdb2deebed51e5704a2b6b8949b06c09a0526bd2d54b8a7d6941c5096078a983bfd71f2845f74a501af5015025e6e4bb2420a2e585cc0cbcfdcac41857be988bd8613dca1f720954e557ceb2ca1", 0x57, 0x5}], 0x81, &(0x7f0000000640)={[{@nr_inodes={'nr_inodes', 0x3d, [0x36, 0x0, 0x6b, 0x38, 0x31, 0x6d, 0x30, 0x6d, 0x5d, 0x67]}}, {@huge_never}, {@huge_always}, {@huge_within_size}, {@mode}, {@size={'size', 0x3d, [0x32, 0x70, 0x74, 0x37, 0x32, 0x78]}}, {@huge_advise}], [{@smackfstransmute={'smackfstransmute', 0x3d, '#'}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}, {@measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}]}) 23:10:10 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) unshare(0x48020200) 23:10:10 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) unshare(0x48020200) 23:10:10 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) lseek(0xffffffffffffffff, 0x7, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0x7ffffff9) openat(r5, &(0x7f0000000000)='./file0\x00', 0x200402, 0x10) ioctl$SG_IO(r4, 0x1274, 0x0) dup2(r1, r1) r6 = syz_io_uring_complete(0x0) r7 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r7, {0x1}}, './file0\x00'}) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r8, 0x0, r6) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') [ 1862.420326] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.1'. 23:10:10 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000), 0x0, 0x5, 0x5, &(0x7f00000005c0)=[{&(0x7f00000000c0)="6e6115e3da3389701f0cb881da2549544ed2023b91e32519001c57b28ebfba3b16ce7d5ce8d60228dd2f0b56ff4b7f5b8179c6938374ed2bded8381d000d3fcf73a8409b34fd1e05a1fe64da46ab61079adc55f20d60d89af61d", 0x5a, 0x1f}, {&(0x7f0000000180)="fda3805d9f8ffc160e2804832648bc0caa7feff3750b785f0a786100f5c7877291b603bb8711f25905f8766fb18b29b72d490f6625d7a71c63e84dca1aa443127a31481aa7f16af990c81497a73d929d642c28379692d88ea267f22d5124315376f37a299505538eedb8af29ddd395878b5eb1b98e393b81585ee385c072bdced1bcd565cb642bf2640fe51d534c31bb35d2f84bb984166d7ce5c38a433f2fe62c02bdae09c62793eb8071d2d189cc94e2eb77c2b71f45e3108116e062379225a2d579cf20084d044e2d9842c97fb70820f023610e84e2fb9116b6e0423b7589249a3d300e6c0824b1088da3eb104a", 0xef, 0x401}, {&(0x7f00000004c0)="b0d402b6cfb37c02b7e0a69ae9ce0a9f95fd6bbfc69ff3ad3087705ecd659b8513f54980358a827fe9811fd469d211584f81fc5c346ca6507dcb831b88af025a4cbf8db37927f91f40711f44e467af3a26370ee0bf507a038d6d969e239bfaf30833da8b740f2fc82fd55cd8dca5d86bb3e361765ec025e7e3dcb984bfa72e04625a839b0ce7914a17b5d78026a637c416a1b79b30b35dc4bf79c06d3f03d4024216f3dd5bc0e94654f36d81954f5e0ea210126cdd38ffe127b3dc8a2454294657bc00f9a0beff5ef3bc4841bdcff608246017020afe7ebc3d43131b118710bd5469fa", 0xe3, 0x10001}, {&(0x7f0000000280)="99d58e98c2036462d32f38ca14f71356", 0x10, 0x1}, {&(0x7f00000003c0)="e8124d262e49f3790e6bdb2deebed51e5704a2b6b8949b06c09a0526bd2d54b8a7d6941c5096078a983bfd71f2845f74a501af5015025e6e4bb2420a2e585cc0cbcfdcac41857be988bd8613dca1f720954e557ceb2ca1", 0x57, 0x5}], 0x81, &(0x7f0000000640)={[{@nr_inodes={'nr_inodes', 0x3d, [0x36, 0x0, 0x6b, 0x38, 0x31, 0x6d, 0x30, 0x6d, 0x5d, 0x67]}}, {@huge_never}, {@huge_always}, {@huge_within_size}, {@mode}, {@size={'size', 0x3d, [0x32, 0x70, 0x74, 0x37, 0x32, 0x78]}}, {@huge_advise}], [{@smackfstransmute={'smackfstransmute', 0x3d, '#'}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}, {@measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}]}) 23:10:10 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) add_key(0x0, 0x0, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) add_key$keyring(&(0x7f0000000740), &(0x7f0000000780)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) unshare(0x48020200) [ 1862.479641] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1862.489797] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.7'. 23:10:10 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x7, 0x4) add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) add_key$keyring(&(0x7f0000000740), &(0x7f0000000780)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) unshare(0x48020200) [ 1862.583313] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.0'. 23:10:23 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) add_key(0x0, 0x0, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) add_key$keyring(&(0x7f0000000740), &(0x7f0000000780)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) unshare(0x48020200) 23:10:23 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000), 0x0, 0x5, 0x5, &(0x7f00000005c0)=[{&(0x7f00000000c0)="6e6115e3da3389701f0cb881da2549544ed2023b91e32519001c57b28ebfba3b16ce7d5ce8d60228dd2f0b56ff4b7f5b8179c6938374ed2bded8381d000d3fcf73a8409b34fd1e05a1fe64da46ab61079adc55f20d60d89af61d", 0x5a, 0x1f}, {&(0x7f0000000180)="fda3805d9f8ffc160e2804832648bc0caa7feff3750b785f0a786100f5c7877291b603bb8711f25905f8766fb18b29b72d490f6625d7a71c63e84dca1aa443127a31481aa7f16af990c81497a73d929d642c28379692d88ea267f22d5124315376f37a299505538eedb8af29ddd395878b5eb1b98e393b81585ee385c072bdced1bcd565cb642bf2640fe51d534c31bb35d2f84bb984166d7ce5c38a433f2fe62c02bdae09c62793eb8071d2d189cc94e2eb77c2b71f45e3108116e062379225a2d579cf20084d044e2d9842c97fb70820f023610e84e2fb9116b6e0423b7589249a3d300e6c0824b1088da3eb104a", 0xef, 0x401}, {&(0x7f00000004c0)="b0d402b6cfb37c02b7e0a69ae9ce0a9f95fd6bbfc69ff3ad3087705ecd659b8513f54980358a827fe9811fd469d211584f81fc5c346ca6507dcb831b88af025a4cbf8db37927f91f40711f44e467af3a26370ee0bf507a038d6d969e239bfaf30833da8b740f2fc82fd55cd8dca5d86bb3e361765ec025e7e3dcb984bfa72e04625a839b0ce7914a17b5d78026a637c416a1b79b30b35dc4bf79c06d3f03d4024216f3dd5bc0e94654f36d81954f5e0ea210126cdd38ffe127b3dc8a2454294657bc00f9a0beff5ef3bc4841bdcff608246017020afe7ebc3d43131b118710bd5469fa", 0xe3, 0x10001}, {&(0x7f0000000280)="99d58e98c2036462d32f38ca14f71356", 0x10, 0x1}, {&(0x7f00000003c0)="e8124d262e49f3790e6bdb2deebed51e5704a2b6b8949b06c09a0526bd2d54b8a7d6941c5096078a983bfd71f2845f74a501af5015025e6e4bb2420a2e585cc0cbcfdcac41857be988bd8613dca1f720954e557ceb2ca1", 0x57, 0x5}], 0x81, &(0x7f0000000640)={[{@nr_inodes={'nr_inodes', 0x3d, [0x36, 0x0, 0x6b, 0x38, 0x31, 0x6d, 0x30, 0x6d, 0x5d, 0x67]}}, {@huge_never}, {@huge_always}, {@huge_within_size}, {@mode}, {@size={'size', 0x3d, [0x32, 0x70, 0x74, 0x37, 0x32, 0x78]}}, {@huge_advise}], [{@smackfstransmute={'smackfstransmute', 0x3d, '#'}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}, {@measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}]}) 23:10:23 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) unshare(0x48020200) 23:10:23 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$BTRFS_IOC_GET_DEV_STATS(0xffffffffffffffff, 0xc4089434, &(0x7f0000000dc0)={0x0, 0x1, 0x1, [0x0, 0x4000000, 0x80000000, 0x7, 0x4], [0x7, 0x0, 0x1, 0x200, 0x1bfe000000, 0x8, 0xfffffffffffffff9, 0x1, 0xebd9, 0x1f, 0x4, 0x7, 0x7, 0x20, 0x7ff, 0x4, 0x2, 0xeaa2, 0xffffffffffffffe1, 0x101, 0x1, 0xd122, 0x0, 0x9e, 0x7, 0x4, 0xfffffff000000000, 0x7c, 0x7, 0x100000000, 0x101, 0x4, 0x4, 0x6, 0x7fd, 0x3, 0x1, 0xe8, 0xdc, 0x0, 0x369, 0xf87a, 0x4, 0x4, 0x81, 0x1, 0x3ff, 0x6, 0x0, 0x6b4000000000000, 0x9, 0x45d55540, 0x2, 0x9, 0x1ff, 0x400, 0x7, 0x200, 0x1, 0x6, 0x2, 0x2, 0x7, 0x2f8, 0x100000001, 0x20, 0xf2, 0x0, 0x1000, 0x8, 0xad2, 0x20, 0xff, 0x8bb7, 0x5, 0xa5, 0x10000, 0x5, 0x3ff, 0xffff, 0xb1, 0x15c, 0x5, 0x6, 0x7fffffff, 0x4, 0xfff, 0x9, 0x4, 0x800, 0x4, 0x8, 0x4, 0x1f, 0x0, 0x9, 0x8001, 0x3, 0x7f, 0x6, 0x3, 0xe9b, 0x8, 0x7, 0x7f, 0x1, 0xecbe, 0x0, 0xa0e, 0x9, 0xfffffffffffffff7, 0x5, 0x0, 0x6, 0x7, 0x4, 0x100000000, 0x9, 0x9, 0x5, 0x8]}) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)=[{{&(0x7f00000000c0), 0x6e, &(0x7f00000001c0)=[{&(0x7f0000000040)=""/41, 0x29}], 0x1, &(0x7f0000000200)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}], 0x20}}, {{&(0x7f00000003c0)=@abs, 0x6e, &(0x7f0000000700)=[{&(0x7f0000000240)=""/55, 0x37}, {&(0x7f0000000540)=""/57, 0x39}, {&(0x7f0000000580)=""/74, 0x4a}, {&(0x7f0000000600)=""/123, 0x7b}, {&(0x7f0000000680)=""/84, 0x54}], 0x5}}, {{&(0x7f0000000780), 0x6e, &(0x7f0000000900)=[{&(0x7f0000000800)=""/246, 0xf6}], 0x1, &(0x7f0000000940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000018000000000000f80000000001000000", @ANYRES32, @ANYRES32], 0x38}}, {{&(0x7f0000000980), 0x6e, &(0x7f0000000bc0)=[{&(0x7f0000000a00)=""/162, 0xa2}, {&(0x7f0000000ac0)=""/223, 0xdf}], 0x2, &(0x7f0000001200)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="30b6532a7ddf7e9cb5bf131f8d8f14a878985b7258e7"], 0x18}}], 0x4, 0x140, 0x0) quotactl(0x9, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000d40)="00bb980e2835e99bc85092b3977ab511ac891f6ec5821b742fb7e9d8fcd5f97137276f8318790d643fdb12c169c1c43bf3647efc88ca89de00d818d4a959ad50d18f67b8fe4cbb23a0590b18031668bf8dad34d583bb7eb7085dddcbebf41f713114232e5bf5f8fe552ded0339f3bb04b094") r1 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r1, 0x80047210, &(0x7f0000000180)) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r3, &(0x7f00000002c0)=""/225, 0xe1) r4 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$SG_IO(r5, 0x1274, 0x0) dup2(r2, r2) r6 = syz_io_uring_complete(0x0) r7 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000001240)=ANY=[@ANYBLOB="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", @ANYRES32=r7, @ANYBLOB="01000000000000002e2f66696c653000"]) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r8, 0x0, r6) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') [ 1875.819602] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1875.833702] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1875.922032] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1875.951915] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1875.967331] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 23:10:23 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) r7 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r7, {0x1}}, './file0\x00'}) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x0, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x0, r6) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:10:23 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x3, 0xffffffffffffffff, 0x5) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9c000000", @ANYRES16=0x0, @ANYBLOB="010027bd7000fcdbdf25040000003423baa10c00038008000300000000004400d841ac257b65d0be0000080004009600000006000f00faff000005000d00010000000800080400010000260002004e2400000800030000000000080003000300000008000600070000000800060037000000240073697000060002008700000008000b00732469700e4565e4fdc80a2f07f900"/160], 0x9c}, 0x1, 0x0, 0x0, 0x48000}, 0x4004) read(r0, &(0x7f00000002c0)=""/225, 0xe1) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = dup2(r3, r2) lseek(r4, 0x7, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r5, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r6, r1) r7 = open_tree(r0, &(0x7f0000000040)='./file0\x00', 0x100) renameat(r6, &(0x7f0000000000)='./file0\x00', r7, &(0x7f00000000c0)='./file0\x00') 23:10:23 executing program 7: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "", ['\x00', '\x00', '\x00']}, 0x378) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:10:23 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) unshare(0x48020200) 23:10:23 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000180)="c53ee61d4f1543f73e92f9e2dcb28d226ab92631aaf73672b3e3ff98f2d8afd4b5b57f90c18e03f8d778832593913ee6ac3369e9daa866bd058778f532a7d68e65bcb494b086c158940883663019abe1692270ce70554d9bd26753a5798c1c1c53049ae6afafa2a092c6212589f868b68d2d924d2025efe419b636a71a49ae7923bbfb8e5f8cde62b7da25b99da93c7a7fbb85d51fdc691ce5252eaeb62643e7f6c3151d2baaf286973e6bcb0c140be82703cdcfa438cac179d2dbb2df5ea5013c1e3f83ed28c967ffebfcea9a408440a6c6643395220753ff78a1d8ae04b925f3602b3c8ed7fcca8cbaf30dcd7a09898f1192173a", 0xf5, 0x9}], 0x2, &(0x7f00000003c0)={[], [{@obj_role={'obj_role', 0x3d, '\x00'}}, {@hash}, {@pcr={'pcr', 0x3d, 0x38}}, {@measure}, {@obj_type={'obj_type', 0x3d, ':&&+$-@S'}}]}) ioctl$AUTOFS_IOC_FAIL(r0, 0x9361, 0x80000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r1, &(0x7f00000002c0)=""/225, 0xe1) io_uring_setup(0x1b33, &(0x7f0000000440)={0x0, 0xf0ac, 0x0, 0x0, 0x175}) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) 23:10:23 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x7, 0x4) add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) add_key$keyring(&(0x7f0000000740), &(0x7f0000000780)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) unshare(0x48020200) 23:10:23 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = pidfd_open(0xffffffffffffffff, 0x0) sendfile(r5, r0, 0x0, 0x3) dup2(r1, r1) r6 = syz_io_uring_complete(0x0) r7 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000000)=ANY=[@ANYBLOB="41000000e3ba4da118000000", @ANYRES32=r7, @ANYBLOB="1139b621e99100ee3ca6576ea04d6a3a402d2539b1dd9ad52a06fb8a4d334ce8a66dc6e647339ba3a8f84b8af26e26ac767c228f92491c81a639b6de832bd8dbf7a6612e1338e29a51fa"]) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r8, 0x0, r6) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:10:23 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x3, 0xffffffffffffffff, 0x5) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9c000000", @ANYRES16=0x0, @ANYBLOB="010027bd7000fcdbdf25040000003423baa10c00038008000300000000004400d841ac257b65d0be0000080004009600000006000f00faff000005000d00010000000800080400010000260002004e2400000800030000000000080003000300000008000600070000000800060037000000240073697000060002008700000008000b00732469700e4565e4fdc80a2f07f900"/160], 0x9c}, 0x1, 0x0, 0x0, 0x48000}, 0x4004) read(r0, &(0x7f00000002c0)=""/225, 0xe1) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = dup2(r3, r2) lseek(r4, 0x7, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r5, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r6, r1) open_tree(r0, &(0x7f0000000040)='./file0\x00', 0x100) 23:10:23 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f00000005c0)=[{&(0x7f00000000c0)="6e6115e3da3389701f0cb881da2549544ed2023b91e32519001c57b28ebfba3b16ce7d5ce8d60228dd2f0b56ff4b7f5b8179c6938374ed2bded8381d000d3fcf73a8409b34fd1e05a1fe64da46ab61079adc55f20d60d89af61d", 0x5a, 0x1f}, {&(0x7f0000000180)="fda3805d9f8ffc160e2804832648bc0caa7feff3750b785f0a786100f5c7877291b603bb8711f25905f8766fb18b29b72d490f6625d7a71c63e84dca1aa443127a31481aa7f16af990c81497a73d929d642c28379692d88ea267f22d5124315376f37a299505538eedb8af29ddd395878b5eb1b98e393b81585ee385c072bdced1bcd565cb642bf2640fe51d534c31bb35d2f84bb984166d7ce5c38a433f2fe62c02bdae09c62793eb8071d2d189cc94e2eb77c2b71f45e3108116e062379225a2d579cf20084d044e2d9842c97fb70820f023610e84e2fb9116b6e0423b7589249a3d300e6c0824b1088da3eb104a", 0xef, 0x401}, {&(0x7f00000004c0)="b0d402b6cfb37c02b7e0a69ae9ce0a9f95fd6bbfc69ff3ad3087705ecd659b8513f54980358a827fe9811fd469d211584f81fc5c346ca6507dcb831b88af025a4cbf8db37927f91f40711f44e467af3a26370ee0bf507a038d6d969e239bfaf30833da8b740f2fc82fd55cd8dca5d86bb3e361765ec025e7e3dcb984bfa72e04625a839b0ce7914a17b5d78026a637c416a1b79b30b35dc4bf79c06d3f03d4024216f3dd5bc0e94654f36d81954f5e0ea210126cdd38ffe127b3dc8a2454294657bc00f9a0beff5ef3bc4841bdcff608246017020afe7ebc3d43131b118710bd5469fa", 0xe3, 0x10001}, {&(0x7f0000000280)="99d58e98c2036462d32f38ca14f71356", 0x10, 0x1}, {&(0x7f00000003c0)="e8124d262e49f3790e6bdb2deebed51e5704a2b6b8949b06c09a0526bd2d54b8a7d6941c5096078a983bfd71f2845f74a501af5015025e6e4bb2420a2e585cc0cbcfdcac41857be988bd8613dca1f720954e557ceb2ca1", 0x57, 0x5}], 0x81, &(0x7f0000000640)={[{@nr_inodes={'nr_inodes', 0x3d, [0x36, 0x0, 0x6b, 0x38, 0x31, 0x6d, 0x30, 0x6d, 0x5d, 0x67]}}, {@huge_never}, {@huge_always}, {@huge_within_size}, {@mode}, {@size={'size', 0x3d, [0x32, 0x70, 0x74, 0x37, 0x32, 0x78]}}, {@huge_advise}], [{@smackfstransmute={'smackfstransmute', 0x3d, '#'}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}, {@measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}]}) 23:10:23 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x7, 0x4) add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) add_key$keyring(&(0x7f0000000740), &(0x7f0000000780)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) unshare(0x48020200) 23:10:23 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) dup2(r1, r1) r5 = syz_io_uring_complete(0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r7, r6) r8 = io_uring_setup(0x1b36, &(0x7f00000004c0)={0x0, 0x4252, 0x20, 0xffffffff, 0x175, 0x0, r7}) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000000)={0x0, 0x6, 0x5}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r5, 0xc018937c, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r8, @ANYBLOB="0100000100c44bfd590000000065300040c5c615ec2ae5032f0fc221f09aa15adfe421329f0365e36ad5ec30a32745bbb0eaace10d1366f495797f470f74937f514c881436"]) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r9, 0x0, r5) ioctl$SNDRV_TIMER_IOCTL_TREAD(r5, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:10:23 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="98000000200039040000000000000000020000000dc0c23671f1a964651e4d52c3dc9432e6af519d60c901a7ea83dce8f6a9c36adbbf7c23348ed7953cc124f0f2e2f1324bf1187b4e1f5a7bf5116e03f38056144e4fd6711849a6579e46004fbfb9ae80572129d57aa41a4c792b56978ebd2e72f57ca14145d7bcd879afed4e97abd691d56cf2d815f272170c0011000000000000000000bb3e3c7562af739c74b82fd57e7bd51e163e9c2394948632056b9357f234b64631cba457c59e6d0eae9098c89e3c7aa8b1cbc03bd674263161cff69945516e14595dfad881c353d7fb9bbdc2fb19f3306b4f29f5ac8dddb92ee4fe33f6e190dffd186aa055b9a9547a834f1d6190acda5d78a8cff254a2de72f20938d689ca4044e9b0a3ee3627818c70cc78d1fe11e55c898d61e09dd9cc4bdefd952f33d4697d06ffd93de78dd16ff6fabb99fb6b42eb449d317ff0f62c982878d984496c08a7a672102affbb245b18bb390e66298d7220110693dd4d00d4a7b9a75298857b75fa243b23c8cf9643bb00000000006dabf39491a19826dd17133c71e29784f2335028a747a6113ad6efdfbffa7205050056d0ee75b2f729232cc5bd028e654e69b60ba5313c46aa44ffefefa1dd182aa574a6fa732d6708584982012bb16aaceda807d810ad63ccfa5203bc3b2fac19fa9b5cd3d3f3e3cd43ced0a0870700adae78cb262f235c0401058ea209faecd0a5262bbda1d50def7cbef31c9b3ac3140d4741d25a4f0277c0ede8517e65b43a81d4e70e4f7c8f3e4c6b059a695c"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) add_key$keyring(&(0x7f0000000740), &(0x7f0000000780)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) unshare(0x48020200) 23:10:23 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) add_key(0x0, 0x0, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) add_key$keyring(&(0x7f0000000740), &(0x7f0000000780)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) unshare(0x48020200) [ 1876.132558] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.7'. [ 1876.137391] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.0'. 23:10:23 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x81, &(0x7f0000000640)={[{@nr_inodes={'nr_inodes', 0x3d, [0x36, 0x0, 0x6b, 0x38, 0x31, 0x6d, 0x30, 0x6d, 0x5d, 0x67]}}, {@huge_never}, {@huge_always}, {@huge_within_size}, {@mode}, {@size={'size', 0x3d, [0x32, 0x70, 0x74, 0x37, 0x32, 0x78]}}, {@huge_advise}], [{@smackfstransmute={'smackfstransmute', 0x3d, '#'}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}, {@measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}]}) [ 1876.185013] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. 23:10:23 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) unshare(0x48020200) [ 1876.229102] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.1'. 23:10:24 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x81, &(0x7f0000000640)={[{@nr_inodes={'nr_inodes', 0x3d, [0x36, 0x0, 0x6b, 0x38, 0x31, 0x6d, 0x30, 0x6d, 0x5d, 0x67]}}, {@huge_never}, {@huge_always}, {@huge_within_size}, {@mode}, {@size={'size', 0x3d, [0x32, 0x70, 0x74, 0x37, 0x32, 0x78]}}, {@huge_advise}], [{@smackfstransmute={'smackfstransmute', 0x3d, '#'}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}, {@measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}]}) 23:10:24 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) dup2(r1, r1) r5 = syz_io_uring_complete(0x0) r6 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r5, 0xc018937c, &(0x7f0000000440)=ANY=[@ANYBLOB="0100000001000000fa060000", @ANYRES32=r6, @ANYBLOB="01000000000000002e2f66696c653000"]) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r5) ioctl$SNDRV_TIMER_IOCTL_TREAD(r5, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:10:24 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) r7 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r7, {0x1}}, './file0\x00'}) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0x0, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x0, r6) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:10:24 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x81, &(0x7f0000000640)={[{@nr_inodes={'nr_inodes', 0x3d, [0x36, 0x0, 0x6b, 0x38, 0x31, 0x6d, 0x30, 0x6d, 0x5d, 0x67]}}, {@huge_never}, {@huge_always}, {@huge_within_size}, {@mode}, {@size={'size', 0x3d, [0x32, 0x70, 0x74, 0x37, 0x32, 0x78]}}, {@huge_advise}], [{@smackfstransmute={'smackfstransmute', 0x3d, '#'}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}, {@measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}]}) 23:10:24 executing program 6: ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000180)=0x7) openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(0xffffffffffffffff, 0x80047210, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) fcntl$lock(r0, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r1}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x45e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) ioctl$PIO_SCRNMAP(r2, 0x4b41, &(0x7f0000000040)="972d428dc6671b48c9d3717c678417759f1e5153285f331de414eab896f8d0e778cddcda3e95b8dd0ff1ccdc1f4763dac0b3ef942cd73e56a6005a8a033fd4ea4fbb9b7458982958dd8fad09b63ee7427f69d79640ea3f4be7a5a0e2435b939722abe3ff5c060a5e65ce6b8391ce92a037f643d3fed8b7147e5e7655fc17a4956772539811fb86a7e5142fc26ceacc70ee2b7d8875285cbfec75cabc72dd1d920be773bb8bb773e22e212dba2aee155338ae476e555a4bb0bd1b0f2c83b17019") r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_open_procfs(r1, &(0x7f0000000100)='net/softnet_stat\x00') fallocate(r3, 0x61, 0xfea, 0x8) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:10:24 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f00000005c0)=[{&(0x7f00000000c0)="6e6115e3da3389701f0cb881da2549544ed2023b91e32519001c57b28ebfba3b16ce7d5ce8d60228dd2f0b56ff4b7f5b8179c6938374ed2bded8381d000d3fcf73a8409b34fd1e05a1fe64da46ab61079adc55f20d60d89af61d", 0x5a, 0x1f}, {&(0x7f0000000180)="fda3805d9f8ffc160e2804832648bc0caa7feff3750b785f0a786100f5c7877291b603bb8711f25905f8766fb18b29b72d490f6625d7a71c63e84dca1aa443127a31481aa7f16af990c81497a73d929d642c28379692d88ea267f22d5124315376f37a299505538eedb8af29ddd395878b5eb1b98e393b81585ee385c072bdced1bcd565cb642bf2640fe51d534c31bb35d2f84bb984166d7ce5c38a433f2fe62c02bdae09c62793eb8071d2d189cc94e2eb77c2b71f45e3108116e062379225a2d579cf20084d044e2d9842c97fb70820f023610e84e2fb9116b6e0423b7589249a3d300e6c0824b1088da3eb104a", 0xef, 0x401}, {&(0x7f00000004c0)="b0d402b6cfb37c02b7e0a69ae9ce0a9f95fd6bbfc69ff3ad3087705ecd659b8513f54980358a827fe9811fd469d211584f81fc5c346ca6507dcb831b88af025a4cbf8db37927f91f40711f44e467af3a26370ee0bf507a038d6d969e239bfaf30833da8b740f2fc82fd55cd8dca5d86bb3e361765ec025e7e3dcb984bfa72e04625a839b0ce7914a17b5d78026a637c416a1b79b30b35dc4bf79c06d3f03d4024216f3dd5bc0e94654f36d81954f5e0ea210126cdd38ffe127b3dc8a2454294657bc00f9a0beff5ef3bc4841bdcff608246017020afe7ebc3d43131b118710bd5469fa", 0xe3, 0x10001}, {&(0x7f0000000280)="99d58e98c2036462d32f38ca14f71356", 0x10, 0x1}], 0x81, &(0x7f0000000640)={[{@nr_inodes={'nr_inodes', 0x3d, [0x36, 0x0, 0x6b, 0x38, 0x31, 0x6d, 0x30, 0x6d, 0x5d, 0x67]}}, {@huge_never}, {@huge_always}, {@huge_within_size}, {@mode}, {@size={'size', 0x3d, [0x32, 0x70, 0x74, 0x37, 0x32, 0x78]}}, {@huge_advise}], [{@smackfstransmute={'smackfstransmute', 0x3d, '#'}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}, {@measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}]}) 23:10:24 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) dup2(r1, r1) r5 = syz_io_uring_complete(0x0) r6 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r5, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r6, {0x1}}, './file0\x00'}) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r5) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x8, 0x3) ioctl$SNDRV_TIMER_IOCTL_TREAD(r5, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:10:24 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) add_key$keyring(&(0x7f0000000740), &(0x7f0000000780)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) unshare(0x48020200) 23:10:24 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x3, 0xffffffffffffffff, 0x5) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9c000000", @ANYRES16=0x0, @ANYBLOB="010027bd7000fcdbdf25040000003423baa10c00038008000300000000004400d841ac257b65d0be0000080004009600000006000f00faff000005000d00010000000800080400010000260002004e2400000800030000000000080003000300000008000600070000000800060037000000240073697000060002008700000008000b00732469700e4565e4fdc80a2f07f900"/160], 0x9c}, 0x1, 0x0, 0x0, 0x48000}, 0x4004) read(r0, &(0x7f00000002c0)=""/225, 0xe1) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = dup2(r3, r2) lseek(r4, 0x7, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r5, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r6, r1) 23:10:24 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) add_key$keyring(&(0x7f0000000740), &(0x7f0000000780)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) unshare(0x48020200) [ 1876.557708] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1876.568788] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1890.591869] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.1'. 23:10:38 executing program 7: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) (fail_nth: 1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:10:38 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x3, 0xffffffffffffffff, 0x5) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9c000000", @ANYRES16=0x0, @ANYBLOB="010027bd7000fcdbdf25040000003423baa10c00038008000300000000004400d841ac257b65d0be0000080004009600000006000f00faff000005000d00010000000800080400010000260002004e2400000800030000000000080003000300000008000600070000000800060037000000240073697000060002008700000008000b00732469700e4565e4fdc80a2f07f900"/160], 0x9c}, 0x1, 0x0, 0x0, 0x48000}, 0x4004) read(r0, &(0x7f00000002c0)=""/225, 0xe1) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = dup2(r3, r2) lseek(r4, 0x7, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r5, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r6, r1) 23:10:38 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) add_key$keyring(&(0x7f0000000740), &(0x7f0000000780)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) unshare(0x48020200) 23:10:38 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x7, 0x4) add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) add_key$keyring(&(0x7f0000000740), &(0x7f0000000780)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) unshare(0x48020200) 23:10:38 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) unshare(0x48020200) 23:10:38 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x3, &(0x7f00000005c0)=[{&(0x7f00000000c0)="6e6115e3da3389701f0cb881da2549544ed2023b91e32519001c57b28ebfba3b16ce7d5ce8d60228dd2f0b56ff4b7f5b8179c6938374ed2bded8381d000d3fcf73a8409b34fd1e05a1fe64da46ab61079adc55f20d60d89af61d", 0x5a, 0x1f}, {&(0x7f0000000180)="fda3805d9f8ffc160e2804832648bc0caa7feff3750b785f0a786100f5c7877291b603bb8711f25905f8766fb18b29b72d490f6625d7a71c63e84dca1aa443127a31481aa7f16af990c81497a73d929d642c28379692d88ea267f22d5124315376f37a299505538eedb8af29ddd395878b5eb1b98e393b81585ee385c072bdced1bcd565cb642bf2640fe51d534c31bb35d2f84bb984166d7ce5c38a433f2fe62c02bdae09c62793eb8071d2d189cc94e2eb77c2b71f45e3108116e062379225a2d579cf20084d044e2d9842c97fb70820f023610e84e2fb9116b6e0423b7589249a3d300e6c0824b1088da3eb104a", 0xef, 0x401}, {&(0x7f00000004c0)="b0d402b6cfb37c02b7e0a69ae9ce0a9f95fd6bbfc69ff3ad3087705ecd659b8513f54980358a827fe9811fd469d211584f81fc5c346ca6507dcb831b88af025a4cbf8db37927f91f40711f44e467af3a26370ee0bf507a038d6d969e239bfaf30833da8b740f2fc82fd55cd8dca5d86bb3e361765ec025e7e3dcb984bfa72e04625a839b0ce7914a17b5d78026a637c416a1b79b30b35dc4bf79c06d3f03d4024216f3dd5bc0e94654f36d81954f5e0ea210126cdd38ffe127b3dc8a2454294657bc00f9a0beff5ef3bc4841bdcff608246017020afe7ebc3d43131b118710bd5469fa", 0xe3, 0x10001}], 0x81, &(0x7f0000000640)={[{@nr_inodes={'nr_inodes', 0x3d, [0x36, 0x0, 0x6b, 0x38, 0x31, 0x6d, 0x30, 0x6d, 0x5d, 0x67]}}, {@huge_never}, {@huge_always}, {@huge_within_size}, {@mode}, {@size={'size', 0x3d, [0x32, 0x70, 0x74, 0x37, 0x32, 0x78]}}, {@huge_advise}], [{@smackfstransmute={'smackfstransmute', 0x3d, '#'}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}, {@measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}]}) 23:10:38 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) dup2(r1, r1) r5 = syz_io_uring_complete(0x0) r6 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175}) r7 = syz_mount_image$nfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x9, &(0x7f0000000940)=[{&(0x7f00000001c0)="f7c18d8d1214b94ef051f811aea4ba7b71f2ec1714b19881c07eddd3c6af362a45a4f216f358a9e8589125062feb29e4d79386be35376957cceb58d0adb517411374e11924263ef9432d33ba3a3e148f05b2287f2141bedbb9b79c35b21af9980bd65432080da26fa207e7fcc631e4be07259cef53f0f225c3d8dc7925cdb27f6c082da2497e1d864c3c3d76efc74c964a24d78322719d83ec8562777d1ab561ae2a07fa158077beb047ad9eaf2bf59e646a486dbd881bb1", 0xb8}, {&(0x7f0000000100)="5afc1e739d799eb9d0f2bdeeaf8b93fdf966c56836445e2cf6a13244c9bd136dbc27543ee2", 0x25, 0xc9e}, {&(0x7f00000003c0)="aa25d9a4ec883e52318e87e1cc6e05b9d57f5df31201842f0d33c51e98effaab9058ccc23323f97e8ea08f3c1922144b53b62d5cff5ef3ca10b499fc865f6788bb366e8fe0226627a11856bd373142d0cbc2445d6463bb448059ac770267d6dff94b37ac34be125e327f", 0x6a, 0x1}, {&(0x7f0000000540)="a834e63f97ed876ad528efaf085917397276bee0f18cc2c8882961817715462f669c528bcaa1830e4a2e27f6c9a2edc6fb232d9c92538acf20f810e793d172850146b4247187696a00e909b7b55220ebcf8b8eb231f3236c6731047d7f1162ee92c5b0894d526d4a2f7029be01427b9f10aae33dd47fb7ae49e93540b088b5601dfe5399fa03ebbfee", 0x89, 0x4}, {&(0x7f0000000600)="7911773d75c224ec9d8b92ab790070b05ce62a457e19be1a73d771199e9e6dd573b6b3753cf63d0fb6dc91a34db395bfc4d0f1b29a38d48ebbb614069c36c5d76383ea739cda7b39756f87370787082393052ac51612bd8159123e4bff866050b7d78977331ce5199592978e96f48fd7bbd8c4bf4977604e8478ae8ecb6241267b944cfbf1306e47e9b2fbb65e3f845cdd648cb1389b", 0x96, 0x4abb}, {&(0x7f00000006c0)="ed5b88c233f950faa2ffd5ace0e3003bdd3d52c2d14dcdfd54b24a26a761783729c6d565306322219d1fbcd1aeea2cc224be97c0d463c6734e2ecaae64d069132eb40479407731220bea4f8cb4c1e7a83e4d2cbbf20504ea865f2408fd1fff84f581760a9786d745512b29427d6b74c0800c8dbded81d4334a2942d76f9fd51aa454e7cd9acb34d4633d7425c3f869f3e6542d14f6c630cca48c1c364bacfb852d073610c62f75c1007fd21a09f2ec2ba16669291b79d2fcb8aff1e071312efd37f2b2", 0xc3, 0x96}, {&(0x7f00000007c0)="b95ce0adabe98bfb632919dfb32b87894285e7a37d0ce8b9c70601ddc191d1a316b6f753d793aaefbc4122e1e6395b1de7fabbcb6c44af18603c8d7218e561d33d6cbd632052be4306b453fd71a567ab", 0x50, 0x7}, {&(0x7f0000000840)="642004cd6bdd7a5a10db3009ac1e695ec3ec9b394b114c2716e8e75da28005b024829cebefd5d0a6e0f593370666b97fa6fd4ec1604a02b3f1797abd0bd5dae08045c126fcfb6ef2f67b8220463919f3fd740187c14f08e17b63693b004f323d81e059e80638c8a954395d319acb2da23a3be4faa4fe223eb7a0630814d72328accca40f1902e53ca5ecabcaf9d9c6013afc861d296c2747dce0a06bfea2dfdc2c4d07175e8f6429f150218d15277c71ccc183b7227a547d4bbe8ecf97612025813973e0f57156793a1e024ab79530a6218e56c1b7f1c72e0769ed1a7b3e4a30856af5b691681d40e2250b8dc1f5325bc2d5e196a0b163e5e7348d", 0xfb, 0x9}, {&(0x7f0000000440)="2049e694003b5b3b639507fca75a73c56f8945196b46bc5101ac9df8195b8f313485eb47c7ab669b", 0x28, 0x4}], 0x8004, &(0x7f0000000a40)={[{'[{'}, {'\x00'}, {'\x00'}, {'net/ptype\x00'}, {'/dev/sg#\x00'}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@measure}, {@obj_user={'obj_user', 0x3d, '^'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, '\x00'}}]}) r8 = syz_open_dev$ptys(0xc, 0x3, 0x1) r9 = perf_event_open$cgroup(&(0x7f0000000ac0)={0x4, 0x80, 0x5, 0x6, 0x58, 0x1, 0x0, 0x6, 0x4040, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x9, 0x71}, 0x4001c, 0x3, 0x1c, 0x6, 0x80000000, 0x6, 0x0, 0x0, 0xd4, 0x0, 0xfffffffffffffeff}, r5, 0x2, 0xffffffffffffffff, 0x3) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000b40)=[r2, r7, r6, r6, r8, r3, r9, r6, r5], 0x9) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r5, 0xc018937c, &(0x7f0000000000)=ANY=[@ANYBLOB="0100dfff0000000018000000", @ANYRES32=r6, @ANYBLOB="01fa00b08c0f00000000002e2f66696c653000"]) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r10, 0x0, r5) ioctl$SNDRV_TIMER_IOCTL_TREAD(r5, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:10:38 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) add_key$keyring(&(0x7f0000000740), &(0x7f0000000780)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) unshare(0x48020200) [ 1890.611252] FAULT_INJECTION: forcing a failure. [ 1890.611252] name failslab, interval 1, probability 0, space 0, times 0 [ 1890.616257] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1890.619719] CPU: 1 PID: 9983 Comm: syz-executor.7 Not tainted 5.10.225 #1 [ 1890.620875] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1890.621620] Call Trace: [ 1890.621874] dump_stack+0x107/0x167 [ 1890.622221] should_fail.cold+0x5/0xa [ 1890.622594] ? kvmalloc_node+0x119/0x170 [ 1890.626989] should_failslab+0x5/0x20 [ 1890.627330] __kmalloc_node+0x76/0x420 [ 1890.627682] ? __lock_acquire+0xbb1/0x5b00 [ 1890.628066] kvmalloc_node+0x119/0x170 [ 1890.628412] seq_read_iter+0x81c/0x12b0 [ 1890.628777] seq_read+0x3dd/0x5b0 [ 1890.629083] ? seq_read_iter+0x12b0/0x12b0 [ 1890.629482] ? __mutex_lock+0x4fe/0x10b0 [ 1890.629868] ? _cond_resched+0x12/0x80 [ 1890.630242] ? fsnotify_perm.part.0+0x22d/0x620 [ 1890.630687] ? seq_read_iter+0x12b0/0x12b0 [ 1890.631089] proc_reg_read+0x22a/0x300 [ 1890.631449] ? proc_reg_write+0x300/0x300 [ 1890.631835] vfs_read+0x228/0x620 [ 1890.632159] ksys_read+0x12d/0x260 [ 1890.632488] ? vfs_write+0xb10/0xb10 [ 1890.632836] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1890.633316] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1890.633790] do_syscall_64+0x33/0x40 [ 1890.634136] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1890.634607] RIP: 0033:0x7f6b2df5db19 [ 1890.634959] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1890.636594] RSP: 002b:00007f6b2b4d3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1890.637282] RAX: ffffffffffffffda RBX: 00007f6b2e070f60 RCX: 00007f6b2df5db19 [ 1890.637922] RDX: 00000000000000e1 RSI: 00000000200002c0 RDI: 0000000000000005 [ 1890.646910] RBP: 00007f6b2b4d31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1890.647558] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1890.648201] R13: 00007ffe41334d5f R14: 00007f6b2b4d3300 R15: 0000000000022000 [ 1890.654146] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1890.663007] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1890.729873] nfs: Unknown parameter '[{' 23:10:53 executing program 7: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) (fail_nth: 2) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:10:53 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(0x0, &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) add_key$keyring(&(0x7f0000000740), &(0x7f0000000780)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) unshare(0x48020200) 23:10:53 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f00000005c0)=[{&(0x7f00000000c0)="6e6115e3da3389701f0cb881da2549544ed2023b91e32519001c57b28ebfba3b16ce7d5ce8d60228dd2f0b56ff4b7f5b8179c6938374ed2bded8381d000d3fcf73a8409b34fd1e05a1fe64da46ab61079adc55f20d60d89af61d", 0x5a, 0x1f}, {&(0x7f0000000180)="fda3805d9f8ffc160e2804832648bc0caa7feff3750b785f0a786100f5c7877291b603bb8711f25905f8766fb18b29b72d490f6625d7a71c63e84dca1aa443127a31481aa7f16af990c81497a73d929d642c28379692d88ea267f22d5124315376f37a299505538eedb8af29ddd395878b5eb1b98e393b81585ee385c072bdced1bcd565cb642bf2640fe51d534c31bb35d2f84bb984166d7ce5c38a433f2fe62c02bdae09c62793eb8071d2d189cc94e2eb77c2b71f45e3108116e062379225a2d579cf20084d044e2d9842c97fb70820f023610e84e2fb9116b6e0423b7589249a3d300e6c0824b1088da3eb104a", 0xef, 0x401}], 0x81, &(0x7f0000000640)={[{@nr_inodes={'nr_inodes', 0x3d, [0x36, 0x0, 0x6b, 0x38, 0x31, 0x6d, 0x30, 0x6d, 0x5d, 0x67]}}, {@huge_never}, {@huge_always}, {@huge_within_size}, {@mode}, {@size={'size', 0x3d, [0x32, 0x70, 0x74, 0x37, 0x32, 0x78]}}, {@huge_advise}], [{@smackfstransmute={'smackfstransmute', 0x3d, '#'}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}, {@measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}]}) 23:10:53 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) unshare(0x48020200) 23:10:53 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) readv(r4, &(0x7f0000000040)=[{&(0x7f0000000540)=""/225, 0xe1}, {&(0x7f0000000000)=""/58, 0x3a}, {&(0x7f0000000640)=""/198, 0xc6}], 0x3) read(r2, &(0x7f00000002c0)=""/225, 0xe1) r5 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$SG_IO(r6, 0x1274, 0x0) dup2(r1, r1) r7 = syz_io_uring_complete(0x0) r8 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r7, 0xc018937c, &(0x7f00000001c0)=ANY=[@ANYBLOB="0100000001000000180000006554bb9bbed3c152169b80d36b4b4fd3a16830412575f748bd436525fdaa722da3b1d9e0ba4522079e050b13ab9cefa4f9cd5de43771548a56a8802ada9b44ba06ef793a7d3e1205f2784a8dc492ce6129730d87e57e8865840a9dee18066362a1207f", @ANYRES32=r8, @ANYBLOB="01000000000000002e2f66696c653000"]) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r9, 0x0, r7) ioctl$SNDRV_TIMER_IOCTL_TREAD(r7, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:10:53 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) (fail_nth: 1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) r7 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r7, {0x1}}, './file0\x00'}) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x0, r6) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:10:53 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x3, 0xffffffffffffffff, 0x5) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9c000000", @ANYRES16=0x0, @ANYBLOB="010027bd7000fcdbdf25040000003423baa10c00038008000300000000004400d841ac257b65d0be0000080004009600000006000f00faff000005000d00010000000800080400010000260002004e2400000800030000000000080003000300000008000600070000000800060037000000240073697000060002008700000008000b00732469700e4565e4fdc80a2f07f900"/160], 0x9c}, 0x1, 0x0, 0x0, 0x48000}, 0x4004) read(r0, &(0x7f00000002c0)=""/225, 0xe1) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = dup2(r2, r1) lseek(r3, 0x7, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r4, r3, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r4, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 23:10:53 executing program 2: sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='fd/3\x00') syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) sendmsg$IPVS_CMD_FLUSH(r0, 0x0, 0x20004000) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x8927, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) getdents64(0xffffffffffffffff, 0x0, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000700)=ANY=[@ANYRESOCT, @ANYRES16=r4, @ANYBLOB], 0x100}, 0x1, 0x0, 0x0, 0x4804}, 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r4, 0x800, 0x70bd29, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}]}, 0x1c}, 0x1, 0x0, 0x0, 0x400c0}, 0x8) sendmsg$NL80211_CMD_TRIGGER_SCAN(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000180)={0x28, r2, 0x0, 0x10, 0x0, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x0, 0x15}}}}}, 0x28}, 0x1, 0x0, 0x0, 0x4000}, 0x844) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) rt_sigaction(0x17, 0x0, &(0x7f000000b240)={0x0, 0x0, 0x0}, 0x8, &(0x7f000000b280)) fallocate(r5, 0x0, 0x0, 0x1000002) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r5, 0x0) [ 1905.665848] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1905.679998] FAULT_INJECTION: forcing a failure. [ 1905.679998] name failslab, interval 1, probability 0, space 0, times 0 [ 1905.681084] CPU: 0 PID: 10021 Comm: syz-executor.6 Not tainted 5.10.225 #1 [ 1905.681665] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1905.682355] Call Trace: [ 1905.682585] dump_stack+0x107/0x167 [ 1905.682904] should_fail.cold+0x5/0xa [ 1905.683232] ? kvmalloc_node+0x119/0x170 [ 1905.683579] should_failslab+0x5/0x20 [ 1905.683907] __kmalloc_node+0x76/0x420 [ 1905.684240] ? mark_held_locks+0x9e/0xe0 [ 1905.684601] kvmalloc_node+0x119/0x170 [ 1905.684948] seq_read_iter+0x81c/0x12b0 [ 1905.685307] seq_read+0x3dd/0x5b0 [ 1905.685610] ? seq_read_iter+0x12b0/0x12b0 [ 1905.685984] ? __mutex_lock+0x4fe/0x10b0 [ 1905.686337] ? _cond_resched+0x12/0x80 [ 1905.686684] ? fsnotify_perm.part.0+0x22d/0x620 [ 1905.687108] ? seq_read_iter+0x12b0/0x12b0 [ 1905.687469] proc_reg_read+0x22a/0x300 [ 1905.687800] ? proc_reg_write+0x300/0x300 [ 1905.688149] vfs_read+0x228/0x620 [ 1905.688459] ksys_read+0x12d/0x260 [ 1905.688769] ? vfs_write+0xb10/0xb10 [ 1905.689096] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1905.689537] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1905.689971] do_syscall_64+0x33/0x40 [ 1905.690287] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1905.690717] RIP: 0033:0x7ff4309cdb19 [ 1905.691046] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1905.692592] RSP: 002b:00007ff42df43188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1905.693248] RAX: ffffffffffffffda RBX: 00007ff430ae0f60 RCX: 00007ff4309cdb19 [ 1905.693865] RDX: 00000000000000e1 RSI: 00000000200002c0 RDI: 0000000000000005 [ 1905.693968] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1905.694465] RBP: 00007ff42df431d0 R08: 0000000000000000 R09: 0000000000000000 [ 1905.694474] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1905.694482] R13: 00007fff11e3285f R14: 00007ff42df43300 R15: 0000000000022000 [ 1905.696107] FAULT_INJECTION: forcing a failure. [ 1905.696107] name failslab, interval 1, probability 0, space 0, times 0 [ 1905.698807] CPU: 0 PID: 10011 Comm: syz-executor.7 Not tainted 5.10.225 #1 [ 1905.699399] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1905.700085] Call Trace: [ 1905.700309] dump_stack+0x107/0x167 [ 1905.700629] should_fail.cold+0x5/0xa [ 1905.700958] ? create_object.isra.0+0x3a/0xa20 [ 1905.701356] should_failslab+0x5/0x20 [ 1905.701692] kmem_cache_alloc+0x5b/0x310 [ 1905.702061] create_object.isra.0+0x3a/0xa20 [ 1905.702447] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1905.702916] __kmalloc_node+0x1ae/0x420 [ 1905.703255] ? __lock_acquire+0xbb1/0x5b00 [ 1905.703618] kvmalloc_node+0x119/0x170 [ 1905.703946] seq_read_iter+0x81c/0x12b0 [ 1905.704295] seq_read+0x3dd/0x5b0 [ 1905.704590] ? seq_read_iter+0x12b0/0x12b0 [ 1905.704946] ? __mutex_lock+0x4fe/0x10b0 [ 1905.705304] ? _cond_resched+0x12/0x80 [ 1905.705643] ? fsnotify_perm.part.0+0x22d/0x620 [ 1905.706045] ? seq_read_iter+0x12b0/0x12b0 [ 1905.706410] proc_reg_read+0x22a/0x300 [ 1905.706740] ? proc_reg_write+0x300/0x300 [ 1905.707118] vfs_read+0x228/0x620 [ 1905.707419] ksys_read+0x12d/0x260 [ 1905.707721] ? vfs_write+0xb10/0xb10 [ 1905.708039] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1905.708486] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1905.708936] do_syscall_64+0x33/0x40 [ 1905.709258] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1905.709703] RIP: 0033:0x7f6b2df5db19 [ 1905.710031] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1905.711593] RSP: 002b:00007f6b2b4d3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1905.712229] RAX: ffffffffffffffda RBX: 00007f6b2e070f60 RCX: 00007f6b2df5db19 [ 1905.712824] RDX: 00000000000000e1 RSI: 00000000200002c0 RDI: 0000000000000005 [ 1905.713421] RBP: 00007f6b2b4d31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1905.714017] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1905.714615] R13: 00007ffe41334d5f R14: 00007f6b2b4d3300 R15: 0000000000022000 23:10:53 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f00000005c0)=[{&(0x7f00000000c0)="6e6115e3da3389701f0cb881da2549544ed2023b91e32519001c57b28ebfba3b16ce7d5ce8d60228dd2f0b56ff4b7f5b8179c6938374ed2bded8381d000d3fcf73a8409b34fd1e05a1fe64da46ab61079adc55f20d60d89af61d", 0x5a, 0x1f}], 0x81, &(0x7f0000000640)={[{@nr_inodes={'nr_inodes', 0x3d, [0x36, 0x0, 0x6b, 0x38, 0x31, 0x6d, 0x30, 0x6d, 0x5d, 0x67]}}, {@huge_never}, {@huge_always}, {@huge_within_size}, {@mode}, {@size={'size', 0x3d, [0x32, 0x70, 0x74, 0x37, 0x32, 0x78]}}, {@huge_advise}], [{@smackfstransmute={'smackfstransmute', 0x3d, '#'}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}, {@measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}]}) 23:10:53 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) (fail_nth: 2) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) r7 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r7, {0x1}}, './file0\x00'}) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x0, r6) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:10:53 executing program 7: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) (fail_nth: 3) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') [ 1905.843019] FAULT_INJECTION: forcing a failure. [ 1905.843019] name failslab, interval 1, probability 0, space 0, times 0 [ 1905.844058] CPU: 0 PID: 10033 Comm: syz-executor.6 Not tainted 5.10.225 #1 [ 1905.844636] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1905.845325] Call Trace: [ 1905.845555] dump_stack+0x107/0x167 [ 1905.845865] should_fail.cold+0x5/0xa [ 1905.846190] ? create_object.isra.0+0x3a/0xa20 [ 1905.846577] should_failslab+0x5/0x20 [ 1905.846913] kmem_cache_alloc+0x5b/0x310 [ 1905.847265] create_object.isra.0+0x3a/0xa20 [ 1905.847639] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1905.848071] __kmalloc_node+0x1ae/0x420 [ 1905.848409] ? __lock_acquire+0xbb1/0x5b00 [ 1905.848776] kvmalloc_node+0x119/0x170 [ 1905.849108] seq_read_iter+0x81c/0x12b0 [ 1905.849460] seq_read+0x3dd/0x5b0 [ 1905.849759] ? seq_read_iter+0x12b0/0x12b0 [ 1905.850120] ? __mutex_lock+0x4fe/0x10b0 [ 1905.850471] ? _cond_resched+0x12/0x80 [ 1905.850807] ? fsnotify_perm.part.0+0x22d/0x620 [ 1905.851219] ? seq_read_iter+0x12b0/0x12b0 [ 1905.851580] proc_reg_read+0x22a/0x300 [ 1905.851910] ? proc_reg_write+0x300/0x300 [ 1905.852261] vfs_read+0x228/0x620 [ 1905.852563] ksys_read+0x12d/0x260 [ 1905.852865] ? vfs_write+0xb10/0xb10 [ 1905.853186] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1905.853628] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1905.854064] do_syscall_64+0x33/0x40 [ 1905.854380] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1905.854812] RIP: 0033:0x7ff4309cdb19 [ 1905.855145] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1905.856677] RSP: 002b:00007ff42df43188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1905.857319] RAX: ffffffffffffffda RBX: 00007ff430ae0f60 RCX: 00007ff4309cdb19 [ 1905.857915] RDX: 00000000000000e1 RSI: 00000000200002c0 RDI: 0000000000000005 [ 1905.858514] RBP: 00007ff42df431d0 R08: 0000000000000000 R09: 0000000000000000 [ 1905.859126] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1905.859724] R13: 00007fff11e3285f R14: 00007ff42df43300 R15: 0000000000022000 [ 1905.877077] FAULT_INJECTION: forcing a failure. [ 1905.877077] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1905.878152] CPU: 0 PID: 10039 Comm: syz-executor.7 Not tainted 5.10.225 #1 [ 1905.878729] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1905.879435] Call Trace: [ 1905.879660] dump_stack+0x107/0x167 [ 1905.879970] should_fail.cold+0x5/0xa [ 1905.880297] _copy_to_iter+0x264/0x12d0 [ 1905.880646] ? ptype_seq_stop+0x1a/0xc0 [ 1905.880985] ? _copy_from_iter_nocache+0xd60/0xd60 [ 1905.881405] ? __virt_addr_valid+0x170/0x5d0 [ 1905.881780] ? __check_object_size+0x319/0x440 [ 1905.882175] seq_read_iter+0xdcb/0x12b0 [ 1905.882529] seq_read+0x3dd/0x5b0 [ 1905.882826] ? seq_read_iter+0x12b0/0x12b0 [ 1905.883203] ? __mutex_lock+0x4fe/0x10b0 [ 1905.883554] ? _cond_resched+0x12/0x80 [ 1905.883891] ? fsnotify_perm.part.0+0x22d/0x620 [ 1905.884289] ? seq_read_iter+0x12b0/0x12b0 [ 1905.884649] proc_reg_read+0x22a/0x300 [ 1905.884987] ? proc_reg_write+0x300/0x300 [ 1905.885339] vfs_read+0x228/0x620 [ 1905.885641] ksys_read+0x12d/0x260 [ 1905.885944] ? vfs_write+0xb10/0xb10 [ 1905.886264] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1905.886707] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1905.887160] do_syscall_64+0x33/0x40 [ 1905.887478] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1905.887910] RIP: 0033:0x7f6b2df5db19 [ 1905.888227] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1905.889762] RSP: 002b:00007f6b2b4d3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1905.890403] RAX: ffffffffffffffda RBX: 00007f6b2e070f60 RCX: 00007f6b2df5db19 [ 1905.891021] RDX: 00000000000000e1 RSI: 00000000200002c0 RDI: 0000000000000005 [ 1905.891640] RBP: 00007f6b2b4d31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1905.892239] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1905.892838] R13: 00007ffe41334d5f R14: 00007f6b2b4d3300 R15: 0000000000022000 23:10:53 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) dup2(r1, r1) r5 = syz_io_uring_setup(0x4d50, &(0x7f0000000140), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r6, r7, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x1f8, 0x0, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) r8 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) fallocate(r8, 0x10, 0x0, 0x5) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r5, 0x0) [ 1906.263680] Zero length message leads to an empty skb [ 1919.791171] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.1'. 23:11:07 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) (fail_nth: 3) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) r7 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r7, {0x1}}, './file0\x00'}) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x0, r6) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:11:07 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x81, &(0x7f0000000640)={[{@nr_inodes={'nr_inodes', 0x3d, [0x36, 0x0, 0x6b, 0x38, 0x31, 0x6d, 0x30, 0x6d, 0x5d, 0x67]}}, {@huge_never}, {@huge_always}, {@huge_within_size}, {@mode}, {@size={'size', 0x3d, [0x32, 0x70, 0x74, 0x37, 0x32, 0x78]}}, {@huge_advise}], [{@smackfstransmute={'smackfstransmute', 0x3d, '#'}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}, {@measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}]}) 23:11:07 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x3, 0xffffffffffffffff, 0x5) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9c000000", @ANYRES16=0x0, @ANYBLOB="010027bd7000fcdbdf25040000003423baa10c00038008000300000000004400d841ac257b65d0be0000080004009600000006000f00faff000005000d00010000000800080400010000260002004e2400000800030000000000080003000300000008000600070000000800060037000000240073697000060002008700000008000b00732469700e4565e4fdc80a2f07f900"/160], 0x9c}, 0x1, 0x0, 0x0, 0x48000}, 0x4004) read(r0, &(0x7f00000002c0)=""/225, 0xe1) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = dup2(r2, r1) lseek(r3, 0x7, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r4, r3, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r4, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 23:11:07 executing program 5: ioctl$FAT_IOCTL_GET_ATTRIBUTES(0xffffffffffffffff, 0x80047210, &(0x7f0000000180)) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r1, &(0x7f00000002c0)=""/225, 0xe1) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$SG_IO(r3, 0x1274, 0x0) dup2(r0, r0) r4 = syz_io_uring_complete(0x0) r5 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r5, {0x1}}, './file0\x00'}) dup2(0xffffffffffffffff, 0xffffffffffffffff) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r6, 0x0, r4) ioctl$SNDRV_TIMER_IOCTL_TREAD(r4, 0x40045402, &(0x7f0000000480)=0x1) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r8 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r8, r7) ioctl$SCSI_IOCTL_SEND_COMMAND(r7, 0x1, &(0x7f00000001c0)={0x8d, 0x47c0, 0x708a, "4a429ffc98bb7bd2cd1818cfe9126eb3cf635a293ae248d3a19a7246851217ab5cba9a51b2eec1d37d576e23ce0b422deb231ee9aa9b74c5a099f141bf0590e4f73d9a357b784e0ba1554b9eccdf2ad4dfc7a769fafe9f585ee39b2ab5db3a7d80368d751326bf539cd92431f9bf4f166bf63a65dff05179aa1aa975734af62e138b8324ffa46d0ec783c25b22"}) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:11:07 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x3, 0xffffffffffffffff, 0x5) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9c000000", @ANYRES16=0x0, @ANYBLOB="010027bd7000fcdbdf25040000003423baa10c00038008000300000000004400d841ac257b65d0be0000080004009600000006000f00faff000005000d00010000000800080400010000260002004e2400000800030000000000080003000300000008000600070000000800060037000000240073697000060002008700000008000b00732469700e4565e4fdc80a2f07f900"/160], 0x9c}, 0x1, 0x0, 0x0, 0x48000}, 0x4004) read(r0, &(0x7f00000002c0)=""/225, 0xe1) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = dup2(r2, r1) lseek(r3, 0x7, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r4, r3, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r4, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:11:07 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) unshare(0x48020200) 23:11:07 executing program 7: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) (fail_nth: 4) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') [ 1919.810931] FAULT_INJECTION: forcing a failure. [ 1919.810931] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1919.812625] CPU: 1 PID: 10069 Comm: syz-executor.7 Not tainted 5.10.225 #1 [ 1919.813212] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1919.813983] Call Trace: [ 1919.814216] dump_stack+0x107/0x167 [ 1919.814600] should_fail.cold+0x5/0xa [ 1919.814993] _copy_to_user+0x2e/0x180 [ 1919.815332] simple_read_from_buffer+0xcc/0x160 [ 1919.816447] proc_fail_nth_read+0x198/0x230 [ 1919.817262] ? proc_sessionid_read+0x230/0x230 [ 1919.818136] ? security_file_permission+0xb1/0xe0 [ 1919.819062] ? proc_sessionid_read+0x230/0x230 [ 1919.820149] vfs_read+0x228/0x620 [ 1919.820922] ksys_read+0x12d/0x260 [ 1919.821684] ? vfs_write+0xb10/0xb10 23:11:07 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(0x0, &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) add_key$keyring(&(0x7f0000000740), &(0x7f0000000780)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) unshare(0x48020200) [ 1919.822496] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1919.824583] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1919.825927] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1919.825941] do_syscall_64+0x33/0x40 [ 1919.825954] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1919.825963] RIP: 0033:0x7f6b2df1069c [ 1919.825975] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1919.825982] RSP: 002b:00007f6b2b4d3170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1919.825995] RAX: ffffffffffffffda RBX: 0000000000000079 RCX: 00007f6b2df1069c [ 1919.826003] RDX: 000000000000000f RSI: 00007f6b2b4d31e0 RDI: 0000000000000006 [ 1919.826010] RBP: 00007f6b2b4d31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1919.826018] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1919.826025] R13: 00007ffe41334d5f R14: 00007f6b2b4d3300 R15: 0000000000022000 [ 1919.852297] FAULT_INJECTION: forcing a failure. [ 1919.852297] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1919.853340] CPU: 0 PID: 10073 Comm: syz-executor.6 Not tainted 5.10.225 #1 [ 1919.853942] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1919.854644] Call Trace: [ 1919.855967] dump_stack+0x107/0x167 [ 1919.856279] should_fail.cold+0x5/0xa [ 1919.856616] _copy_to_iter+0x264/0x12d0 [ 1919.856984] ? ptype_seq_stop+0x1a/0xc0 [ 1919.857327] ? _copy_from_iter_nocache+0xd60/0xd60 [ 1919.857754] ? __virt_addr_valid+0x170/0x5d0 [ 1919.858142] ? __check_object_size+0x319/0x440 [ 1919.858533] seq_read_iter+0xdcb/0x12b0 [ 1919.858884] seq_read+0x3dd/0x5b0 [ 1919.859239] ? seq_read_iter+0x12b0/0x12b0 [ 1919.859612] ? __mutex_lock+0x4fe/0x10b0 [ 1919.859962] ? _cond_resched+0x12/0x80 [ 1919.860326] ? fsnotify_perm.part.0+0x22d/0x620 [ 1919.860737] ? seq_read_iter+0x12b0/0x12b0 [ 1919.861104] proc_reg_read+0x22a/0x300 [ 1919.861447] ? proc_reg_write+0x300/0x300 [ 1919.861800] vfs_read+0x228/0x620 [ 1919.862101] ksys_read+0x12d/0x260 [ 1919.862415] ? vfs_write+0xb10/0xb10 [ 1919.862746] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1919.863221] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1919.864752] do_syscall_64+0x33/0x40 [ 1919.865069] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1919.865512] RIP: 0033:0x7ff4309cdb19 [ 1919.865838] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1919.867430] RSP: 002b:00007ff42df43188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1919.868085] RAX: ffffffffffffffda RBX: 00007ff430ae0f60 RCX: 00007ff4309cdb19 [ 1919.868693] RDX: 00000000000000e1 RSI: 00000000200002c0 RDI: 0000000000000005 [ 1919.869308] RBP: 00007ff42df431d0 R08: 0000000000000000 R09: 0000000000000000 [ 1919.869925] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1919.870541] R13: 00007fff11e3285f R14: 00007ff42df43300 R15: 0000000000022000 23:11:07 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000640)={[{@nr_inodes={'nr_inodes', 0x3d, [0x36, 0x0, 0x6b, 0x38, 0x31, 0x6d, 0x30, 0x6d, 0x5d, 0x67]}}, {@huge_never}, {@huge_always}, {@huge_within_size}, {@mode}, {@size={'size', 0x3d, [0x32, 0x70, 0x74, 0x37, 0x32, 0x78]}}, {@huge_advise}], [{@smackfstransmute={'smackfstransmute', 0x3d, '#'}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}, {@measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}]}) 23:11:07 executing program 7: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:11:07 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) dup2(r1, r1) r5 = syz_io_uring_complete(0x0) r6 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r5, 0xc018937c, &(0x7f0000000440)=ANY=[@ANYBLOB="0100026e23ae", @ANYRES32=r6, @ANYBLOB="01000000000000002e2f66696c653000"]) pipe(&(0x7f0000000280)={0xffffffffffffffff}) r8 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sysvipc/sem\x00', 0x0, 0x0) r9 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_FSYNC={0x3, 0x1, 0x0, @fd=r8, 0x0, 0x0, 0x0, 0x1, 0x1, {0x0, r9}}, 0x8) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x2be, &(0x7f0000000540)=""/212, 0xd4, 0x10, 0x0, {0x0, r9}}, 0x5) fcntl$dupfd(r7, 0x0, r5) ioctl$SNDRV_TIMER_IOCTL_TREAD(r5, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:11:07 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) (fail_nth: 4) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) r7 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r7, {0x1}}, './file0\x00'}) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x0, r6) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:11:07 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, 0x0) 23:11:07 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="98000000200039040000000000000000020000000dc0c23671f1a964651e4d52c3dc9432e6af519d60c901a7ea83dce8f6a9c36adbbf7c23348ed7953cc124f0f2e2f1324bf1187b4e1f5a7bf5116e03f38056144e4fd6711849a6579e46004fbfb9ae80572129d57aa41a4c792b56978ebd2e72f57ca14145d7bcd879afed4e97abd691d56cf2d815f272170c0011000000000000000000bb3e3c7562af739c74b82fd57e7bd51e163e9c2394948632056b9357f234b64631cba457c59e6d0eae9098c89e3c7aa8b1cbc03bd674263161cff69945516e14595dfad881c353d7fb9bbdc2fb19f3306b4f29f5ac8dddb92ee4fe33f6e190dffd186aa055b9a9547a834f1d6190acda5d78a8cff254a2de72f20938d689ca4044e9b0a3ee3627818c70cc78d1fe11e55c898d61e09dd9cc4bdefd952f33d4697d06ffd93de78dd16ff6fabb99fb6b42eb449d317ff0f62c982878d984496c08a7a672102affbb245b18bb390e66298d7220110693dd4d00d4a7b9a75298857b75fa243b23c8cf9643bb00000000006dabf39491a19826dd17133c71e29784f2335028a747a6113ad6efdfbffa7205050056d0ee75b2f729232cc5bd028e654e69b60ba5313c46aa44ffefefa1dd182aa574a6fa732d6708584982012bb16aaceda807d810ad63ccfa5203bc3b2fac19fa9b5cd3d3f3e3cd43ced0a0870700adae78cb262f235c0401058ea209faecd0a5262bbda1d50def7cbef31c9b3ac3140d4741d25a4f0277c0ede8517e65b43a81d4e70e4f7c8f3e4c6b059a695c"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x20800) unshare(0x48020200) [ 1920.061737] FAULT_INJECTION: forcing a failure. [ 1920.061737] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1920.063037] CPU: 1 PID: 10090 Comm: syz-executor.6 Not tainted 5.10.225 #1 [ 1920.063642] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1920.064338] Call Trace: [ 1920.064565] dump_stack+0x107/0x167 [ 1920.064873] should_fail.cold+0x5/0xa [ 1920.065201] _copy_to_user+0x2e/0x180 [ 1920.065533] simple_read_from_buffer+0xcc/0x160 [ 1920.065933] proc_fail_nth_read+0x198/0x230 [ 1920.066316] ? proc_sessionid_read+0x230/0x230 [ 1920.066708] ? security_file_permission+0xb1/0xe0 [ 1920.067180] ? proc_sessionid_read+0x230/0x230 [ 1920.067574] vfs_read+0x228/0x620 [ 1920.067886] ksys_read+0x12d/0x260 [ 1920.068199] ? vfs_write+0xb10/0xb10 [ 1920.068525] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1920.068977] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1920.069420] do_syscall_64+0x33/0x40 [ 1920.069747] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1920.070177] RIP: 0033:0x7ff43098069c [ 1920.070505] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1920.072082] RSP: 002b:00007ff42df43170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1920.072735] RAX: ffffffffffffffda RBX: 0000000000000079 RCX: 00007ff43098069c [ 1920.073344] RDX: 000000000000000f RSI: 00007ff42df431e0 RDI: 0000000000000006 [ 1920.073947] RBP: 00007ff42df431d0 R08: 0000000000000000 R09: 0000000000000000 [ 1920.074545] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1920.075174] R13: 00007fff11e3285f R14: 00007ff42df43300 R15: 0000000000022000 23:11:07 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) dup2(r1, r1) r5 = syz_io_uring_complete(0x0) r6 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x37c}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r5, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r6, {0x1}}, './file0\x00'}) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r5) ioctl$SNDRV_TIMER_IOCTL_TREAD(r5, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') [ 1920.122931] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.1'. 23:11:20 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, 0x0) 23:11:20 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x20800) unshare(0x48020200) 23:11:20 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) dup2(r1, r1) r5 = syz_io_uring_complete(0x0) r6 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r5, 0xc018937c, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000d5436a04fe403ce3216b4dd1dfd76272463ecbb054f78efa4aa0cb23ec94a87b430700d55e0b07ee264b6c0b039f4e48c672251d170e314220f7969a3c21ada31c3015104d9b2754658d397c97e5c39a5bdd9f6464ee373182b42aa1dff075ef226ab27ad7cbbfcf3deaddb084884f963bf1f8188ff8c9176089d6d498b8b2c5a5c4e94a8f7d9d50bab7d9b499bb79cadb9c13df647ca759104b175801715a89b76890287f3901216d14b7bb901ba672363a8faf45018e5507d0cb551634ca1e0de261f0da82c87e8f3056390aa75ae4dfe280a0fa822c76b2e2acf3a133f51cb5f7300000000000", @ANYRES32=r6, @ANYBLOB="01000000000000002e2f66696c653000"]) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r5) ioctl$SNDRV_TIMER_IOCTL_TREAD(r5, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:11:20 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(0x0, &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) add_key$keyring(&(0x7f0000000740), &(0x7f0000000780)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) unshare(0x48020200) 23:11:20 executing program 7: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0x1a) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:11:20 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x3, 0xffffffffffffffff, 0x5) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9c000000", @ANYRES16=0x0, @ANYBLOB="010027bd7000fcdbdf25040000003423baa10c00038008000300000000004400d841ac257b65d0be0000080004009600000006000f00faff000005000d00010000000800080400010000260002004e2400000800030000000000080003000300000008000600070000000800060037000000240073697000060002008700000008000b00732469700e4565e4fdc80a2f07f900"/160], 0x9c}, 0x1, 0x0, 0x0, 0x48000}, 0x4004) read(r0, &(0x7f00000002c0)=""/225, 0xe1) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = dup2(r2, r1) lseek(r3, 0x7, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r4, r3, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r4, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 23:11:20 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x3, 0xffffffffffffffff, 0x5) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9c000000", @ANYRES16=0x0, @ANYBLOB="010027bd7000fcdbdf25040000003423baa10c00038008000300000000004400d841ac257b65d0be0000080004009600000006000f00faff000005000d00010000000800080400010000260002004e2400000800030000000000080003000300000008000600070000000800060037000000240073697000060002008700000008000b00732469700e4565e4fdc80a2f07f900"/160], 0x9c}, 0x1, 0x0, 0x0, 0x48000}, 0x4004) read(r0, &(0x7f00000002c0)=""/225, 0xe1) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = dup2(r2, r1) lseek(r3, 0x7, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r4, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:11:20 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) r7 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r7, {0x1}}, './file0\x00'}) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x0, r6) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') [ 1933.275141] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1933.277508] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.0'. 23:11:21 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0x1a) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) r7 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r7, {0x1}}, './file0\x00'}) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x0, r6) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:11:21 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, 0x0) 23:11:21 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x3, 0xffffffffffffffff, 0x5) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9c000000", @ANYRES16=0x0, @ANYBLOB="010027bd7000fcdbdf25040000003423baa10c00038008000300000000004400d841ac257b65d0be0000080004009600000006000f00faff000005000d00010000000800080400010000260002004e2400000800030000000000080003000300000008000600070000000800060037000000240073697000060002008700000008000b00732469700e4565e4fdc80a2f07f900"/160], 0x9c}, 0x1, 0x0, 0x0, 0x48000}, 0x4004) read(r0, &(0x7f00000002c0)=""/225, 0xe1) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = dup2(r2, r1) lseek(r3, 0x7, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r4, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:11:21 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000540)={0x128, 0x1d, 0x400, 0x70bd2d, 0x25dfdbfc, {0xc}, [@nested={0x114, 0xd, 0x0, 0x1, [@generic="cc74a59e06c42d2b9126e71947930bab3d40fee85c81fb5d378c108a8c84617af5a01bc8fb", @generic="fd84626ba8e5dfb08df47123bd8492b0ece87d1976036be543c689b4835b231a79a4fd4911cb40d15845fa99ae4ac9c9b8426e1a64b374d9e8beb968a8e64881ae5c76087e0ca4edb40ce06daf14bb71f1f10f7f81738b77873d228dfe7fe9dcedc0e04fa3a53bcd00400cff4e7ee92c914db347f09062c6aa51d7a8", @typed={0x4, 0x19}, @generic="86bd3d4e66801864457bcd82a97652091529a5f02c865ab4dd9599a0a9d1a401b44c7c49924b48a05f1dd9838f206a27d867d7c768cc4797d5c9e89aaab25e40c4465106af80d95e9a65655ac7191e23d08f0aff8f3dc84857b306e2725ae95143e459c0a190f2bebfbd47"]}]}, 0x128}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') dup2(0xffffffffffffffff, 0xffffffffffffffff) read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) dup2(r1, r1) r5 = syz_io_uring_complete(0x0) r6 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x25a}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r5, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r6, {0x1}}, './file0\x00'}) pipe(&(0x7f0000000280)={0xffffffffffffffff}) r8 = open(&(0x7f0000000100)='./file0\x00', 0x40040, 0xa) fcntl$dupfd(r7, 0x0, r5) sendmsg$NFT_MSG_GETCHAIN(r8, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000200)={0x50, 0x4, 0xa, 0x101, 0x0, 0x0, {0x7, 0x0, 0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x3}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_COUNTERS={0x4}]}, 0x50}, 0x1, 0x0, 0x0, 0x24000000}, 0x4040000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r5, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:11:21 executing program 7: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0x2f) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:11:21 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) add_key$keyring(&(0x7f0000000740), &(0x7f0000000780)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) unshare(0x48020200) 23:11:21 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000640)={[{@nr_inodes={'nr_inodes', 0x3d, [0x36, 0x0, 0x6b, 0x38, 0x31, 0x6d, 0x30, 0x6d, 0x5d, 0x67]}}, {@huge_never}, {@huge_always}, {@huge_within_size}, {@mode}, {@size={'size', 0x3d, [0x32, 0x70, 0x74, 0x37, 0x32, 0x78]}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '#'}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}, {@measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}]}) [ 1933.524628] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.0'. 23:11:21 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x3, 0xffffffffffffffff, 0x5) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9c000000", @ANYRES16=0x0, @ANYBLOB="010027bd7000fcdbdf25040000003423baa10c00038008000300000000004400d841ac257b65d0be0000080004009600000006000f00faff000005000d00010000000800080400010000260002004e2400000800030000000000080003000300000008000600070000000800060037000000240073697000060002008700000008000b00732469700e4565e4fdc80a2f07f900"/160], 0x9c}, 0x1, 0x0, 0x0, 0x48000}, 0x4004) read(r0, &(0x7f00000002c0)=""/225, 0xe1) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = dup2(r2, r1) lseek(r3, 0x7, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r4, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:11:21 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0x2f) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) r7 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r7, {0x1}}, './file0\x00'}) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x0, r6) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:11:21 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x20800) unshare(0x48020200) 23:11:21 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) lseek(0xffffffffffffffff, 0x7, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x7ffffff9) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) r4 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$SG_IO(r5, 0x1274, 0x0) dup2(r1, r1) r6 = syz_io_uring_complete(0x0) r7 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000440)=ANY=[@ANYBLOB="120ff978", @ANYRES32=r7, @ANYBLOB="01000000000000002e2f66696c653000"]) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r8, 0x0, r6) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:11:21 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000640)={[{@nr_inodes={'nr_inodes', 0x3d, [0x36, 0x0, 0x6b, 0x38, 0x31, 0x6d, 0x30, 0x6d, 0x5d, 0x67]}}, {@huge_never}, {@huge_always}, {@huge_within_size}, {@mode}], [{@smackfstransmute={'smackfstransmute', 0x3d, '#'}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}, {@measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}]}) [ 1933.612024] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.1'. 23:11:21 executing program 7: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0x4c) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:11:21 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x3, 0xffffffffffffffff, 0x5) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9c000000", @ANYRES16=0x0, @ANYBLOB="010027bd7000fcdbdf25040000003423baa10c00038008000300000000004400d841ac257b65d0be0000080004009600000006000f00faff000005000d00010000000800080400010000260002004e2400000800030000000000080003000300000008000600070000000800060037000000240073697000060002008700000008000b00732469700e4565e4fdc80a2f07f900"/160], 0x9c}, 0x1, 0x0, 0x0, 0x48000}, 0x4004) read(r0, &(0x7f00000002c0)=""/225, 0xe1) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = dup2(r2, r1) lseek(r3, 0x7, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r4, r3, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r4, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 23:11:21 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x3, 0xffffffffffffffff, 0x5) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9c000000", @ANYRES16=0x0, @ANYBLOB="010027bd7000fcdbdf25040000003423baa10c00038008000300000000004400d841ac257b65d0be0000080004009600000006000f00faff000005000d00010000000800080400010000260002004e2400000800030000000000080003000300000008000600070000000800060037000000240073697000060002008700000008000b00732469700e4565e4fdc80a2f07f900"/160], 0x9c}, 0x1, 0x0, 0x0, 0x48000}, 0x4004) read(r0, &(0x7f00000002c0)=""/225, 0xe1) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = dup2(r2, r1) lseek(r3, 0x7, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:11:21 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0x4c) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) r7 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r7, {0x1}}, './file0\x00'}) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x0, r6) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:11:21 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x3, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') dup2(0xffffffffffffffff, 0xffffffffffffffff) read(0xffffffffffffffff, &(0x7f00000001c0)=""/139, 0x8b) read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000040)={&(0x7f0000000540)=ANY=[@ANYBLOB="4004382a", @ANYRES16=0x0, @ANYBLOB="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"], 0x440}, 0x1, 0x0, 0x0, 0x8090}, 0x4000000) dup2(r1, r1) r5 = syz_io_uring_complete(0x0) io_uring_setup(0x3345, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x4000003, 0x175}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r5, 0xc018937c, &(0x7f00000003c0)=ANY=[@ANYBLOB="010000f6a825570018000000", @ANYRESOCT=r3, @ANYBLOB="01000000000000002e2f66696c653000"]) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r6, 0x0, r5) ioctl$SNDRV_TIMER_IOCTL_TREAD(r5, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000100)='oom_score\x00') 23:11:21 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000640)={[{@nr_inodes={'nr_inodes', 0x3d, [0x36, 0x0, 0x6b, 0x38, 0x31, 0x6d, 0x30, 0x6d, 0x5d, 0x67]}}, {@huge_never}, {@huge_always}, {@huge_within_size}], [{@smackfstransmute={'smackfstransmute', 0x3d, '#'}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}, {@measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}]}) 23:11:21 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x3, 0xffffffffffffffff, 0x5) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9c000000", @ANYRES16=0x0, @ANYBLOB="010027bd7000fcdbdf25040000003423baa10c00038008000300000000004400d841ac257b65d0be0000080004009600000006000f00faff000005000d00010000000800080400010000260002004e2400000800030000000000080003000300000008000600070000000800060037000000240073697000060002008700000008000b00732469700e4565e4fdc80a2f07f900"/160], 0x9c}, 0x1, 0x0, 0x0, 0x48000}, 0x4004) read(r0, &(0x7f00000002c0)=""/225, 0xe1) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = dup2(r2, r1) lseek(r3, 0x7, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:11:21 executing program 7: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0x62) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:11:21 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0x62) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) r7 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r7, {0x1}}, './file0\x00'}) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x0, r6) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:11:39 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) unshare(0x48020200) 23:11:39 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) add_key$keyring(&(0x7f0000000740), &(0x7f0000000780)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) unshare(0x48020200) [ 1952.266128] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.1'. 23:11:39 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x3, 0xffffffffffffffff, 0x5) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9c000000", @ANYRES16=0x0, @ANYBLOB="010027bd7000fcdbdf25040000003423baa10c00038008000300000000004400d841ac257b65d0be0000080004009600000006000f00faff000005000d00010000000800080400010000260002004e2400000800030000000000080003000300000008000600070000000800060037000000240073697000060002008700000008000b00732469700e4565e4fdc80a2f07f900"/160], 0x9c}, 0x1, 0x0, 0x0, 0x48000}, 0x4004) read(r0, &(0x7f00000002c0)=""/225, 0xe1) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = dup2(r2, r1) lseek(r3, 0x7, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r4, r3, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r4, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) [ 1952.272262] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.0'. 23:11:39 executing program 7: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0x79) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:11:39 executing program 5: ioctl$FAT_IOCTL_GET_ATTRIBUTES(0xffffffffffffffff, 0x80047210, &(0x7f0000000180)) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r1, &(0x7f00000002c0)=""/225, 0xe1) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$SG_IO(r3, 0x1274, 0x0) dup2(r0, r0) r4 = syz_io_uring_complete(0x0) r5 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000540)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r5, @ANYBLOB="01000000000000002e2f66696c653000b04709316eccb9451bf1cce191057b2341c865ebf215c2a73ae7f1e4d445d5066f739d1127bf2ff72efa94b675c7bdeade91d759a33492ea0594097b3d692b24f018c94c878cce7fda42de46d349155f85144b599b12cf82ebda62e45d38c3432ae37f5bbae74d2820aac0b2966d69161301472eb5357ddfe77b8f7402bb7502007c8a0a93ddb8c6b7503fca0e4b9230a1a79fd2a7af6daa339656e93ff069"]) pipe(&(0x7f0000000280)={0xffffffffffffffff}) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x0, 0x0, 0x0, '\x00', [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, 0x1e) fcntl$dupfd(r6, 0x0, r4) ioctl$SNDRV_TIMER_IOCTL_TREAD(r4, 0x40045402, &(0x7f0000000480)=0x1) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r8 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r8, r7) sendmsg$DEVLINK_CMD_SB_POOL_GET(r8, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000040)={&(0x7f00000001c0)={0x9c, 0x0, 0x100, 0x1ff, 0x25dfdbfe, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x4}, {0x6, 0x11, 0x81}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xd1}, {0x6}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0xfff}, {0x6, 0x11, 0x7800}}]}, 0x9c}, 0x1, 0x0, 0x0, 0x40420c1}, 0x2000c804) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:11:39 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000640)={[{@nr_inodes={'nr_inodes', 0x3d, [0x36, 0x0, 0x6b, 0x38, 0x31, 0x6d, 0x30, 0x6d, 0x5d, 0x67]}}, {@huge_never}, {@huge_always}], [{@smackfstransmute={'smackfstransmute', 0x3d, '#'}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}, {@measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}]}) 23:11:39 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0x79) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) r7 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r7, {0x1}}, './file0\x00'}) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x0, r6) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:11:39 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x3, 0xffffffffffffffff, 0x5) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9c000000", @ANYRES16=0x0, @ANYBLOB="010027bd7000fcdbdf25040000003423baa10c00038008000300000000004400d841ac257b65d0be0000080004009600000006000f00faff000005000d00010000000800080400010000260002004e2400000800030000000000080003000300000008000600070000000800060037000000240073697000060002008700000008000b00732469700e4565e4fdc80a2f07f900"/160], 0x9c}, 0x1, 0x0, 0x0, 0x48000}, 0x4004) read(r0, &(0x7f00000002c0)=""/225, 0xe1) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = dup2(r2, r1) lseek(r3, 0x7, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:11:40 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x3, 0xffffffffffffffff, 0x5) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9c000000", @ANYRES16=0x0, @ANYBLOB="010027bd7000fcdbdf25040000003423baa10c00038008000300000000004400d841ac257b65d0be0000080004009600000006000f00faff000005000d00010000000800080400010000260002004e2400000800030000000000080003000300000008000600070000000800060037000000240073697000060002008700000008000b00732469700e4565e4fdc80a2f07f900"/160], 0x9c}, 0x1, 0x0, 0x0, 0x48000}, 0x4004) read(r0, &(0x7f00000002c0)=""/225, 0xe1) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = dup2(r2, r1) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r4, r3, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r4, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:11:40 executing program 7: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xf9) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:11:40 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000640)={[{@nr_inodes={'nr_inodes', 0x3d, [0x36, 0x0, 0x6b, 0x38, 0x31, 0x6d, 0x30, 0x6d, 0x5d, 0x67]}}, {@huge_never}], [{@smackfstransmute={'smackfstransmute', 0x3d, '#'}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}, {@measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}]}) 23:11:40 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xf9) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) r7 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r7, {0x1}}, './file0\x00'}) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x0, r6) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:11:40 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000200), 0x8}, 0x4000, 0x1, 0x0, 0x0, 0x0, 0xa418b6d, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = accept4(r2, &(0x7f0000000000)=@ieee802154, &(0x7f00000000c0)=0x80, 0x800) fcntl$dupfd(r2, 0x406, r3) r4 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$SG_IO(r5, 0x1274, 0x0) dup2(r1, r1) r6 = syz_io_uring_complete(0x0) r7 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000440)=ANY=[@ANYBLOB="010664d0b800030000004328", @ANYRES32=r7, @ANYBLOB="01000000000002002e2f66696c653000"]) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r8, 0x0, r6) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000100)='wg2\x00', 0x4) 23:11:53 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="98000000200039040000000000000000020000000dc0c23671f1a964651e4d52c3dc9432e6af519d60c901a7ea83dce8f6a9c36adbbf7c23348ed7953cc124f0f2e2f1324bf1187b4e1f5a7bf5116e03f38056144e4fd6711849a6579e46004fbfb9ae80572129d57aa41a4c792b56978ebd2e72f57ca14145d7bcd879afed4e97abd691d56cf2d815f272170c0011000000000000000000bb3e3c7562af739c74b82fd57e7bd51e163e9c2394948632056b9357f234b64631cba457c59e6d0eae9098c89e3c7aa8b1cbc03bd674263161cff69945516e14595dfad881c353d7fb9bbdc2fb19f3306b4f29f5ac8dddb92ee4fe33f6e190dffd186aa055b9a9547a834f1d6190acda5d78a8cff254a2de72f20938d689ca4044e9b0a3ee3627818c70cc78d1fe11e55c898d61e09dd9cc4bdefd952f33d4697d06ffd93de78dd16ff6fabb99fb6b42eb449d317ff0f62c982878d984496c08a7a672102affbb245b18bb390e66298d7220110693dd4d00d4a7b9a75298857b75fa243b23c8cf9643bb00000000006dabf39491a19826dd17133c71e29784f2335028a747a6113ad6efdfbffa7205050056d0ee75b2f729232cc5bd028e654e69b60ba5313c46aa44ffefefa1dd182aa574a6fa732d6708584982012bb16aaceda807d810ad63ccfa5203bc3b2fac19fa9b5cd3d3f3e3cd43ced0a0870700adae78cb262f235c0401058ea209faecd0a5262bbda1d50def7cbef31c9b3ac3140d4741d25a4f0277c0ede8517e65b43a81d4e70e4f7c8f3e4c6b059a695c"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) unshare(0x48020200) [ 1965.957257] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1965.981625] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.0'. 23:11:53 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x3, 0xffffffffffffffff, 0x5) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9c000000", @ANYRES16=0x0, @ANYBLOB="010027bd7000fcdbdf25040000003423baa10c00038008000300000000004400d841ac257b65d0be0000080004009600000006000f00faff000005000d00010000000800080400010000260002004e2400000800030000000000080003000300000008000600070000000800060037000000240073697000060002008700000008000b00732469700e4565e4fdc80a2f07f900"/160], 0x9c}, 0x1, 0x0, 0x0, 0x48000}, 0x4004) read(r0, &(0x7f00000002c0)=""/225, 0xe1) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = dup2(r2, r1) lseek(r3, 0x7, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r4, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:11:53 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) dup2(r1, r1) r5 = syz_io_uring_complete(0x0) r6 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r5, 0xc018937c, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r6, @ANYBLOB="af3410a2063090dc2d210ce240010000000000000019b8d9f2db2f667a"]) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r5) ioctl$SNDRV_TIMER_IOCTL_TREAD(r5, 0x40045402, &(0x7f0000000480)=0x1) lseek(0xffffffffffffffff, 0x7, 0x0) r8 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r8, 0xffffffffffffffff, 0x0, 0x7ffffff9) flock(0xffffffffffffffff, 0x4) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:11:53 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x3, 0xffffffffffffffff, 0x5) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9c000000", @ANYRES16=0x0, @ANYBLOB="010027bd7000fcdbdf25040000003423baa10c00038008000300000000004400d841ac257b65d0be0000080004009600000006000f00faff000005000d00010000000800080400010000260002004e2400000800030000000000080003000300000008000600070000000800060037000000240073697000060002008700000008000b00732469700e4565e4fdc80a2f07f900"/160], 0x9c}, 0x1, 0x0, 0x0, 0x48000}, 0x4004) read(r0, &(0x7f00000002c0)=""/225, 0xe1) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:11:53 executing program 7: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0x200003a1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:11:53 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000640)={[{@nr_inodes={'nr_inodes', 0x3d, [0x36, 0x0, 0x6b, 0x38, 0x31, 0x6d, 0x30, 0x6d, 0x5d, 0x67]}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '#'}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}, {@measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}]}) 23:11:53 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0x200003a1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) r7 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r7, {0x1}}, './file0\x00'}) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x0, r6) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:11:53 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) add_key$keyring(&(0x7f0000000740), &(0x7f0000000780)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) unshare(0x48020200) 23:12:06 executing program 7: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) write$binfmt_elf64(r5, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"/967], 0x3c7) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:12:06 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x3, 0xffffffffffffffff, 0x5) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9c000000", @ANYRES16=0x0, @ANYBLOB="010027bd7000fcdbdf25040000003423baa10c00038008000300000000004400d841ac257b65d0be0000080004009600000006000f00faff000005000d00010000000800080400010000260002004e2400000800030000000000080003000300000008000600070000000800060037000000240073697000060002008700000008000b00732469700e4565e4fdc80a2f07f900"/160], 0x9c}, 0x1, 0x0, 0x0, 0x48000}, 0x4004) read(r0, &(0x7f00000002c0)=""/225, 0xe1) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:12:06 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x3, 0xffffffffffffffff, 0x5) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9c000000", @ANYRES16=0x0, @ANYBLOB="010027bd7000fcdbdf25040000003423baa10c00038008000300000000004400d841ac257b65d0be0000080004009600000006000f00faff000005000d00010000000800080400010000260002004e2400000800030000000000080003000300000008000600070000000800060037000000240073697000060002008700000008000b00732469700e4565e4fdc80a2f07f900"/160], 0x9c}, 0x1, 0x0, 0x0, 0x48000}, 0x4004) read(r0, &(0x7f00000002c0)=""/225, 0xe1) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = dup2(r2, r1) lseek(r3, 0x7, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r4, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:12:06 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffff0000, 0x7}, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) r7 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) lseek(0xffffffffffffffff, 0x7, 0x0) r8 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r8, 0xffffffffffffffff, 0x0, 0x7ffffff9) dup2(0xffffffffffffffff, r7) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r7, {0x1}}, './file0\x00'}) write$binfmt_elf64(r5, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"/967], 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x0, r6) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:12:06 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000640)={[], [{@smackfstransmute={'smackfstransmute', 0x3d, '#'}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}, {@measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}]}) 23:12:06 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000001c0), 0x20541, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) pidfd_open(r2, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r2}) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x9, 0x7f, 0xff, 0xfd, 0x0, 0x80000001, 0x84003, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_config_ext={0x7, 0x5}, 0x8000, 0x4, 0x8, 0x9, 0x2, 0x7, 0x5, 0x0, 0xfffff001, 0x0, 0x54}, r2, 0x8, r1, 0x3) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r3, &(0x7f00000002c0)=""/225, 0xe1) r4 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$SG_IO(r5, 0x1274, 0x0) dup2(r1, r1) r6 = syz_io_uring_complete(0x0) r7 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e7129430100006376ff0b6420f1414bd67681be85dc794c502352f71f6b84950847e0a6a6b3c6e0caf7346c968cb42b98878c98359d52e882702ada5600", @ANYRES32=r7, @ANYBLOB="01000000000000002e2f66696c653000"]) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r8, 0x0, r6) ioctl$SNDRV_TIMER_IOCTL_TREAD(r3, 0x40045402, &(0x7f0000000480)=0x80000001) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:12:06 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) unshare(0x48020200) 23:12:06 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) add_key$keyring(&(0x7f0000000740), &(0x7f0000000780)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) unshare(0x48020200) [ 1979.136048] tmpfs: Unknown parameter 'smackfstransmute' [ 1979.136193] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.0'. 23:12:06 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) r7 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000440)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r7, @ANYBLOB="81de2d2f66331ebaacf4"]) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x0, r6) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:12:06 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000640)={[], [{@smackfstransmute={'smackfstransmute', 0x3d, '#'}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}, {@measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}]}) 23:12:06 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x3, 0xffffffffffffffff, 0x5) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9c000000", @ANYRES16=0x0, @ANYBLOB="010027bd7000fcdbdf25040000003423baa10c00038008000300000000004400d841ac257b65d0be0000080004009600000006000f00faff000005000d00010000000800080400010000260002004e2400000800030000000000080003000300000008000600070000000800060037000000240073697000060002008700000008000b00732469700e4565e4fdc80a2f07f900"/160], 0x9c}, 0x1, 0x0, 0x0, 0x48000}, 0x4004) read(r0, &(0x7f00000002c0)=""/225, 0xe1) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) [ 1979.189967] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.1'. 23:12:06 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x3, 0xffffffffffffffff, 0x5) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9c000000", @ANYRES16=0x0, @ANYBLOB="010027bd7000fcdbdf25040000003423baa10c00038008000300000000004400d841ac257b65d0be0000080004009600000006000f00faff000005000d00010000000800080400010000260002004e2400000800030000000000080003000300000008000600070000000800060037000000240073697000060002008700000008000b00732469700e4565e4fdc80a2f07f900"/160], 0x9c}, 0x1, 0x0, 0x0, 0x48000}, 0x4004) read(r0, &(0x7f00000002c0)=""/225, 0xe1) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = dup2(r2, r1) lseek(r3, 0x7, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r4, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:12:06 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000540)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r5, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x1, 0x0, @fd_index=0x7, 0x1, 0x0, 0x5, 0x4, 0x1, {0x0, r7}}, 0x4) r8 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r8, {0x1}}, './file0\x00'}) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r9, 0x0, r6) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') [ 1979.236987] tmpfs: Unknown parameter 'smackfstransmute' 23:12:06 executing program 7: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) ioctl$SG_IO(r5, 0x2285, &(0x7f00000003c0)={0x0, 0xfffffffffffffffd, 0x76, 0x7, @buffer={0x0, 0x65, &(0x7f00000000c0)=""/101}, &(0x7f00000001c0)="17ac6369adccb588023ea3ce3af604f24229386830941479a7443ac05ad78c373ee2d350fc0e4eabd5521d58c86e487c0807de96320313a017e895aeb324518b47d1a706261647ceb0de393b3103c374661de07f6e56e8638ff8294fe59e4ddd09a1dfa5429175dccc4d5188630a6394f8745acd82bd", &(0x7f0000000040)=""/26, 0x9, 0x10020, 0x2, &(0x7f0000000240)}) r6 = syz_io_uring_complete(0x0) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) write$binfmt_elf64(r5, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x3c7) pipe(&(0x7f0000000280)={0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) ioctl$sock_SIOCGIFINDEX_80211(r8, 0x8933, &(0x7f0000000580)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x2a0401}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x40, 0x0, 0x400, 0x70bd26, 0x25dfdbff, {{}, {@val={0x8, 0x3, r9}, @val={0xc, 0x99, {0x4, 0x3a}}}}, [@NL80211_ATTR_KEY_DEFAULT_TYPES={0xc, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}]}, @NL80211_ATTR_KEY_SEQ={0x9, 0xa, "905c9824c3"}]}, 0x40}, 0x1, 0x0, 0x0, 0x4008080}, 0x40094) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:12:07 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000640)={[], [{@smackfstransmute={'smackfstransmute', 0x3d, '#'}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}, {@measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}]}) [ 1979.325676] tmpfs: Unknown parameter 'smackfstransmute' 23:12:07 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x3, 0xffffffffffffffff, 0x5) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9c000000", @ANYRES16=0x0, @ANYBLOB="010027bd7000fcdbdf25040000003423baa10c00038008000300000000004400d841ac257b65d0be0000080004009600000006000f00faff000005000d00010000000800080400010000260002004e2400000800030000000000080003000300000008000600070000000800060037000000240073697000060002008700000008000b00732469700e4565e4fdc80a2f07f900"/160], 0x9c}, 0x1, 0x0, 0x0, 0x48000}, 0x4004) read(r0, &(0x7f00000002c0)=""/225, 0xe1) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = dup2(0xffffffffffffffff, r1) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:12:20 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000640)={[{@nr_inodes={'nr_inodes', 0x3d, [0x36, 0x0, 0x6b, 0x38, 0x31, 0x6d, 0x30, 0x6d, 0x5d]}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '#'}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}, {@measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}]}) 23:12:20 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x3, 0xffffffffffffffff, 0x5) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9c000000", @ANYRES16=0x0, @ANYBLOB="010027bd7000fcdbdf25040000003423baa10c00038008000300000000004400d841ac257b65d0be0000080004009600000006000f00faff000005000d00010000000800080400010000260002004e2400000800030000000000080003000300000008000600070000000800060037000000240073697000060002008700000008000b00732469700e4565e4fdc80a2f07f900"/160], 0x9c}, 0x1, 0x0, 0x0, 0x48000}, 0x4004) read(r0, &(0x7f00000002c0)=""/225, 0xe1) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = dup2(r2, r1) lseek(r3, 0x7, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:12:20 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x3, 0xffffffffffffffff, 0x5) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9c000000", @ANYRES16=0x0, @ANYBLOB="010027bd7000fcdbdf25040000003423baa10c00038008000300000000004400d841ac257b65d0be0000080004009600000006000f00faff000005000d00010000000800080400010000260002004e2400000800030000000000080003000300000008000600070000000800060037000000240073697000060002008700000008000b00732469700e4565e4fdc80a2f07f900"/160], 0x9c}, 0x1, 0x0, 0x0, 0x48000}, 0x4004) read(r0, &(0x7f00000002c0)=""/225, 0xe1) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = dup2(0xffffffffffffffff, r1) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:12:20 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) unshare(0x48020200) 23:12:20 executing program 7: ioctl$FAT_IOCTL_GET_ATTRIBUTES(0xffffffffffffffff, 0x80047210, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x8, 0x0, 0x0, 0xf, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x4, @perf_config_ext={0xf906, 0xffffffffffffff75}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d, 0x5, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) pread64(r0, &(0x7f0000000280)=""/178, 0xb2, 0x9028) pread64(r0, &(0x7f0000000340), 0x0, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x10b6) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000020100000001000000004080000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x402}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000080000dff46552e0f465dfe0f4655f000000000000040004", 0x1d, 0x2100}], 0x3b84d5590da9fa74, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x686beb89}}, './file0\x00'}) setsockopt$IPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x41, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x3f, 0x0, 0x0, 0x0, 0x751, 0xd175, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x56039296}, 0x4002, 0x0, 0x3, 0x7, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000380)={0x83, 0xfffffe00, 0xfffffffc, 0x1, 0x0, 0x6}) ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000180)) ftruncate(0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) 23:12:20 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) dup2(r1, r1) r5 = syz_io_uring_complete(0x0) r6 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r5, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r6, {0x1}}, './file0\x00'}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = accept4$inet6(r8, 0x0, &(0x7f0000000000), 0x800) dup3(r9, r6, 0x80000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7ffffff9) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$dupfd(r7, 0x0, r5) ioctl$SNDRV_TIMER_IOCTL_TREAD(r5, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000040)='net/ptype\x00') 23:12:20 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') r3 = syz_open_dev$vcsu(&(0x7f0000000000), 0xfb9, 0x501000) open_tree(r3, &(0x7f0000000040)='./file0\x00', 0x100) read(r2, &(0x7f00000002c0)=""/225, 0xe1) r4 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$SG_IO(r5, 0x1274, 0x0) r6 = dup2(r1, r1) r7 = syz_io_uring_complete(0x0) r8 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r7}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r7, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r8, {0x1}}, './file0\x00'}) write$binfmt_elf64(r6, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x0, r7) ioctl$SNDRV_TIMER_IOCTL_TREAD(r7, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:12:20 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) add_key$keyring(&(0x7f0000000740), &(0x7f0000000780)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) unshare(0x48020200) [ 1993.063629] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1993.078215] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.1'. 23:12:20 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x3, 0xffffffffffffffff, 0x5) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9c000000", @ANYRES16=0x0, @ANYBLOB="010027bd7000fcdbdf25040000003423baa10c00038008000300000000004400d841ac257b65d0be0000080004009600000006000f00faff000005000d00010000000800080400010000260002004e2400000800030000000000080003000300000008000600070000000800060037000000240073697000060002008700000008000b00732469700e4565e4fdc80a2f07f900"/160], 0x9c}, 0x1, 0x0, 0x0, 0x48000}, 0x4004) read(r0, &(0x7f00000002c0)=""/225, 0xe1) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = dup2(0xffffffffffffffff, r1) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:12:20 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x3, 0xffffffffffffffff, 0x5) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9c000000", @ANYRES16=0x0, @ANYBLOB="010027bd7000fcdbdf25040000003423baa10c00038008000300000000004400d841ac257b65d0be0000080004009600000006000f00faff000005000d00010000000800080400010000260002004e2400000800030000000000080003000300000008000600070000000800060037000000240073697000060002008700000008000b00732469700e4565e4fdc80a2f07f900"/160], 0x9c}, 0x1, 0x0, 0x0, 0x48000}, 0x4004) read(r0, &(0x7f00000002c0)=""/225, 0xe1) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = dup2(r2, r1) lseek(r3, 0x7, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:12:20 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000640)={[{@nr_inodes={'nr_inodes', 0x3d, [0x36, 0x0, 0x6b, 0x38, 0x31, 0x6d, 0x30, 0x6d]}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '#'}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}, {@measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}]}) 23:12:20 executing program 7: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x2000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:12:20 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) dup2(r1, r1) r5 = syz_io_uring_complete(0x0) r6 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r5, 0xc018937c, &(0x7f00000001c0)=ANY=[@ANYBLOB="2101000001000000ff3100005756ec85ab32ab3dd34ed92c9c7b349507e00f5bec027f261fc20cbf4c5147450eb5b05143b5d269c70c8d15b88aac6f31", @ANYRES32=r6, @ANYBLOB="01000000000000002e2f66696c653000"]) pipe(&(0x7f0000000280)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r8 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r8, r7) fcntl$dupfd(r8, 0x406, r5) ioctl$SNDRV_TIMER_IOCTL_TREAD(r5, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:12:20 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000bc0)="c134f223b2d79da52804da4ef16ebfc633e5d6aa4b4f5616dd6329ef1db2ac0d59b03b9bb16f06e2bb6dd1ed8cab393630ac10da022aae356a4bb00b0b91fe24a56133d12e2c2686d211fb5860a095e8a9e47c424a2c571548754a8d05ba081a1b138bcb3fbb6984556e4f7815934685aceb5d11c147d5a494e26478626c3d6e69a6efe762bb207ceb", 0x89}, {&(0x7f00000003c0)="7fc5a0bb13fd04ac11a09ffebcce4da89616d69746e35cbbbb61a41987d13edc418a51", 0x23}, {&(0x7f0000000540)="948e65d5319a609e1a958ce7c03646e43ce389bd7deb3b585b653801edd40cdd7e6f925417bb8a5b8d28116e46b26881904ed16ddc17c6a65c880f4e1ab2ebdec052ed9a73cfa7af19ab6530e8e55cd4a0f8da2bcd500981559a97bfa3365722374f5d03f0b6f4a5b0233dd3766b59d7409aaa51fb6b2ba30ff739f4418ebfb1e917ac08cb5025ffb378536208ab78630d47851c0b6bbd1276b005a052e9de3fdef45f84aaaf0cfc033e90546d263391a24b41a3ff46c92fa7797316dc7ead4e7016d31c4101b1a236e86e34d9c1c90f0e7aa35038fb3f96d5c3f93878c11d24ee9080debfbbf58669ba91373887cac4ab83254d569b377e9c8237", 0xfb}, {&(0x7f0000000400)="126fde00d6ee930c3b208b07f15e59947dd633359d3e0d1a81", 0x19}], 0x4, &(0x7f00000006c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}], 0x20, 0x4000884}, 0x8881) r7 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuset.effective_cpus\x00', 0x0, 0x0) sendmsg$AUDIT_TTY_GET(r7, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x3f8, 0x200, 0x1, 0x25dfdbfe, "", ["", "", "", "", "", "", "", "", ""]}, 0x10}}, 0x40800) r8 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0x8000c7e7, 0x1, 0x3, 0x175, 0x0, r6}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r8, {0x1}}, './file0\x00'}) write$binfmt_elf64(r5, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"/967], 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x0, r6) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000)=0x5, 0x4) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:12:20 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) unshare(0x48020200) 23:12:21 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) add_key$keyring(&(0x7f0000000740), &(0x7f0000000780)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) unshare(0x48020200) 23:12:21 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x3, 0xffffffffffffffff, 0x5) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9c000000", @ANYRES16=0x0, @ANYBLOB="010027bd7000fcdbdf25040000003423baa10c00038008000300000000004400d841ac257b65d0be0000080004009600000006000f00faff000005000d00010000000800080400010000260002004e2400000800030000000000080003000300000008000600070000000800060037000000240073697000060002008700000008000b00732469700e4565e4fdc80a2f07f900"/160], 0x9c}, 0x1, 0x0, 0x0, 0x48000}, 0x4004) read(r0, &(0x7f00000002c0)=""/225, 0xe1) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) [ 1993.309641] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1993.351954] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.0'. 23:12:21 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x3, 0xffffffffffffffff, 0x5) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9c000000", @ANYRES16=0x0, @ANYBLOB="010027bd7000fcdbdf25040000003423baa10c00038008000300000000004400d841ac257b65d0be0000080004009600000006000f00faff000005000d00010000000800080400010000260002004e2400000800030000000000080003000300000008000600070000000800060037000000240073697000060002008700000008000b00732469700e4565e4fdc80a2f07f900"/160], 0x9c}, 0x1, 0x0, 0x0, 0x48000}, 0x4004) read(r0, &(0x7f00000002c0)=""/225, 0xe1) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = dup2(r2, r1) lseek(r3, 0x7, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:12:21 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x3, 0xffffffffffffffff, 0x5) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9c000000", @ANYRES16=0x0, @ANYBLOB="010027bd7000fcdbdf25040000003423baa10c00038008000300000000004400d841ac257b65d0be0000080004009600000006000f00faff000005000d00010000000800080400010000260002004e2400000800030000000000080003000300000008000600070000000800060037000000240073697000060002008700000008000b00732469700e4565e4fdc80a2f07f900"/160], 0x9c}, 0x1, 0x0, 0x0, 0x48000}, 0x4004) read(r0, &(0x7f00000002c0)=""/225, 0xe1) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = dup2(r2, r1) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r4, r3, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r4, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:12:21 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000640)={[{@nr_inodes={'nr_inodes', 0x3d, [0x36, 0x0, 0x6b, 0x38, 0x31, 0x6d, 0x30]}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '#'}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}, {@measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}]}) 23:12:21 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x3, 0xffffffffffffffff, 0x5) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9c000000", @ANYRES16=0x0, @ANYBLOB="010027bd7000fcdbdf25040000003423baa10c00038008000300000000004400d841ac257b65d0be0000080004009600000006000f00faff000005000d00010000000800080400010000260002004e2400000800030000000000080003000300000008000600070000000800060037000000240073697000060002008700000008000b00732469700e4565e4fdc80a2f07f900"/160], 0x9c}, 0x1, 0x0, 0x0, 0x48000}, 0x4004) read(r0, &(0x7f00000002c0)=""/225, 0xe1) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:12:21 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r8 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r8, r7) r9 = io_uring_setup(0x1b33, &(0x7f0000000000)={0x0, 0x8a66, 0x0, 0x7, 0x194, 0x0, r8}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000440)=ANY=[@ANYBLOB="01ed6ffcc066c757b5feffff", @ANYRES32=r9, @ANYBLOB="f94eee0f000000002e2f66696c653100"]) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) fcntl$dupfd(r1, 0x0, r6) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:12:21 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r1, &(0x7f00000002c0)=""/225, 0xe1) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f0000000540)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003fa7000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000002000"/312], 0x25) ioctl$SG_IO(r3, 0x1274, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = syz_io_uring_complete(0x0) r5 = io_uring_setup(0x132a, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x248, 0x0, r1}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r5, {0x1}}, './file0\x00'}) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r6, 0x0, r4) ioctl$SNDRV_TIMER_IOCTL_TREAD(r4, 0x40045402, &(0x7f0000000480)=0x1) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r8 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r8, r7) pidfd_getfd(r8, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:12:21 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000640)={[{@nr_inodes={'nr_inodes', 0x3d, [0x36, 0x0, 0x6b, 0x38, 0x31, 0x6d]}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '#'}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}, {@measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}]}) [ 2007.240058] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.0'. 23:12:34 executing program 7: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xd, 0xffffffffffffffff, 0xa) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) write$binfmt_elf64(r5, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"/967], 0x3c7) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:12:34 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000640)={[{@nr_inodes={'nr_inodes', 0x3d, [0x36, 0x0, 0x6b, 0x38, 0x31]}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '#'}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}, {@measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}]}) 23:12:34 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x3, 0xffffffffffffffff, 0x5) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9c000000", @ANYRES16=0x0, @ANYBLOB="010027bd7000fcdbdf25040000003423baa10c00038008000300000000004400d841ac257b65d0be0000080004009600000006000f00faff000005000d00010000000800080400010000260002004e2400000800030000000000080003000300000008000600070000000800060037000000240073697000060002008700000008000b00732469700e4565e4fdc80a2f07f900"/160], 0x9c}, 0x1, 0x0, 0x0, 0x48000}, 0x4004) read(r0, &(0x7f00000002c0)=""/225, 0xe1) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:12:34 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) unshare(0x48020200) 23:12:34 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) dup2(r1, r1) r5 = syz_io_uring_complete(0x0) r6 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r5, 0xc018937c, &(0x7f00000001c0)=ANY=[@ANYBLOB="00000002000000007cb3d8848203305c5bc25aa9a7c871faaca1f1526d835f31a2579da393a948a867e27aa21fd6737b6daa5577f00ff0b7a79a04873908f4debcf47d1dc0906997da8df9c3fd884d4f4147b6386fc52e884b7adeb68976ae5b75110a7c9c88046cd7a0ad31c447238a7987839d4e0f0eb3573f0320de2c214c6920e93c107b00beca94876dbda0d2f438ae8cfad6f0d300"/167, @ANYRES32=r6, @ANYBLOB="01000000000000002e2f66696c653000"]) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r5) r8 = accept$inet(r4, &(0x7f0000000000)={0x2, 0x0, @remote}, &(0x7f0000000040)=0x10) close_range(r8, r3, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r5, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:12:34 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000), 0x80001, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = dup2(r3, 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000040)={'erspan0\x00', &(0x7f00000000c0)={'ip_vti0\x00', 0x0, 0x40, 0x40, 0x40, 0x10001, {{0x5, 0x4, 0x1, 0x5, 0x14, 0x65, 0x0, 0x0, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x43}, @local}}}}) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x32, &(0x7f00000001c0)={@mcast2, r5}, 0x14) r6 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$SG_IO(r7, 0x1274, 0x0) r8 = dup2(r1, r1) r9 = syz_io_uring_complete(0x0) r10 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r9}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r9, 0xc018937c, &(0x7f0000000440)=ANY=[@ANYBLOB='\x00'/12, @ANYRES32=r10, @ANYBLOB="01000000000000002e2f66696c653000"]) write$binfmt_elf64(r8, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) ioctl$SNDRV_TIMER_IOCTL_TREAD(r9, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:12:34 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), 0x0, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) add_key$keyring(&(0x7f0000000740), &(0x7f0000000780)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) unshare(0x48020200) 23:12:34 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x3, 0xffffffffffffffff, 0x5) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9c000000", @ANYRES16=0x0, @ANYBLOB="010027bd7000fcdbdf25040000003423baa10c00038008000300000000004400d841ac257b65d0be0000080004009600000006000f00faff000005000d00010000000800080400010000260002004e2400000800030000000000080003000300000008000600070000000800060037000000240073697000060002008700000008000b00732469700e4565e4fdc80a2f07f900"/160], 0x9c}, 0x1, 0x0, 0x0, 0x48000}, 0x4004) read(r0, &(0x7f00000002c0)=""/225, 0xe1) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) [ 2007.271185] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.1'. 23:12:34 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x3, 0xffffffffffffffff, 0x5) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9c000000", @ANYRES16=0x0, @ANYBLOB="010027bd7000fcdbdf25040000003423baa10c00038008000300000000004400d841ac257b65d0be0000080004009600000006000f00faff000005000d00010000000800080400010000260002004e2400000800030000000000080003000300000008000600070000000800060037000000240073697000060002008700000008000b00732469700e4565e4fdc80a2f07f900"/160], 0x9c}, 0x1, 0x0, 0x0, 0x48000}, 0x4004) read(r0, &(0x7f00000002c0)=""/225, 0xe1) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:12:35 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000640)={[{@nr_inodes={'nr_inodes', 0x3d, [0x36, 0x0, 0x6b, 0x38]}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '#'}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}, {@measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}]}) 23:12:35 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) fcntl$dupfd(r3, 0x0, r3) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r5, r4) ioctl$SG_IO(r3, 0x1274, 0x0) dup2(r1, r1) r6 = syz_io_uring_complete(0x0) r7 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000440)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r7, @ANYBLOB="01000000000000002ee566696c653000"]) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r8, 0x0, r6) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:12:35 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x3, 0xffffffffffffffff, 0x5) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9c000000", @ANYRES16=0x0, @ANYBLOB="010027bd7000fcdbdf25040000003423baa10c00038008000300000000004400d841ac257b65d0be0000080004009600000006000f00faff000005000d00010000000800080400010000260002004e2400000800030000000000080003000300000008000600070000000800060037000000240073697000060002008700000008000b00732469700e4565e4fdc80a2f07f900"/160], 0x9c}, 0x1, 0x0, 0x0, 0x48000}, 0x4004) read(r0, &(0x7f00000002c0)=""/225, 0xe1) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = dup2(r2, r1) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r4, r3, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r4, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:12:35 executing program 7: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$SG_IO(r3, 0x1274, 0x0) r4 = dup2(r1, r1) r5 = syz_io_uring_setup(0x3872, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r6, r7, &(0x7f0000000000)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x18}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r5, 0x0) r8 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r5, 0x8000000) r9 = syz_io_uring_complete(r8) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r9}) write$binfmt_elf64(r4, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0x80, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffbf}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r10, 0x0, r9) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) ioctl$SNDRV_TIMER_IOCTL_TREAD(r9, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:12:35 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000040)=0x1000) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) r7 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000000)={{0x1, 0x1, 0x18, r7, {0x1}}, './file0\x00'}) write$binfmt_elf64(r5, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c467f020600a50e00000000000002003e0000180000000000000000000040000000000000001e0300000000000006000000050238000100321f0100000100000000030000000500000000000000ff00000000000000a200000000000000d70d0000000000000300000010000000ffff0000000000005563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1f8a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f400"/967], 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x0, r6) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:12:35 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x3, 0xffffffffffffffff, 0x5) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9c000000", @ANYRES16=0x0, @ANYBLOB="010027bd7000fcdbdf25040000003423baa10c00038008000300000000004400d841ac257b65d0be0000080004009600000006000f00faff000005000d00010000000800080400010000260002004e2400000800030000000000080003000300000008000600070000000800060037000000240073697000060002008700000008000b00732469700e4565e4fdc80a2f07f900"/160], 0x9c}, 0x1, 0x0, 0x0, 0x48000}, 0x4004) read(r0, &(0x7f00000002c0)=""/225, 0xe1) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:12:35 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000640)={[{@nr_inodes={'nr_inodes', 0x3d, [0x36, 0x0, 0x6b]}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '#'}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}, {@measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}]}) 23:12:35 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) dup2(r1, r1) r5 = syz_io_uring_complete(0x0) r6 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e4, 0x0, 0x3, 0x175}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r5, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r6, {0x1}}, './file0\x00'}) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r5) ioctl$SNDRV_TIMER_IOCTL_TREAD(r5, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:12:35 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000640)={[{@nr_inodes={'nr_inodes', 0x3d, [0x36, 0x0]}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '#'}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}, {@measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}]}) 23:12:35 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$DEVLINK_CMD_RATE_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)={0xc4, 0x0, 0x200, 0x70bd25, 0x25dfdbff, {}, [@DEVLINK_ATTR_PORT_INDEX={0x8, 0x3, 0x2}, @handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_PORT_INDEX={0x8}, @DEVLINK_ATTR_RATE_NODE_NAME={0x5d, 0xa8, @random="18695fe7a239c8f191385da118adb872e15d47ba5dec3c8afc57e7726197018f811cdd86dd987f6e76e51034e01651cee3613033bee5ac4dc1e8bb0625d48814ac10a60872ce6668bf666c0f53a58984add18a4c09e13af377"}, @handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0xc4}, 0x1, 0x0, 0x0, 0x4000}, 0x4820) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000001c0)=""/222, 0xfffffffffffffc96) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) r7 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r7, @ANYBLOB="01000000000000802e2f66b66c6530004dcf7d9d108291bd54b0bc41110eba53276e5a8f79e61e21bfcf2ad348b9ef4b06dd53decbd90b6343dcd1c865e5e1cf6b72c3376032317e0072239287e855383c3b7eb19a648185f0a4ee11e89887fb804f8ae0"]) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x0, r6) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:12:48 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="98000000200039040000000000000000020000000dc0c23671f1a964651e4d52c3dc9432e6af519d60c901a7ea83dce8f6a9c36adbbf7c23348ed7953cc124f0f2e2f1324bf1187b4e1f5a7bf5116e03f38056144e4fd6711849a6579e46004fbfb9ae80572129d57aa41a4c792b56978ebd2e72f57ca14145d7bcd879afed4e97abd691d56cf2d815f272170c0011000000000000000000bb3e3c7562af739c74b82fd57e7bd51e163e9c2394948632056b9357f234b64631cba457c59e6d0eae9098c89e3c7aa8b1cbc03bd674263161cff69945516e14595dfad881c353d7fb9bbdc2fb19f3306b4f29f5ac8dddb92ee4fe33f6e190dffd186aa055b9a9547a834f1d6190acda5d78a8cff254a2de72f20938d689ca4044e9b0a3ee3627818c70cc78d1fe11e55c898d61e09dd9cc4bdefd952f33d4697d06ffd93de78dd16ff6fabb99fb6b42eb449d317ff0f62c982878d984496c08a7a672102affbb245b18bb390e66298d7220110693dd4d00d4a7b9a75298857b75fa243b23c8cf9643bb00000000006dabf39491a19826dd17133c71e29784f2335028a747a6113ad6efdfbffa7205050056d0ee75b2f729232cc5bd028e654e69b60ba5313c46aa44ffefefa1dd182aa574a6fa732d6708584982012bb16aaceda807d810ad63ccfa5203bc3b2fac19fa9b5cd3d3f3e3cd43ced0a0870700adae78cb262f235c0401058ea209faecd0a5262bbda1d50def7cbef31c9b3ac3140d4741d25a4f0277c0ede8517e65b43a81d4e70e4f7c8f3e4c6b059a695c"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) unshare(0x48020200) 23:12:48 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x3, 0xffffffffffffffff, 0x5) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9c000000", @ANYRES16=0x0, @ANYBLOB="010027bd7000fcdbdf25040000003423baa10c00038008000300000000004400d841ac257b65d0be0000080004009600000006000f00faff000005000d00010000000800080400010000260002004e2400000800030000000000080003000300000008000600070000000800060037000000240073697000060002008700000008000b00732469700e4565e4fdc80a2f07f900"/160], 0x9c}, 0x1, 0x0, 0x0, 0x48000}, 0x4004) read(r0, &(0x7f00000002c0)=""/225, 0xe1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = dup2(r2, r1) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r4, r3, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r4, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:12:48 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000640)={[{@nr_inodes={'nr_inodes', 0x3d, [0x36]}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '#'}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}, {@measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}]}) [ 2021.259643] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2021.268530] tmpfs: Unknown parameter 'smackfstransmute' [ 2021.272614] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.0'. 23:12:48 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), 0x0, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) add_key$keyring(&(0x7f0000000740), &(0x7f0000000780)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) unshare(0x48020200) 23:12:48 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1be0, 0xa418b6d, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) r7 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r7, {0x1}}, './file0\x00'}) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x0, r6) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:12:48 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) dup2(r1, r1) r5 = syz_io_uring_complete(0x0) r6 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r5, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r6, {0x1}}, './file0\x00'}) pipe(&(0x7f0000000280)={0xffffffffffffffff}) r8 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r9 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r9, r8) close_range(r8, r6, 0x2) fcntl$dupfd(r7, 0x0, r5) ioctl$SNDRV_TIMER_IOCTL_TREAD(r5, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:12:48 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x3, 0xffffffffffffffff, 0x5) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9c000000", @ANYRES16=0x0, @ANYBLOB="010027bd7000fcdbdf25040000003423baa10c00038008000300000000004400d841ac257b65d0be0000080004009600000006000f00faff000005000d00010000000800080400010000260002004e2400000800030000000000080003000300000008000600070000000800060037000000240073697000060002008700000008000b00732469700e4565e4fdc80a2f07f900"/160], 0x9c}, 0x1, 0x0, 0x0, 0x48000}, 0x4004) read(r0, &(0x7f00000002c0)=""/225, 0xe1) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = dup2(0xffffffffffffffff, r1) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:12:48 executing program 7: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x284000) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x60}) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) r8 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r8, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r8, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x62060004}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x0, 0xc, 0x254a, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRET={0x8, 0x4, [0x6]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x200c0045}, 0x24000094) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:12:49 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = accept4$inet(r2, &(0x7f0000000000)={0x2, 0x0, @empty}, &(0x7f0000000040)=0x10, 0x800) readv(r5, &(0x7f0000000600)=[{&(0x7f00000000c0)=""/71, 0x47}, {&(0x7f00000001c0)=""/209, 0xd1}, {&(0x7f00000003c0)=""/109, 0x6d}, {&(0x7f0000000540)=""/157, 0x9d}], 0x4) r6 = dup2(r1, r1) r7 = syz_io_uring_complete(0x0) r8 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x2af, 0x0, r7}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r7, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r8, {0x1}}, './file0\x00'}) write$binfmt_elf64(r6, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x0, r7) ioctl$SNDRV_TIMER_IOCTL_TREAD(r7, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000640)='fdinfo/4\x00') 23:12:49 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x3, 0xffffffffffffffff, 0x5) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9c000000", @ANYRES16=0x0, @ANYBLOB="010027bd7000fcdbdf25040000003423baa10c00038008000300000000004400d841ac257b65d0be0000080004009600000006000f00faff000005000d00010000000800080400010000260002004e2400000800030000000000080003000300000008000600070000000800060037000000240073697000060002008700000008000b00732469700e4565e4fdc80a2f07f900"/160], 0x9c}, 0x1, 0x0, 0x0, 0x48000}, 0x4004) read(r0, &(0x7f00000002c0)=""/225, 0xe1) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = dup2(0xffffffffffffffff, r1) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:12:49 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000640)={[{@nr_inodes={'nr_inodes', 0x3d, [0x36]}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '#'}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}, {@measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}]}) [ 2021.401506] tmpfs: Unknown parameter 'smackfstransmute' 23:12:49 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x3, 0xffffffffffffffff, 0x5) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9c000000", @ANYRES16=0x0, @ANYBLOB="010027bd7000fcdbdf25040000003423baa10c00038008000300000000004400d841ac257b65d0be0000080004009600000006000f00faff000005000d00010000000800080400010000260002004e2400000800030000000000080003000300000008000600070000000800060037000000240073697000060002008700000008000b00732469700e4565e4fdc80a2f07f900"/160], 0x9c}, 0x1, 0x0, 0x0, 0x48000}, 0x4004) read(r0, &(0x7f00000002c0)=""/225, 0xe1) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = dup2(0xffffffffffffffff, r1) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:12:49 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) dup2(r1, r1) r5 = syz_io_uring_complete(0x0) r6 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r5, 0xc018937c, &(0x7f0000000440)=ANY=[@ANYBLOB="010081000000000000000000", @ANYRES32=r6, @ANYBLOB="01000000000000002e2f66696c653000"]) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r5) ioctl$SNDRV_TIMER_IOCTL_TREAD(r5, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:12:49 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000640)={[{@nr_inodes={'nr_inodes', 0x3d, [0x36]}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '#'}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}, {@measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}]}) 23:12:49 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) r7 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r7, {0x1}}, './file0\x00'}) write$binfmt_elf64(r5, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"/972], 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x0, r6) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') r8 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r8, 0xffffffffffffffff, 0x0, 0x7ffffff9) fallocate(r8, 0x4b, 0x8, 0x9) [ 2021.560595] tmpfs: Unknown parameter 'smackfstransmute' 23:13:03 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x3, 0xffffffffffffffff, 0x5) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9c000000", @ANYRES16=0x0, @ANYBLOB="010027bd7000fcdbdf25040000003423baa10c00038008000300000000004400d841ac257b65d0be0000080004009600000006000f00faff000005000d00010000000800080400010000260002004e2400000800030000000000080003000300000008000600070000000800060037000000240073697000060002008700000008000b00732469700e4565e4fdc80a2f07f900"/160], 0x9c}, 0x1, 0x0, 0x0, 0x48000}, 0x4004) read(r0, &(0x7f00000002c0)=""/225, 0xe1) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) [ 2035.453682] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.1'. 23:13:03 executing program 7: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) write$binfmt_elf64(r5, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"/967], 0x3c7) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:13:03 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) fremovexattr(r2, &(0x7f0000000000)=@known='system.posix_acl_default\x00') r7 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r7, {0x1}}, './file0\x00'}) write$binfmt_elf64(r5, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c467f020600a50e00000000000002003e0000180000000000000000000040000000000000001e0300000000000006000000050238000100321f0100000100000000030000000500000000000000ff00000000000000a200000000000000d70d0000000000000300000010000000ffff0000000000005563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001b00"/967], 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x0, r6) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:13:03 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x3, 0xffffffffffffffff, 0x5) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9c000000", @ANYRES16=0x0, @ANYBLOB="010027bd7000fcdbdf25040000003423baa10c00038008000300000000004400d841ac257b65d0be0000080004009600000006000f00faff000005000d00010000000800080400010000260002004e2400000800030000000000080003000300000008000600070000000800060037000000240073697000060002008700000008000b00732469700e4565e4fdc80a2f07f900"/160], 0x9c}, 0x1, 0x0, 0x0, 0x48000}, 0x4004) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = dup2(r2, r1) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r4, r3, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r4, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:13:03 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) unshare(0x48020200) 23:13:03 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) dup2(r1, r1) r5 = syz_io_uring_complete(0x0) r6 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r5, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r6, {0x1}}, './file0\x00'}) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r5) syz_io_uring_setup(0x597a, &(0x7f0000000000)={0x0, 0xe2c5, 0x4, 0x3, 0x3c2, 0x0, r4}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f00000000c0), &(0x7f0000000100)) ioctl$SNDRV_TIMER_IOCTL_TREAD(r5, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:13:03 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000640)={[{@nr_inodes={'nr_inodes', 0x3d, [0x0]}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '#'}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}, {@measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}]}) 23:13:03 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), 0x0, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) add_key$keyring(&(0x7f0000000740), &(0x7f0000000780)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) unshare(0x48020200) [ 2035.473448] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.0'. 23:13:03 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x3, 0xffffffffffffffff, 0x5) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9c000000", @ANYRES16=0x0, @ANYBLOB="010027bd7000fcdbdf25040000003423baa10c00038008000300000000004400d841ac257b65d0be0000080004009600000006000f00faff000005000d00010000000800080400010000260002004e2400000800030000000000080003000300000008000600070000000800060037000000240073697000060002008700000008000b00732469700e4565e4fdc80a2f07f900"/160], 0x9c}, 0x1, 0x0, 0x0, 0x48000}, 0x4004) read(r0, &(0x7f00000002c0)=""/225, 0xe1) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) [ 2035.485051] tmpfs: Bad value for 'nr_inodes' 23:13:16 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x3, 0xffffffffffffffff, 0x5) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:13:16 executing program 7: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x80000, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0x7ffffff9) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000040)) ioctl$SG_IO(r4, 0x1274, 0x0) r6 = dup2(r1, r1) r7 = syz_io_uring_complete(0x0) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r7}) write$binfmt_elf64(r6, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x3c7) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r8, 0x0, r7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) ioctl$SNDRV_TIMER_IOCTL_TREAD(r7, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:13:16 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x20800) add_key$keyring(&(0x7f0000000740), &(0x7f0000000780)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) unshare(0x48020200) [ 2049.203778] tmpfs: Bad value for 'nr_inodes' [ 2049.242232] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.0'. 23:13:16 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x3, 0xffffffffffffffff, 0x5) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9c000000", @ANYRES16=0x0, @ANYBLOB="010027bd7000fcdbdf25040000003423baa10c00038008000300000000004400d841ac257b65d0be0000080004009600000006000f00faff000005000d00010000000800080400010000260002004e2400000800030000000000080003000300000008000600070000000800060037000000240073697000060002008700000008000b00732469700e4565e4fdc80a2f07f900"/160], 0x9c}, 0x1, 0x0, 0x0, 0x48000}, 0x4004) read(r0, &(0x7f00000002c0)=""/225, 0xe1) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:13:16 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000005e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r2, 0x3ff, 0x5, 0x5}) dup2(r4, r3) r5 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r5, 0x1274, 0x0) r6 = dup2(r1, r1) r7 = syz_io_uring_complete(0x0) r8 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r7}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r7, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r8, {0x1}}, './file0\x00'}) write$binfmt_elf64(r6, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x0, r7) ioctl$SNDRV_TIMER_IOCTL_TREAD(r7, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:13:16 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000640)={[{@nr_inodes={'nr_inodes', 0x3d, [0x0]}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '#'}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}, {@measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}]}) 23:13:16 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7ffffff9) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000540)={0x3, 0xf0, "da0301abc54f44e3ea23a3cbe95fa4bba8c5cbd8bef90738cd5dac35f9c88c9cd29813e176ba68fffa936685dd67a319f4e3a1083575ae4b955953d30e95a7b22166caa77884ce2e399ef724525dc6c90eaf14f4e9770c182c20f8ae7f5786e89c14608897390322427f8a7fc388f4d3eac56abce5a57ab8aba070ae8c3754fa687b0a072c1d9ea5e7e91686c951f3b489a4c5a59f95f97ce0271856dcd7476bc55d6689a34f026c93e3581e365cf7b0adac01a04323107caf66cfaef53e43212b42fb05adc2289b2855f1ab24482cd0ab5cb9674e70f21f6728670a4347784fe406a6f86cce805523b352407740d7ee"}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) dup2(r1, r1) r5 = syz_io_uring_complete(0x0) r6 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r6, {0x4}}, './file0\x00'}) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r5) ioctl$SNDRV_TIMER_IOCTL_TREAD(r5, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') r8 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x690f82, 0x0) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r8, 0x40189429, &(0x7f0000000040)={0x1, 0x5, 0x400}) 23:13:16 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) unshare(0x48020200) [ 2049.251689] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.1'. 23:13:17 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000640)={[{@nr_inodes={'nr_inodes', 0x3d, [0x0]}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '#'}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}, {@measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}]}) [ 2049.317554] tmpfs: Bad value for 'nr_inodes' 23:13:17 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r2, r1) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x20501, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x5}, 0x0, 0xffffffffffffffff, r1, 0xa) r4 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r4, &(0x7f00000002c0)=""/225, 0xe1) r5 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$SG_IO(r6, 0x1274, 0x0) r7 = dup2(r3, r3) r8 = syz_io_uring_complete(0x0) r9 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r8}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r8, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r9, {0x1}}, './file0\x00'}) write$binfmt_elf64(r7, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x0, r8) ioctl$SNDRV_TIMER_IOCTL_TREAD(r8, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:13:30 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000640)={[{@nr_inodes={'nr_inodes', 0x3d, [0x0, 0x0]}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '#'}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}, {@measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}]}) 23:13:30 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x3, 0xffffffffffffffff, 0x5) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9c000000", @ANYRES16=0x0, @ANYBLOB="010027bd7000fcdbdf25040000003423baa10c00038008000300000000004400d841ac257b65d0be0000080004009600000006000f00faff000005000d00010000000800080400010000260002004e2400000800030000000000080003000300000008000600070000000800060037000000240073697000060002008700000008000b00732469700e4565e4fdc80a2f07f900"/160], 0x9c}, 0x1, 0x0, 0x0, 0x48000}, 0x4004) read(r0, &(0x7f00000002c0)=""/225, 0xe1) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = dup2(r2, r1) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r4, r3, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r4, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:13:30 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x20800) add_key$keyring(&(0x7f0000000740), &(0x7f0000000780)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) unshare(0x48020200) [ 2062.546838] tmpfs: Bad value for 'nr_inodes' [ 2062.547732] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2062.554644] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.0'. 23:13:30 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x3, 0xffffffffffffffff, 0x5) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:13:30 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) unshare(0x48020200) 23:13:30 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f00000002c0)=""/225, 0xe1) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$SG_IO(r3, 0x1274, 0x0) dup2(r1, r1) r4 = syz_io_uring_complete(0x0) r5 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r5, {0x1}}, './file0\x00'}) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r6, 0x0, r4) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r4, 0xc05c5340, &(0x7f0000000000)={0xf0fe, 0x100, 0x8, {0x100, 0x6}, 0xffffffff, 0x1}) ioctl$SNDRV_TIMER_IOCTL_TREAD(r4, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:13:30 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) r7 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r7, {0x1}}, './file0\x00'}) write$binfmt_elf64(r5, &(0x7f0000000bc0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x3, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x5, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x6474e551, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) r8 = fcntl$dupfd(0xffffffffffffffff, 0x0, r6) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') openat(r8, &(0x7f0000000000)='./file0\x00', 0x40000, 0x120) 23:13:30 executing program 7: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) write$binfmt_elf64(r5, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x3c7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)={'L-', 0xff}, 0x16, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:13:30 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000640)={[{@nr_inodes={'nr_inodes', 0x3d, [0x0, 0x0]}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '#'}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}, {@measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}]}) 23:13:30 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) dup2(r1, r1) r5 = syz_io_uring_complete(0x0) r6 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0x8146, 0x20, 0x3, 0x172}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r5, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r6, {0x1}}, './file0\x00'}) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r5) lseek(0xffffffffffffffff, 0x7, 0x0) r8 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r8, 0xffffffffffffffff, 0x0, 0x7ffffff9) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, r8, {0x6058a80b42866b05}}, './file0\x00'}) ioctl$SNDRV_TIMER_IOCTL_TREAD(r5, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') [ 2062.666183] tmpfs: Bad value for 'nr_inodes' 23:13:30 executing program 7: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) r8 = syz_open_dev$loop(&(0x7f0000000040), 0x5, 0x2000) writev(r8, &(0x7f00000000c0)=[{&(0x7f0000000bc0)="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", 0x1000}], 0x1) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:13:30 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x1, 0x0, @fd=r4, 0x1ff, 0x0, 0x9, 0x3, 0x2}, 0x8ce) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) r7 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r7, {0x1}}, './file0\x00'}) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x0, r6) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:13:30 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000640)={[{@nr_inodes={'nr_inodes', 0x3d, [0x0, 0x0]}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '#'}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}, {@measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}]}) 23:13:30 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x3, 0xffffffffffffffff, 0x5) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9c000000", @ANYRES16=0x0, @ANYBLOB="010027bd7000fcdbdf25040000003423baa10c00038008000300000000004400d841ac257b65d0be0000080004009600000006000f00faff000005000d00010000000800080400010000260002004e2400000800030000000000080003000300000008000600070000000800060037000000240073697000060002008700000008000b00732469700e4565e4fdc80a2f07f900"/160], 0x9c}, 0x1, 0x0, 0x0, 0x48000}, 0x4004) read(r0, &(0x7f00000002c0)=""/225, 0xe1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = dup2(r2, r1) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r4, r3, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r4, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:13:30 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x20800) add_key$keyring(&(0x7f0000000740), &(0x7f0000000780)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) unshare(0x48020200) 23:13:30 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) unshare(0x48020200) [ 2062.842530] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2062.846771] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.1'. 23:13:30 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip6_mr_cache\x00') r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r5, 0x8933, &(0x7f0000000240)={'wg0\x00'}) r6 = dup2(r1, r1) r7 = syz_io_uring_complete(0x0) r8 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x4, 0x3, 0x177, 0x0, r7}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r7, 0xc018937c, &(0x7f00000000c0)=ANY=[@ANYBLOB="4fb447c61eb9b576a86a7a24099f112f26c6c04ab4e9b09a9f7ffe8fe54aa42f9a4d992e23c08790ef66ed96a32715293edb", @ANYRES32=r8, @ANYBLOB="01000000000000002e2f66696c653000"]) write$binfmt_elf64(r6, &(0x7f00000003c0)=ANY=[], 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x0, r7) ioctl$SNDRV_TIMER_IOCTL_TREAD(r7, 0x40045402, &(0x7f0000000480)=0x1) ioctl$BTRFS_IOC_LOGICAL_INO(r1, 0xc0389424, &(0x7f00000001c0)={0x7, 0x30, '\x00', 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:13:30 executing program 7: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) write$binfmt_elf64(r5, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c467f020600a50e00000000000002003e0000180000000000000000000040000000000000001e0300000000000006000000050238000100321f0100000100000000030000000500000000000000ff00000000000000a200000000000000d70d0000000000000300000010000000ffff0000000000005563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ea00"/967], 0x3c7) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:13:30 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x3, 0xffffffffffffffff, 0x5) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:13:30 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000640)={[{@nr_inodes={'nr_inodes', 0x3d, [0x36, 0x0]}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '#'}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}, {@measure}]}) 23:13:30 executing program 5: ioctl$FAT_IOCTL_GET_ATTRIBUTES(0xffffffffffffffff, 0x80047210, &(0x7f0000000180)) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8060, 0x0, 0x0, 0x5, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r1, &(0x7f00000002c0)=""/225, 0xe1) lseek(0xffffffffffffffff, 0x7, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000000)) dup2(r2, r1) r3 = syz_open_dev$sg(&(0x7f00000000c0), 0x98, 0x100) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) dup2(r0, r0) r5 = syz_io_uring_complete(0x0) r6 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0x557f, 0x20, 0x3, 0x175}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r5, 0xc018937c, &(0x7f0000000040)=ANY=[@ANYBLOB="72738ce894c3201000000000", @ANYRES32=r6, @ANYBLOB="00080000000000002e0466047c423000ba"]) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r5) ioctl$SNDRV_TIMER_IOCTL_TREAD(r5, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:13:30 executing program 7: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) write$binfmt_elf64(r5, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c467f020600a50e00000000000002003e0000180000000000000000000040000000000000001e0300000000000006000000050238000100321f0100000100000000030000000500000000000000ff00000000000000a200000000000000d70d0000000000000300000010000000ffff0000000000005563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f40000000000000000000000000000000000000000000000000000000000000000000000000400"/967], 0x3c7) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:13:30 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000640)={[{@nr_inodes={'nr_inodes', 0x3d, [0x36, 0x0]}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '#'}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sg#\x00'}}]}) 23:13:30 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) r7 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r7, {0x1}}, './file0\x00'}) write$binfmt_elf64(r5, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c467f020600a50e00000000000002003e0000180000000000000000000040000000000000001e0300000000000006000000050238000100321f0100000100000000030000000500000000000000ff00000000000000a200000000000000d70d0000000000000300000010000000ffff0000000000005563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957003d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f400"/967], 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x0, r6) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:13:30 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) unshare(0x48020200) [ 2063.135694] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2077.359980] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2077.373000] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.1'. 23:13:45 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:13:45 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) unshare(0x48020200) 23:13:45 executing program 7: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x4050, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) write$binfmt_elf64(r5, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0xc7) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) bind$unix(r2, &(0x7f00000000c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:13:45 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff}) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x26, 0x1f, 0x2, 0x3, 0x0, 0x7fffffff, 0x8, 0xd, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x4, 0x2}, 0x80010, 0x3e6d, 0x1e6b, 0x1, 0x0, 0x7, 0xfff, 0x0, 0x9}, 0x0, 0x0, r2, 0x8) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) dup2(r1, r1) r5 = syz_io_uring_complete(0x0) r6 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r6}, './file0\x00'}) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r5) ioctl$SNDRV_TIMER_IOCTL_TREAD(r5, 0x40045402, &(0x7f0000000480)=0x1) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000000)={'syztnl2\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB='ip_vti0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="5bf658a75d7b0089cf512d86c92472f2"]}) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@private2, r8}, 0x14) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:13:45 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000640)={[{@nr_inodes={'nr_inodes', 0x3d, [0x36, 0x0]}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '#'}}]}) 23:13:45 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_FADVISE={0x18, 0x4, 0x0, @fd_index=0x3, 0x1f, 0x0, 0x8, 0x3, 0x1}, 0x9) r6 = syz_io_uring_complete(0x0) r7 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000000)=ANY=[@ANYBLOB="0100000001000000db1e4e18000000", @ANYRES32=r7, @ANYBLOB="01000000000000002e2f66696c653000"]) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x7, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x0, r6) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:13:45 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x0) add_key$keyring(&(0x7f0000000740), &(0x7f0000000780)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) unshare(0x48020200) 23:13:45 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x3, 0xffffffffffffffff, 0x5) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9c000000", @ANYRES16=0x0, @ANYBLOB="010027bd7000fcdbdf25040000003423baa10c00038008000300000000004400d841ac257b65d0be0000080004009600000006000f00faff000005000d00010000000800080400010000260002004e2400000800030000000000080003000300000008000600070000000800060037000000240073697000060002008700000008000b00732469700e4565e4fdc80a2f07f900"/160], 0x9c}, 0x1, 0x0, 0x0, 0x48000}, 0x4004) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = dup2(r2, r1) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r4, r3, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r4, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:13:45 executing program 7: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r6, 0xffffffffffffffff) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000040)={0x1000, 0xab, 0x3f, 0x3f, 0x7, "a35ff511da459e533f9db2219c81f5c033dda0"}) r7 = syz_io_uring_complete(0x0) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r7}) write$binfmt_elf64(r5, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], 0x3c7) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r8, 0x0, r7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) ioctl$SNDRV_TIMER_IOCTL_TREAD(r7, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:13:45 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040), 0x6601, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) dup2(r1, r1) r5 = syz_io_uring_complete(0x0) r6 = io_uring_setup(0x9cf, &(0x7f00000004c0)={0x0, 0x2c7e7, 0x2, 0x3, 0x179}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r5, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r6, {0x1}}, './file0\x00'}) r8 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r9 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xc1e083, 0x52) dup2(r9, r8) fcntl$dupfd(r7, 0x0, r8) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r10, 0x0, r5) ioctl$SNDRV_TIMER_IOCTL_TREAD(r5, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:13:45 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000640)={[{@nr_inodes={'nr_inodes', 0x3d, [0x36, 0x0]}}]}) [ 2090.835100] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2090.847839] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.0'. 23:13:58 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) r7 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r7, {0x1}}, './file0\x00'}) syz_io_uring_setup(0x7d7e, &(0x7f0000000000)={0x0, 0x7e34, 0x4, 0x3, 0x273, 0x0, r2}, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f00000000c0), &(0x7f0000000100)=0x0) r9 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0xf8, 0x2, &(0x7f00000003c0)=[{&(0x7f0000000540)="d5be9d9eac07031d30431bd8f328053fd9a31ac30b17108542c74e05efe4a40451e387ae7e7dea8ce3dde5f22f34f3c159228339d67b1b16e3a4da41cd81c8d9470f2334e38bf57f3c311ea7c28e1e049954ac22cc3a14a4a9874a05fbb169d17589b31155f063ae3dad2f0326d694c65cd7606df4589e24537ac422cdd56a74b614dd1388d376562b4b42ba2e7cff85e5e8c5e01456c48b2dd4466b46c1db8133c97f4dbfccdb6f", 0xa8, 0x4}, {&(0x7f0000000240)="dff6a2b20c6829941263bb29cfdfb61cdd7d29cbde6ad3f33c13f04473135d66a41128a6570fc84b5e352095e5b49426c216bbe56113b15665a227e6df0fbed415ca82650eb7f342ac58477ea12d609b5e17ef5aeb93035e703ede8ff7", 0x5d}], 0x0, &(0x7f0000000400)={[{@check_strict}], [{@subj_user={'subj_user', 0x3d, '/dev/sg#\x00'}}, {@dont_appraise}, {@measure}]}) syz_io_uring_submit(0x0, r8, &(0x7f0000000680)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, r9, &(0x7f0000000600)={0x40000, 0x48, 0xd}, &(0x7f0000000640)='./file0\x00', 0x18, 0x0, 0x23456}, 0x6) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x0, r6) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:13:58 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x3, 0xffffffffffffffff, 0x5) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:13:58 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) unshare(0x48020200) 23:13:58 executing program 7: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) r8 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r8, 0xffffffffffffffff) fcntl$setown(r8, 0x8, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:13:58 executing program 4: r0 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:13:58 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12e0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) dup2(r1, r1) r5 = syz_io_uring_complete(0x0) r6 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r5, 0xc018937c, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r6, @ANYBLOB="016fada39e0000080000000004c653846e653800"]) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r5) lseek(0xffffffffffffffff, 0x7, 0x0) r8 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r8, 0xffffffffffffffff, 0x0, 0x7ffffff9) dup3(r0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r5, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:13:58 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="98000000200039040000000000000000020000000dc0c23671f1a964651e4d52c3dc9432e6af519d60c901a7ea83dce8f6a9c36adbbf7c23348ed7953cc124f0f2e2f1324bf1187b4e1f5a7bf5116e03f38056144e4fd6711849a6579e46004fbfb9ae80572129d57aa41a4c792b56978ebd2e72f57ca14145d7bcd879afed4e97abd691d56cf2d815f272170c0011000000000000000000bb3e3c7562af739c74b82fd57e7bd51e163e9c2394948632056b9357f234b64631cba457c59e6d0eae9098c89e3c7aa8b1cbc03bd674263161cff69945516e14595dfad881c353d7fb9bbdc2fb19f3306b4f29f5ac8dddb92ee4fe33f6e190dffd186aa055b9a9547a834f1d6190acda5d78a8cff254a2de72f20938d689ca4044e9b0a3ee3627818c70cc78d1fe11e55c898d61e09dd9cc4bdefd952f33d4697d06ffd93de78dd16ff6fabb99fb6b42eb449d317ff0f62c982878d984496c08a7a672102affbb245b18bb390e66298d7220110693dd4d00d4a7b9a75298857b75fa243b23c8cf9643bb00000000006dabf39491a19826dd17133c71e29784f2335028a747a6113ad6efdfbffa7205050056d0ee75b2f729232cc5bd028e654e69b60ba5313c46aa44ffefefa1dd182aa574a6fa732d6708584982012bb16aaceda807d810ad63ccfa5203bc3b2fac19fa9b5cd3d3f3e3cd43ced0a0870700adae78cb262f235c0401058ea209faecd0a5262bbda1d50def7cbef31c9b3ac3140d4741d25a4f0277c0ede8517e65b43a81d4e70e4f7c8f3e4c6b059a695c"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x0) add_key$keyring(&(0x7f0000000740), &(0x7f0000000780)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) unshare(0x48020200) 23:13:58 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:13:58 executing program 4: r0 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:13:58 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000540)=""/195, 0xc3}, {&(0x7f0000000640)=""/213, 0xd5}], 0x2, 0x4, 0x7fff) dup2(r1, r1) r5 = syz_io_uring_complete(0x0) r6 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r5, 0xc018937c, &(0x7f0000000440)=ANY=[@ANYBLOB="010300"/12, @ANYRES32=r6, @ANYBLOB="01000000000000002e2f66696c653000"]) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r5) ioctl$SNDRV_TIMER_IOCTL_TREAD(r5, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:13:58 executing program 7: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PTP_ENABLE_PPS(r1, 0x40043d04, 0x1) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r3, &(0x7f00000002c0)=""/225, 0xe1) r4 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$SG_IO(r5, 0x1274, 0x0) r6 = dup2(r2, r2) r7 = syz_io_uring_complete(0x0) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r7}) write$binfmt_elf64(r6, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r8, 0x0, r7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) ioctl$SNDRV_TIMER_IOCTL_TREAD(r7, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:13:58 executing program 4: r0 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) [ 2091.117401] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.1'. 23:13:58 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) unshare(0x48020200) 23:13:58 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:13:58 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) syz_open_procfs(r3, &(0x7f00000000c0)='timers\x00') r4 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$SG_IO(r5, 0x1274, 0x0) r6 = dup2(r1, r1) r7 = syz_io_uring_complete(0x0) r8 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r7}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r7, 0xc018937c, &(0x7f0000000540)=ANY=[@ANYBLOB="01000000010000001800000031b69c575e24a9bb50850f96507c9e1281130be15a5ef7744bc2f282d1726599dfd12fcbc02209d5a67abd1e1c3a3b64412842e08edafc9aebf90733aef05a7bf1dc6bb29fe9eacbf20117529a6f5134c1f7cb34a9be2a2bdf0ac123c6210a6c17e72ac86eae7aaa9ccdb3fa870331330412a8e0eb4bedfebed8a578ac8a2f9090d43187b054bd761cd5c753c2d87d688ebd9fa5102c36c05d60bce49feb3dd9dedbbcfa56fa4a7dc2ddc304b8fadddaa7cd6e1c7523", @ANYRES32=r8, @ANYBLOB="01000000001000002e2f66fb9794c7ba360e78e19923ff00000000000000006fce25c9226904ebac5a4e53c79b5a605a2453cec54f24daaf5391673efaae0531c603f08e71bd0116441d60ccd7a3eaad30e99d179b15fbaf29e284d1dd86c8a52d11ca5915eaa0481cc43ce2cc927ccf"]) write$binfmt_elf64(r6, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x0, r7) ioctl$SNDRV_TIMER_IOCTL_TREAD(r7, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:14:11 executing program 7: clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) write$evdev(0xffffffffffffffff, &(0x7f00000001c0)=[{{}, 0x5, 0xfffd, 0x5e66}, {{0x0, 0x2710}, 0x17, 0x4, 0x400}, {{0x77359400}, 0x3, 0x8, 0x1}, {{r0, r1/1000+60000}, 0x16, 0x7, 0x3}, {{r2, r3/1000+60000}, 0x5, 0x3, 0xffffffff}], 0x78) r4 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r4, 0x80047210, &(0x7f0000000180)) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r6, &(0x7f00000002c0)=""/225, 0xe1) r7 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$SG_IO(r8, 0x1274, 0x0) r9 = dup2(r5, r5) r10 = syz_io_uring_complete(0x0) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r10}) write$binfmt_elf64(r9, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r11, 0x0, r10) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) ioctl$SNDRV_TIMER_IOCTL_TREAD(r10, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:14:11 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x20800) unshare(0x48020200) 23:14:11 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r1, 0x0, &(0x7f0000000000)) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r5, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000040)=0x7) ioctl$SG_IO(r4, 0x1274, 0x0) r6 = dup2(r1, r1) r7 = syz_io_uring_complete(0x0) r8 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r7}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r7, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r8, {0x1}}, './file0\x00'}) write$binfmt_elf64(r6, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x3, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x4}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x0, r7) ioctl$SNDRV_TIMER_IOCTL_TREAD(r7, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:14:11 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x0) add_key$keyring(&(0x7f0000000740), &(0x7f0000000780)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) unshare(0x48020200) 23:14:11 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) dup2(r1, r1) r5 = syz_io_uring_complete(0x0) r6 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0x6e54, 0x4, 0x1, 0x8012d, 0x0, r4}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r5, 0xc018937c, &(0x7f0000000440)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r6, @ANYBLOB]) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000b40)=ANY=[@ANYBLOB="050000000000000004000000000000000800000000000000", @ANYRES32, @ANYBLOB="000000000100"/28, @ANYRES32, @ANYBLOB="00000800038215000000e4ff000000008b3ef579a4c1c2", @ANYRES32=r7, @ANYBLOB='\x00'/28, @ANYRES32, @ANYBLOB="000000006bfe00"/28, @ANYRES32, @ANYBLOB="00000000ff0700"/28, @ANYRES32, @ANYBLOB="000000002cf600"/28, @ANYRES32, @ANYBLOB="000000000300"/28, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00T\x00'/28]) dup2(0xffffffffffffffff, r7) ioctl$SG_IO(r7, 0x2285, &(0x7f0000000a40)={0x53, 0xfffffffffffffffb, 0x2e, 0x0, @scatter={0x9, 0x0, &(0x7f0000000800)=[{&(0x7f0000000000)=""/35, 0x23}, {&(0x7f00000001c0)=""/162, 0xa2}, {&(0x7f0000000540)=""/176, 0xb0}, {&(0x7f00000000c0)=""/74, 0x4a}, {&(0x7f00000003c0)=""/75, 0x4b}, {&(0x7f0000000600)=""/255, 0xff}, {&(0x7f0000000700)=""/75, 0x4b}, {&(0x7f0000000040)}, {&(0x7f0000000780)=""/123, 0x7b}]}, &(0x7f00000008c0)="6591ca9d00ddcc00c1c4762e1e86704c355e174b9e2bcfa79a5b2124428b1e6090baa48f49025dee4f77d2fb6d82", &(0x7f0000000900)=""/209, 0xfdb4, 0x10000, 0x3, &(0x7f0000000a00)}) pipe(&(0x7f0000000280)) ioctl$SNDRV_TIMER_IOCTL_TREAD(r5, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:14:11 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:14:11 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:14:11 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x3, 0xffffffffffffffff, 0x5) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) [ 2104.090832] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.0'. 23:14:11 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:14:11 executing program 7: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r1, &(0x7f00000002c0)=""/225, 0xe1) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) dup2(r1, r1) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$SG_IO(r3, 0x1274, 0x0) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = syz_io_uring_complete(0x0) r6 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r5}) write$binfmt_elf64(r4, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c467f020604a50e00000000000002003f0000180000ccbc5549ffffffff40000000000000001e0300000000000006000000050238000100321f0100000100000000030000000500000000000000ff00000000000000a201000000000000d70d0000000000000300000010000000ffff0000000000005563cd9a58df47eb7fe1862c4d6716e03dda73ad03bcf3986c50d4e8aa28c957073d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f40000000000"], 0xc7) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r5) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) ioctl$SNDRV_TIMER_IOCTL_TREAD(r5, 0x40045402, &(0x7f0000000480)=0x1) syz_io_uring_setup(0xbff, &(0x7f00000000c0)={0x0, 0xb0c7, 0x8, 0x3, 0x316, 0x0, r6}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ff4000/0xc000)=nil, &(0x7f0000000040), &(0x7f00000001c0)) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:14:11 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000000)={{0x1, 0x1, 0x18, r3, {0x3}}, './file0\x00'}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r5, r4) r6 = fcntl$dupfd(r3, 0x0, r5) ioctl$SG_IO(r6, 0x1274, 0x0) r7 = dup2(r1, r1) r8 = syz_io_uring_complete(0x0) r9 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r8}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r8, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r9, {0x1}}, './file0\x00'}) write$binfmt_elf64(r7, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x0, r8) ioctl$SNDRV_TIMER_IOCTL_TREAD(r8, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:14:11 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) dup2(r1, r1) r5 = syz_io_uring_complete(0x0) r6 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r5, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r6, {0x1}}, './file0\x00'}) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r5) ioctl$SNDRV_TIMER_IOCTL_TREAD(r5, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:14:12 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:14:12 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x20800) unshare(0x48020200) 23:14:12 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) add_key$keyring(0x0, &(0x7f0000000780)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) unshare(0x48020200) 23:14:12 executing program 7: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN(0xffffffffffffffff, 0x4040942c, &(0x7f00000000c0)={0x0, 0x9, [0x8001, 0x7, 0xfffffffffffffffe, 0x8, 0x1ff, 0x100000000]}) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCBRDELBR(r7, 0x89a1, &(0x7f0000000040)='veth1_to_batadv\x00') write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r8, 0x0, r6) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:14:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) [ 2104.464998] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.0'. 23:14:25 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xfffdffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) dup2(r1, r1) r5 = syz_io_uring_complete(0x0) r6 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r5, 0xc018937c, &(0x7f0000000440)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r6, @ANYBLOB="01003000"]) pipe(&(0x7f0000000280)={0xffffffffffffffff}) lseek(0xffffffffffffffff, 0x7, 0x0) r8 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r8, 0xffffffffffffffff, 0x0, 0x7ffffff9) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) fcntl$dupfd(r7, 0x0, r5) ioctl$SNDRV_TIMER_IOCTL_TREAD(r5, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:14:25 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) add_key$keyring(0x0, &(0x7f0000000780)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) unshare(0x48020200) 23:14:25 executing program 2: r0 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:14:25 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) [ 2117.925013] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.0'. 23:14:25 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) r7 = io_uring_setup(0x7cec, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r7, {0x1}}, './file0\x00'}) write$binfmt_elf64(r5, &(0x7f0000000bc0)={{0x7f, 0x45, 0x4c, 0x46, 0x3f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x0, r6) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:14:25 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:14:25 executing program 7: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x149941, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0x400c7e7, 0x20, 0x3, 0x175, 0x0, r6}) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r7, 0x0, r6) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r9, 0x89f0, &(0x7f00000003c0)={'syztnl2\x00', &(0x7f0000000200)={'syztnl1\x00', 0x0, 0x40, 0x20, 0x1, 0x4, {{0xd, 0x4, 0x3, 0x3d, 0x34, 0x65, 0x0, 0x5, 0x29, 0x0, @empty, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4, 0x1}, @ssrr={0x89, 0x1b, 0x28, [@empty, @rand_addr=0x64010100, @loopback, @multicast1, @broadcast, @private=0xa010102]}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r6, 0x8933, &(0x7f0000003940)={'wg2\x00', 0x0}) sendmmsg$inet(r8, &(0x7f0000003a40)=[{{&(0x7f0000000040)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x34}}, 0x10, &(0x7f00000001c0)=[{&(0x7f00000000c0)="a1b54a5301dbbac413258ec9ef5e1c4028d6a1303ada874bfd2fdff1e45a42ce4df3c82699f405c9fc414df6cb786050c8a9a40382ed4b10d814185b6e783ad7b0bc9e25b13a822d31a8a1f130aac0c5bc88a3c8fd", 0x55}], 0x1, &(0x7f0000000540)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0xd}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x9}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x34}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010101, @remote}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r10, @multicast1, @dev={0xac, 0x14, 0x14, 0xd}}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private=0xa010100, @private=0xa010101}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x9}}], 0xd8}}, {{0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000400)="9475055e12cf6f9d28bba8d3db", 0xd}, {&(0x7f0000000640)="ea699cba11482afac4eed236471d0eba5cbc51a90325b210c1a23b078f222289f2bb4ed212e8f7f9887c7c6b813de6832d7aae7cc42e4947ddf93b9eb8696b9027c79bc50681d2169b7307815481acbc4d4aac1b18d36393e354a054417583712cb7c6cb65c00cd2552293bdf21309bb08a84577067bbf5747298dcfacc89428", 0x80}, {&(0x7f00000006c0)="d8d8c7ab96bf2289735b7d0488f55aa9afc499044698434290e554271510b20378f8ee5eba730c0e847f98139a80e883c973b9408854e473f27ec7f6b336459a123ee945ef50bb0b2264462e01d74286d9845ae5bdc406d51235f8c5566b7d", 0x5f}, {&(0x7f0000000bc0)="847a9a973cb64966cdb8f06b12a135bfd500a9f5aeed6b74cad43c7416c7020c0cbfb27b118c1c9bac02d74ccf8f28349610bd8b4e1e03ee9e43b633b15e07f357268ecb86b66095581181a633e325734323d181d479ac4b722141c6fbc8a245ebc83e4da7f67cebae34e4f17890446a0903c062ac4c1c99aff025f724fa69b93e859e16108649f632a62d31f1734f6f2ebd66087d908e64faa196108bb555aa1683695ce3621781942a", 0xaa}, {&(0x7f0000000440)='P~', 0x2}, {&(0x7f0000000c80)="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", 0x1000}], 0x6, &(0x7f0000001e00)=ANY=[@ANYBLOB="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"], 0x1b8}}, {{&(0x7f0000001c80)={0x2, 0x4e22, @private=0xa010102}, 0x10, &(0x7f0000003140)=[{&(0x7f0000001cc0)="a942f5501017696037daea6dc6a2dd278640f85971d3d769ae04f73235513da2e5e5321c5ba22ca065b1eac10511606fea772fe05fa6c5812cc0e7fbd67808c20447109bde335636be0a73cb21d1280414c843499670fd85a4bcc01be5f4d2edf8dac0b13a4d16e30b2a891e06043430e0fccb8e90a47357aa09b2ab7bf5765d1fd56512cbe2c6b1", 0x88}, {&(0x7f0000001fc0)="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", 0x1000}, {&(0x7f0000002fc0)="e0122a18ca93bd3b6657aaab3564da47f00c679c5e95fd87", 0x18}, {&(0x7f0000003000)="68cc79bc29d015f99cfcbc2b5fe5af9e43a6df7755a7952c6dc7fa5aea36a9c62cdf60f1a21857ad88e204e51d14dc18d29dcecfc653ed919e21d86af309ef0e4c01f341357a68a49c08dcbe34dbbb50cb1ce51f9abd2b6815aaa02af515f0", 0x5f}, {&(0x7f0000003080)="08f62dab7ee944e9013c257b8c89367a07ec2da4823831fbb28eeabfc656dfe510c731a82c491e5a8bfca46694b1c19e3a6b7ba85e15e01b34c93fcec305fcff7655a62be8151885a7403413ee494d5e002bf4d769fe", 0x56}, {&(0x7f0000003100)="1f60437ac44c87034c3d14b4ca", 0xd}], 0x6, &(0x7f00000031c0)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x3ff}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}, @ip_ttl={{0x14, 0x0, 0x2, 0x1000}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast1, @broadcast}}}], 0x68}}, {{0x0, 0x0, &(0x7f0000003500)=[{&(0x7f0000003240)="6c78389890cb9c6e8418d9ac26db61239b1efcc60d151b720df12e0bdff41bdfbb2013ec451f42d35f8b5574985e52c847338610da5ab7fa0753f5c5cf41d8937ec11112e41006bf", 0x48}, {&(0x7f00000032c0)="42d595482f09df287478cf3e20042dfe4c4e1baa5681ec6b9451d773d93976735b5c5aaf019d60eee3fcfe4c6257e6b76cb8342d64e028286a29bce8c1fffbefbd5e5b1ea3fd52778e9d0865072bd2d42b3b631c642402abefe3034a6237fb865c9717c84d665cc91b2f49f4a90156f4e45c276342ebe54e479d16bed5bdfe49385655cba12751481312b76b4c8396fba91a1d8034cb88ae71bfaccc3616a2da9606be44e888cd", 0xa7}, {&(0x7f0000003380)="c40734e7e28b7733db0007bffcd19edd421bfce0e1b44047cd30effa56b5aaf4704827d58dab684c8742e85dc966cc4f295da1da1e9095a46317aa476d7df3b5681f4df6d95c0fb248c490d0bad80371a901cd74676166512cc7e9afe1c429f3f63a1f895536e2a92d40f4656eba70648536da7f992a868a017b1222faa8946467d010d6f6a2d2400cf9f2a87cd8448b922bb92a5240a1a261fa5a44401aca83806970a403e10cd13a73f141cb213de28b990329043cc8352a7268661843", 0xbe}, {&(0x7f0000003440)="a8e66b13baba375268946a4c7c63d95ab20a54a281eaf94d9dcb99f4dc7bf31c0002bebe3a6fb4e3de021b2f3d76b795ef9d473624e569e074601adb4fe019ebf5ea90a29e7efc9a6f0587", 0x4b}, {&(0x7f00000034c0)="b61c", 0x2}], 0x5, &(0x7f0000003580)=[@ip_tos_int={{0x14, 0x0, 0x1, 0xdf}}], 0x18}}, {{&(0x7f00000035c0)={0x2, 0x4e24, @loopback}, 0x10, &(0x7f0000003600), 0x0, &(0x7f0000003bc0)=ANY=[@ANYBLOB="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"], 0x138}}, {{0x0, 0x0, &(0x7f0000003900)=[{&(0x7f0000003780)="9d3e6521a5117951b94b9117bc708a17926ec43eb63a4ce3ca4ee401f2aea5792d84f1e322d1625c42496d915028a4b1299d56d3f4310af83b1d83f524a4fbfe32ff5c9f0f019a6e86693caa64a45ae07f46f515a8c981202eeee5e20fcfeb8cdba51f43fb2b385caedb8c5ff2a3eefd6510fc88eefbd8ffb0b0230fd9fd81cd9dba0b8ddfe85c30adb19b1882f5be0f8ce286a14c8103dfba4dd43ec4c8a775d1a1671820c61eace4988abcedacb0a5a6357e8b4ab940a0d13588fd595222dfb4b9c3fdb61a7ebf2ffa559075d3c1bfcf710b8f8a", 0xd5}, {&(0x7f0000003880)="3b745b1c22f36d0d0cc62a508af1282a61f6a89d8d16f366ffebc14597cbac4dc74170e76c05af33b1f829f53227fed6eabdbab10aecb3204d6704bd5627999b3a0d81a7950a6b0cc114cc33af361efaef76153190630fbb1d0e88e4f0917f321664dfd0bd785bf2076c3e501a", 0x6d}], 0x2, &(0x7f0000003980)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @dev={0xac, 0x14, 0x14, 0x14}}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r11, @loopback, @rand_addr=0x64010102}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x8}}, @ip_retopts={{0x68, 0x0, 0x7, {[@rr={0x7, 0x27, 0xf2, [@broadcast, @local, @dev={0xac, 0x14, 0x14, 0xe}, @broadcast, @remote, @loopback, @private=0xa010100, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @rr={0x7, 0x7, 0x39, [@private=0xa010102]}, @noop, @ra={0x94, 0x4}, @timestamp_addr={0x44, 0x1c, 0xdd, 0x1, 0x2, [{@rand_addr=0x64010102}, {@empty, 0x7fffffff}, {@loopback, 0x5}]}, @ra={0x94, 0x4, 0x1}, @ra={0x94, 0x4}]}}}], 0xc0}}], 0x6, 0x404c0d4) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:14:25 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x20800) unshare(0x48020200) 23:14:25 executing program 2: r0 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:14:25 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:14:25 executing program 7: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r5 = dup2(r4, r3) r6 = fcntl$dupfd(r5, 0x406, 0xffffffffffffffff) ioctl$SG_IO(r6, 0x1274, 0x0) r7 = dup2(r1, r1) r8 = syz_io_uring_complete(0x0) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r8}) write$binfmt_elf64(r7, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"/967], 0x3c7) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r9, 0x0, r8) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) ioctl$SNDRV_TIMER_IOCTL_TREAD(r8, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:14:25 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) dup2(0xffffffffffffffff, r1) r5 = syz_io_uring_complete(0x0) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175}) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r8 = dup2(r7, r6) lseek(r8, 0x7, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r5, 0xc018937c, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r8, @ANYBLOB="01000000000000001d2f46696c650100"]) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r9, 0x0, r5) ioctl$SNDRV_TIMER_IOCTL_TREAD(r5, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:14:25 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r2, r1, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:14:25 executing program 2: r0 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:14:25 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) r7 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r7, {0x1}}, './file0\x00'}) write$binfmt_elf64(r5, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c467e020600a50e00000000000002003e0000180000000000000000000040000000000000001e0300000000000006000000050238000100321f0100000100000000030000000500000000000000ff00000000000000a200000000000000d70d0000000000000300000010000000ffff0000000000005563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffe700"/967], 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x0, r6) r8 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r9 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r9, r8) sendfile(r2, r9, &(0x7f0000000000)=0x9ab, 0x7) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:14:25 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:14:25 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r2, r1, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:14:39 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r1, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:14:39 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r2, r1, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:14:39 executing program 7: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r5, 0xffffffffffffffff) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/173, 0xad, 0xfffffffffffffff7) r6 = dup2(r1, r1) r7 = syz_io_uring_complete(0x0) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r7}) write$binfmt_elf64(r6, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r8, 0x0, r7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) ioctl$SNDRV_TIMER_IOCTL_TREAD(r7, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') [ 2131.479149] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.1'. 23:14:39 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) unshare(0x48020200) 23:14:39 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) r5 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r2, r5, 0x80000) ioctl$SG_IO(r4, 0x1274, 0x0) dup2(r1, r1) r6 = syz_io_uring_complete(0x0) r7 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000440)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r7, @ANYBLOB="01f93000"]) pipe(&(0x7f0000000280)={0xffffffffffffffff}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7ffffff9) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(0xffffffffffffffff, 0x8010671f, &(0x7f0000000000)={&(0x7f00000001c0)=""/135, 0x87}) fcntl$dupfd(r8, 0x0, r6) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:14:39 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:14:39 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0), 0x20a501, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0xff, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) r5 = fcntl$dupfd(r3, 0x406, r1) ioctl$SG_IO(r5, 0x1274, 0x0) r6 = dup2(r1, r1) r7 = syz_io_uring_complete(0x0) read(r3, &(0x7f00000001c0)=""/169, 0xa9) r8 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r7}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r7, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r8, {0x1}}, './file0\x00'}) write$binfmt_elf64(r6, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"/967], 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x0, r7) ioctl$SNDRV_TIMER_IOCTL_TREAD(r7, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:14:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x20800) unshare(0x48020200) [ 2131.499212] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.0'. 23:14:39 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r2, r1, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:14:39 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r1, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:14:39 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) r7 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r7, {0x1}}, './file0\x00'}) write$binfmt_elf64(r5, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"/967], 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x0, r6) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:14:39 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) dup2(r1, r1) r5 = syz_io_uring_complete(0x0) io_setup(0x3, &(0x7f0000000000)=0x0) io_submit(r6, 0x0, &(0x7f0000000040)) readv(r5, &(0x7f0000000700)=[{&(0x7f00000000c0)=""/92, 0x5c}, {&(0x7f0000000040)=""/37, 0x25}, {&(0x7f00000003c0)=""/187, 0xbb}, {&(0x7f0000000540)=""/60, 0x3c}, {&(0x7f0000000580)=""/152, 0x98}, {&(0x7f0000000640)=""/142, 0x8e}], 0x6) r7 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r5, 0xc018937c, &(0x7f00000001c0)=ANY=[@ANYBLOB="68941922ca5742415d0cb7c60a4bb1fac12d197bf5b3cedabd68ac060d54f753a25f17a6faac8c3405eb0faec4d49944ecf32372e4be90b185e1e36a090a44e920efe68270ac5b71a0a71a5062ce2c407b6ab38bf87609ab9ff6716f9aeba060644572f62627de4bcd5b146e04eeebe6f69b5675c75a4af70bd8857ceec2effc4c06a8e998caaa0df6f66cd09a9ea074c0c7a700685886e32e36068050a87219f380", @ANYRES32=r7, @ANYBLOB="01000000000000002e2f66696c653000"]) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r8, 0x0, r5) ioctl$SNDRV_TIMER_IOCTL_TREAD(r5, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:14:39 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:14:39 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r2, r1, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:14:39 executing program 7: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x7ffffff9) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00') r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r3, &(0x7f00000002c0)=""/225, 0xe1) r4 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$SG_IO(r5, 0x1274, 0x0) r6 = dup2(r2, r2) r7 = syz_io_uring_complete(0x0) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r7}) write$binfmt_elf64(r6, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r8, 0x0, r7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) ioctl$SNDRV_TIMER_IOCTL_TREAD(r7, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:14:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x20800) unshare(0x48020200) [ 2131.686275] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.1'. 23:14:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r1, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:14:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x20800) unshare(0x48020200) 23:14:52 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) lseek(0xffffffffffffffff, 0x7, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x7ffffff9) write(0xffffffffffffffff, &(0x7f00000001c0)="e1bc8c80206a009b81234657359f98a3d47f7f826524d67dd6571189b6f321d1a4425e9c87e2ac617349d734f5408bc9d9f53968ffcba9921bd80db26afa41be8b4aca47a80aea5658cc220bfcaa3a66003dcf099af2c92047c8de30c51f31030cfb5176c4ed4b7b532a96881ca5ada204b7d312ca09c3dcaa5e2299ef53e319e17855469769f230fe87302f2dbce4d23e3a22a0290abe59abe271ed4e1866f4e300e86fe68342fb14930af4dc8466d1f9b42044051b76776fd0e3b8253e00a5f148865fd536484c237b250471bc6d77934003228e5e67889369fb", 0xdb) r2 = perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x0, @perf_config_ext={0xf0d5, 0x1}, 0x800, 0x0, 0x0, 0x7, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r3, &(0x7f00000002c0)=""/225, 0xe1) r4 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$SG_IO(r5, 0x1274, 0x0) r6 = dup2(r2, r2) r7 = syz_io_uring_complete(0x0) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r7}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000000)=ANY=[@ANYBLOB="296b087cb41e7d14e9329212db694b7eb3aef6184aab76ae74dc5d4c4324a28a2879be19bda2d93d7d90dd38ad975d707df716893322206cde4808c07adb02a0f3760251e3dd0aa7d00c216306e18d80942c6c0d92"]) write$binfmt_elf64(r6, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x236, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x0, r7) ioctl$SNDRV_TIMER_IOCTL_TREAD(r7, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:14:52 executing program 7: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) r7 = socket$netlink(0x10, 0x3, 0x7) pwrite64(r7, &(0x7f0000000040)="265304e4ae178ceeb2bf227693a3cb869fa5659b1f1c1fabe30824e47e1257db1d7018e586851dd0a15a0e3fffda5d", 0x2f, 0xfffffffffffff800) write$binfmt_elf64(r5, &(0x7f0000000bc0)=ANY=[@ANYBLOB="7f454c467f020600a50e00000000000002003e0000180000000000000000000040000000000000001e0300000000000006000000050238000100321f0100000100000000030000000500000000000000ff00000000000000a200000000000000d70d0000000000000300000010000000ffff0000000000005563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12c84b4c79f4005c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000094fe30dd0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004b04aaf2000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000282b50805d66ef267777ffbf9fb19a204a458514d2ffcff1fedd5d5e14905900"/999], 0x3c7) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r8, 0x0, r6) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000000c0)={0xa76, 0x3, 0xb4a9, 0x0, 0x6}) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:14:52 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) unshare(0x48020200) 23:14:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:14:52 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r2, r1, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:14:52 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x3009, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) dup2(r1, r1) r5 = syz_io_uring_complete(0x0) r6 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r5, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r6, {0x1}}, './file0\x00'}) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r5) ioctl$SNDRV_TIMER_IOCTL_TREAD(r5, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') [ 2144.838745] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.1'. 23:14:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) [ 2144.842832] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.0'. 23:14:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, 0x0, 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:14:52 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r1, &(0x7f00000002c0)=""/225, 0xe1) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) syz_io_uring_submit(0x0, 0x0, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r5, r4) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_FILES_UPDATE={0x14, 0x1, 0x0, 0x0, 0x7fff, &(0x7f00000001c0)=[r5], 0x1, 0x0, 0x1}, 0x7) ioctl$SG_IO(r3, 0x1274, 0x0) r6 = syz_io_uring_complete(0x0) r7 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r7, {0x1}}, './file0\x00'}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0x0, 0x2, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x0, r6) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:14:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) sendfile(0xffffffffffffffff, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:14:52 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) dup2(r1, r1) r5 = syz_io_uring_complete(0x0) r6 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xa731, 0x2, 0x3, 0x175}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r5, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r6, {0x1}}, './file0\x00'}) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r5) ioctl$SNDRV_TIMER_IOCTL_TREAD(r5, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:14:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:14:52 executing program 7: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$SG_IO(r5, 0x1274, 0x0) r6 = dup2(r1, r1) r7 = syz_io_uring_complete(0x0) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r7}) write$binfmt_elf64(r6, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r8, 0x0, r7) ioctl$TIOCGPGRP(r6, 0x540f, &(0x7f0000000040)=0x0) syz_open_procfs(r9, &(0x7f00000000c0)='net/protocols\x00') openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) ioctl$SNDRV_TIMER_IOCTL_TREAD(r7, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:14:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) sendfile(0xffffffffffffffff, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:15:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, 0x0, 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:15:05 executing program 7: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) write$binfmt_elf64(r5, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x3c7) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:15:05 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="98000000200039040000000000000000020000000dc0c23671f1a964651e4d52c3dc9432e6af519d60c901a7ea83dce8f6a9c36adbbf7c23348ed7953cc124f0f2e2f1324bf1187b4e1f5a7bf5116e03f38056144e4fd6711849a6579e46004fbfb9ae80572129d57aa41a4c792b56978ebd2e72f57ca14145d7bcd879afed4e97abd691d56cf2d815f272170c0011000000000000000000bb3e3c7562af739c74b82fd57e7bd51e163e9c2394948632056b9357f234b64631cba457c59e6d0eae9098c89e3c7aa8b1cbc03bd674263161cff69945516e14595dfad881c353d7fb9bbdc2fb19f3306b4f29f5ac8dddb92ee4fe33f6e190dffd186aa055b9a9547a834f1d6190acda5d78a8cff254a2de72f20938d689ca4044e9b0a3ee3627818c70cc78d1fe11e55c898d61e09dd9cc4bdefd952f33d4697d06ffd93de78dd16ff6fabb99fb6b42eb449d317ff0f62c982878d984496c08a7a672102affbb245b18bb390e66298d7220110693dd4d00d4a7b9a75298857b75fa243b23c8cf9643bb00000000006dabf39491a19826dd17133c71e29784f2335028a747a6113ad6efdfbffa7205050056d0ee75b2f729232cc5bd028e654e69b60ba5313c46aa44ffefefa1dd182aa574a6fa732d6708584982012bb16aaceda807d810ad63ccfa5203bc3b2fac19fa9b5cd3d3f3e3cd43ced0a0870700adae78cb262f235c0401058ea209faecd0a5262bbda1d50def7cbef31c9b3ac3140d4741d25a4f0277c0ede8517e65b43a81d4e70e4f7c8f3e4c6b059a695c"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) unshare(0x48020200) 23:15:05 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) sendfile(0xffffffffffffffff, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) [ 2158.066337] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.0'. 23:15:05 executing program 1: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) unshare(0x48020200) 23:15:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r2, r1, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:15:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, 0x0, 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) [ 2158.089542] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.1'. 23:15:05 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) r7 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r7, {0x1}}, './file0\x00'}) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) openat$incfs(r2, &(0x7f0000000000)='.pending_reads\x00', 0x0, 0x80) fcntl$dupfd(0xffffffffffffffff, 0x0, r6) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:15:05 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) dup2(r1, r1) r5 = syz_io_uring_complete(0x0) r6 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r5, 0xc018937c, &(0x7f0000000440)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r6, @ANYBLOB="d85d3f00100000000000000000e8ffff"]) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r5) ioctl$SNDRV_TIMER_IOCTL_TREAD(r5, 0x40045402, &(0x7f0000000480)=0x1) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = getpgrp(0x0) pidfd_open(r9, 0x0) fcntl$lock(r8, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r9}) syz_open_procfs(r9, &(0x7f0000000140)='net/ptype\x00') 23:15:05 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:15:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:15:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r2, r1, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:15:05 executing program 7: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4"}, 0xc7) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:15:05 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) dup2(r1, r1) r5 = syz_io_uring_complete(0x0) r6 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r5, 0xc018937c, &(0x7f0000000540)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r6, @ANYBLOB="01000000000000002e2f66696c653000a0d26458cfe8fa235b759b1d24c758a8d8b54ff1ad92491d3d643325d6a0afbf8a8e62ae20dafc08917abe208f548e2c580ff2a3e1548c04a8f6331e81a389bab86a46faf204d9fc671e3e549ad475036ebf50dfe755c926270677d6a024a4a5d7d3930d7b4c4cefa48137ea5219e528d0063740b95f93e0e21de73c1b2909ca2ff557514e4c32ae55f889346ab40c85e57effc557190f084109856e785bbd1af0639cfb69b9327dbb5b6233d929c232a514"]) pipe(&(0x7f0000000040)={0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r5) ioctl$SNDRV_TIMER_IOCTL_TREAD(r5, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:15:05 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xa, 0xffffffffffffffff, 0x8) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) r7 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r7, {0x1}}, './file0\x00'}) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x0, r6) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:15:19 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:15:19 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) dup2(r1, r1) r5 = syz_io_uring_complete(0x0) r6 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r5, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r6, {0x1}}, './file0\x00'}) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r5) ioctl$SNDRV_TIMER_IOCTL_TREAD(r5, 0x40045402, &(0x7f0000000480)=0x1) syz_open_dev$sg(&(0x7f0000000000), 0x6, 0x10040) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:15:19 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') syz_open_dev$hidraw(&(0x7f0000000000), 0x80000000, 0x101000) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) read(r2, &(0x7f00000002c0)=""/184, 0xb8) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) r7 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r7, {0x1}}, './file0\x00'}) write$binfmt_elf64(r5, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"/967], 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x0, r6) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') [ 2171.360721] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2171.363505] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.0'. 23:15:19 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r2, r1, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:15:19 executing program 1: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) unshare(0x48020200) 23:15:19 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:15:19 executing program 7: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) close_range(r0, r0, 0x2) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0xbf, 0x0, r6}) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000680)=ANY=[@ANYBLOB="02000000010004000000000002000000", @ANYRES32=0x0, @ANYBLOB="02000600", @ANYRES32=0x0, @ANYBLOB="040002000000000008000000", @ANYRES32=0x0, @ANYBLOB="08000300", @ANYRES32=0x0, @ANYBLOB="0c400100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="10000400000000002000040000000000"], 0x54, 0x3) fchown(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:15:19 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) add_key$keyring(0x0, &(0x7f0000000780)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) unshare(0x0) 23:15:19 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r2, r1, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:15:19 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:15:19 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) add_key$keyring(0x0, &(0x7f0000000780)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) unshare(0x0) 23:15:19 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) [ 2171.506831] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.0'. 23:15:19 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4"}, 0xc7) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:15:19 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0xff, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) r7 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r7, @ANYBLOB="01000000050000002e2f66696c653000754b9e0df872af6f95c10857aa1c4fce18a6acd25d2c186768cbd6c08cae22a39086b9f6a3baa83f03a2fa87747ad2139993f1a7f64759c6d00cdeafd7afb5709c4204def2c23dde73689865100a7c4cc4565f76cc33a5427bb95ab29dc6fd45b3715618"]) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x0, r6) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:15:19 executing program 7: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x32, 0x0, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f22, 0x1, 0x100}, [], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x38f) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:15:19 executing program 1: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="98000000200039040000000000000000020000000dc0c23671f1a964651e4d52c3dc9432e6af519d60c901a7ea83dce8f6a9c36adbbf7c23348ed7953cc124f0f2e2f1324bf1187b4e1f5a7bf5116e03f38056144e4fd6711849a6579e46004fbfb9ae80572129d57aa41a4c792b56978ebd2e72f57ca14145d7bcd879afed4e97abd691d56cf2d815f272170c0011000000000000000000bb3e3c7562af739c74b82fd57e7bd51e163e9c2394948632056b9357f234b64631cba457c59e6d0eae9098c89e3c7aa8b1cbc03bd674263161cff69945516e14595dfad881c353d7fb9bbdc2fb19f3306b4f29f5ac8dddb92ee4fe33f6e190dffd186aa055b9a9547a834f1d6190acda5d78a8cff254a2de72f20938d689ca4044e9b0a3ee3627818c70cc78d1fe11e55c898d61e09dd9cc4bdefd952f33d4697d06ffd93de78dd16ff6fabb99fb6b42eb449d317ff0f62c982878d984496c08a7a672102affbb245b18bb390e66298d7220110693dd4d00d4a7b9a75298857b75fa243b23c8cf9643bb00000000006dabf39491a19826dd17133c71e29784f2335028a747a6113ad6efdfbffa7205050056d0ee75b2f729232cc5bd028e654e69b60ba5313c46aa44ffefefa1dd182aa574a6fa732d6708584982012bb16aaceda807d810ad63ccfa5203bc3b2fac19fa9b5cd3d3f3e3cd43ced0a0870700adae78cb262f235c0401058ea209faecd0a5262bbda1d50def7cbef31c9b3ac3140d4741d25a4f0277c0ede8517e65b43a81d4e70e4f7c8f3e4c6b059a695c"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) unshare(0x48020200) 23:15:19 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r2, r1, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:15:19 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:15:19 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r2, r1, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:15:19 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r8 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r8, r7) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) write$binfmt_elf64(r5, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x0, r6) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') openat(r9, &(0x7f0000000000)='./file0\x00', 0x50401, 0x4) [ 2171.626887] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.1'. 23:15:33 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) add_key$keyring(0x0, &(0x7f0000000780)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) unshare(0x0) 23:15:33 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r2, r1, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:15:33 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$SG_IO(r3, 0x1274, 0x0) r4 = dup2(r1, r1) r5 = syz_io_uring_complete(0x0) r6 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r5}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r5, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r6, {0x1}}, './file0\x00'}) write$binfmt_elf64(r4, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$SNDRV_TIMER_IOCTL_TREAD(r5, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:15:33 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="98000000200039040000000000000000020000000dc0c23671f1a964651e4d52c3dc9432e6af519d60c901a7ea83dce8f6a9c36adbbf7c23348ed7953cc124f0f2e2f1324bf1187b4e1f5a7bf5116e03f38056144e4fd6711849a6579e46004fbfb9ae80572129d57aa41a4c792b56978ebd2e72f57ca14145d7bcd879afed4e97abd691d56cf2d815f272170c0011000000000000000000bb3e3c7562af739c74b82fd57e7bd51e163e9c2394948632056b9357f234b64631cba457c59e6d0eae9098c89e3c7aa8b1cbc03bd674263161cff69945516e14595dfad881c353d7fb9bbdc2fb19f3306b4f29f5ac8dddb92ee4fe33f6e190dffd186aa055b9a9547a834f1d6190acda5d78a8cff254a2de72f20938d689ca4044e9b0a3ee3627818c70cc78d1fe11e55c898d61e09dd9cc4bdefd952f33d4697d06ffd93de78dd16ff6fabb99fb6b42eb449d317ff0f62c982878d984496c08a7a672102affbb245b18bb390e66298d7220110693dd4d00d4a7b9a75298857b75fa243b23c8cf9643bb00000000006dabf39491a19826dd17133c71e29784f2335028a747a6113ad6efdfbffa7205050056d0ee75b2f729232cc5bd028e654e69b60ba5313c46aa44ffefefa1dd182aa574a6fa732d6708584982012bb16aaceda807d810ad63ccfa5203bc3b2fac19fa9b5cd3d3f3e3cd43ced0a0870700adae78cb262f235c0401058ea209faecd0a5262bbda1d50def7cbef31c9b3ac3140d4741d25a4f0277c0ede8517e65b43a81d4e70e4f7c8f3e4c6b059a695c"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) unshare(0x48020200) 23:15:33 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:15:33 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:15:33 executing program 7: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r8 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fcntl$dupfd(r8, 0x406, r6) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') syz_emit_ethernet(0x1a1, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x0) 23:15:33 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r2, r1, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) [ 2185.746549] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.0'. 23:15:33 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, 0x0, 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:15:33 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r2, r1, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) [ 2185.825930] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.1'. 23:15:33 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="98000000200039040000000000000000020000000dc0c23671f1a964651e4d52c3dc9432e6af519d60c901a7ea83dce8f6a9c36adbbf7c23348ed7953cc124f0f2e2f1324bf1187b4e1f5a7bf5116e03f38056144e4fd6711849a6579e46004fbfb9ae80572129d57aa41a4c792b56978ebd2e72f57ca14145d7bcd879afed4e97abd691d56cf2d815f272170c0011000000000000000000bb3e3c7562af739c74b82fd57e7bd51e163e9c2394948632056b9357f234b64631cba457c59e6d0eae9098c89e3c7aa8b1cbc03bd674263161cff69945516e14595dfad881c353d7fb9bbdc2fb19f3306b4f29f5ac8dddb92ee4fe33f6e190dffd186aa055b9a9547a834f1d6190acda5d78a8cff254a2de72f20938d689ca4044e9b0a3ee3627818c70cc78d1fe11e55c898d61e09dd9cc4bdefd952f33d4697d06ffd93de78dd16ff6fabb99fb6b42eb449d317ff0f62c982878d984496c08a7a672102affbb245b18bb390e66298d7220110693dd4d00d4a7b9a75298857b75fa243b23c8cf9643bb00000000006dabf39491a19826dd17133c71e29784f2335028a747a6113ad6efdfbffa7205050056d0ee75b2f729232cc5bd028e654e69b60ba5313c46aa44ffefefa1dd182aa574a6fa732d6708584982012bb16aaceda807d810ad63ccfa5203bc3b2fac19fa9b5cd3d3f3e3cd43ced0a0870700adae78cb262f235c0401058ea209faecd0a5262bbda1d50def7cbef31c9b3ac3140d4741d25a4f0277c0ede8517e65b43a81d4e70e4f7c8f3e4c6b059a695c"], 0x98}}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x20800) unshare(0x48020200) 23:15:33 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:15:33 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, 0x0, 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:15:33 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x1, 0x67, 0xf1, 0x0, 0x100, 0x102, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x87a9, 0x2, @perf_bp={&(0x7f0000000000), 0x2}, 0x4d010, 0x5b4d0e4, 0x8, 0x1, 0x1caa, 0x0, 0x9e, 0x0, 0x5, 0x0, 0x6}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0xb) r7 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r7, {0x1}}, './file0\x00'}) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x0, r6) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:15:48 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) unshare(0x48020200) 23:15:48 executing program 7: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x523043, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e9, 0x20, 0x1, 0x175, 0x0, r6}) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:15:48 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) unshare(0x48020200) [ 2200.707501] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.5'. 23:15:48 executing program 0: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PTP_ENABLE_PPS(r1, 0x40043d04, 0x1) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r3, &(0x7f00000002c0)=""/225, 0xe1) r4 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$SG_IO(r5, 0x1274, 0x0) r6 = dup2(r2, r2) r7 = syz_io_uring_complete(0x0) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r7}) write$binfmt_elf64(r6, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r8, 0x0, r7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) ioctl$SNDRV_TIMER_IOCTL_TREAD(r7, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:15:48 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r2, r1, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:15:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, 0x0, 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:15:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r1, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:15:48 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/115, 0x73}, {&(0x7f00000001c0)=""/190, 0xbe}, {&(0x7f0000000540)=""/177, 0xb1}, {&(0x7f0000000600)=""/183, 0xb7}, {&(0x7f00000006c0)=""/205, 0xcd}, {&(0x7f0000000bc0)=""/228, 0xe4}, {&(0x7f0000000cc0)=""/175, 0xaf}, {&(0x7f0000000d80)=""/214, 0xd6}], 0x8) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) r7 = dup2(r6, r5) r8 = io_uring_setup(0x7412, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x2, 0x297, 0x0, r7}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r8, {0x1}}, './file0\x00'}) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x0, r6) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:15:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:15:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r1, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:15:48 executing program 0: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff}) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x26, 0x1f, 0x2, 0x3, 0x0, 0x7fffffff, 0x8, 0xd, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x4, 0x2}, 0x80010, 0x3e6d, 0x1e6b, 0x1, 0x0, 0x7, 0xfff, 0x0, 0x9}, 0x0, 0x0, r2, 0x8) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) dup2(r1, r1) r5 = syz_io_uring_complete(0x0) r6 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r6}, './file0\x00'}) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r5) ioctl$SNDRV_TIMER_IOCTL_TREAD(r5, 0x40045402, &(0x7f0000000480)=0x1) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000000)={'syztnl2\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB='ip_vti0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="5bf658a75d7b0089cf512d86c92472f2"]}) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@private2, r8}, 0x14) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:15:48 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r2, r1, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:15:48 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8, 0x0, 0x4, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x10000000000000, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) r7 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r7, {0x1}}, './file0\x00'}) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) inotify_init1(0x80000) r8 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x105142, 0x0) r9 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r10 = dup2(r9, r8) fcntl$dupfd(r10, 0x406, r7) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') [ 2200.856427] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2213.960578] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.0'. 23:16:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:16:01 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="98000000200039040000000000000000020000000dc0c23671f1a964651e4d52c3dc9432e6af519d60c901a7ea83dce8f6a9c36adbbf7c23348ed7953cc124f0f2e2f1324bf1187b4e1f5a7bf5116e03f38056144e4fd6711849a6579e46004fbfb9ae80572129d57aa41a4c792b56978ebd2e72f57ca14145d7bcd879afed4e97abd691d56cf2d815f272170c0011000000000000000000bb3e3c7562af739c74b82fd57e7bd51e163e9c2394948632056b9357f234b64631cba457c59e6d0eae9098c89e3c7aa8b1cbc03bd674263161cff69945516e14595dfad881c353d7fb9bbdc2fb19f3306b4f29f5ac8dddb92ee4fe33f6e190dffd186aa055b9a9547a834f1d6190acda5d78a8cff254a2de72f20938d689ca4044e9b0a3ee3627818c70cc78d1fe11e55c898d61e09dd9cc4bdefd952f33d4697d06ffd93de78dd16ff6fabb99fb6b42eb449d317ff0f62c982878d984496c08a7a672102affbb245b18bb390e66298d7220110693dd4d00d4a7b9a75298857b75fa243b23c8cf9643bb00000000006dabf39491a19826dd17133c71e29784f2335028a747a6113ad6efdfbffa7205050056d0ee75b2f729232cc5bd028e654e69b60ba5313c46aa44ffefefa1dd182aa574a6fa732d6708584982012bb16aaceda807d810ad63ccfa5203bc3b2fac19fa9b5cd3d3f3e3cd43ced0a0870700adae78cb262f235c0401058ea209faecd0a5262bbda1d50def7cbef31c9b3ac3140d4741d25a4f0277c0ede8517e65b43a81d4e70e4f7c8f3e4c6b059a695c"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) unshare(0x48020200) 23:16:01 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="98000000200039040000000000000000020000000dc0c23671f1a964651e4d52c3dc9432e6af519d60c901a7ea83dce8f6a9c36adbbf7c23348ed7953cc124f0f2e2f1324bf1187b4e1f5a7bf5116e03f38056144e4fd6711849a6579e46004fbfb9ae80572129d57aa41a4c792b56978ebd2e72f57ca14145d7bcd879afed4e97abd691d56cf2d815f272170c0011000000000000000000bb3e3c7562af739c74b82fd57e7bd51e163e9c2394948632056b9357f234b64631cba457c59e6d0eae9098c89e3c7aa8b1cbc03bd674263161cff69945516e14595dfad881c353d7fb9bbdc2fb19f3306b4f29f5ac8dddb92ee4fe33f6e190dffd186aa055b9a9547a834f1d6190acda5d78a8cff254a2de72f20938d689ca4044e9b0a3ee3627818c70cc78d1fe11e55c898d61e09dd9cc4bdefd952f33d4697d06ffd93de78dd16ff6fabb99fb6b42eb449d317ff0f62c982878d984496c08a7a672102affbb245b18bb390e66298d7220110693dd4d00d4a7b9a75298857b75fa243b23c8cf9643bb00000000006dabf39491a19826dd17133c71e29784f2335028a747a6113ad6efdfbffa7205050056d0ee75b2f729232cc5bd028e654e69b60ba5313c46aa44ffefefa1dd182aa574a6fa732d6708584982012bb16aaceda807d810ad63ccfa5203bc3b2fac19fa9b5cd3d3f3e3cd43ced0a0870700adae78cb262f235c0401058ea209faecd0a5262bbda1d50def7cbef31c9b3ac3140d4741d25a4f0277c0ede8517e65b43a81d4e70e4f7c8f3e4c6b059a695c"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x20800) add_key$keyring(&(0x7f0000000740), &(0x7f0000000780)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) unshare(0x48020200) 23:16:01 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r2, r1, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) [ 2214.008876] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.1'. 23:16:01 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:16:01 executing program 7: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) pipe(&(0x7f0000000040)={0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockname(r8, &(0x7f00000000c0)=@isdn, &(0x7f00000001c0)=0x80) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:16:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r1, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:16:01 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r6, r5) ioctl$SG_GET_COMMAND_Q(r6, 0x2270, &(0x7f0000000000)) r7 = dup2(r1, r1) r8 = syz_io_uring_complete(0x0) r9 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r8}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r8, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r9, {0x1}}, './file0\x00'}) write$binfmt_elf64(r7, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c467f020600a50e00000000000002003e0000180000000000000000000040000000000000001e0300000000000006000000050238000100321f0100000100000000030000000500000000000000ff00000000000000a200000000000000d70d0000000000000300000010000000ffff0000000000005563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f40000000000000000000000000000000000000000000000000000000400"/967], 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x0, r8) ioctl$SNDRV_TIMER_IOCTL_TREAD(r8, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:16:01 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x523043, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e9, 0x20, 0x1, 0x175, 0x0, r6}) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:16:01 executing program 0: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) fremovexattr(r2, &(0x7f0000000000)=@known='system.posix_acl_default\x00') r7 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r7, {0x1}}, './file0\x00'}) write$binfmt_elf64(r5, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"/967], 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x0, r6) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:16:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:16:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:16:01 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:16:01 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0x7ffffff9) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000000)=0x0) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f00000000c0)={'\x00', 0xb105, 0x3, 0x1, 0x64c3, 0x7fffffff, r6}) ioctl$SG_IO(r4, 0x1274, 0x0) r7 = dup2(r1, r1) r8 = syz_io_uring_complete(0x0) r9 = io_uring_setup(0x4c18, &(0x7f00000004c0)={0x0, 0xc7e6, 0x20, 0x3, 0x175, 0x0, r8}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r8, 0xc018937c, &(0x7f0000000440)=ANY=[@ANYBLOB="01000000010014efd9340000", @ANYRES32=r9, @ANYBLOB="01000000000000002e2f666975653000"]) write$binfmt_elf64(r7, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"/966], 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x0, r8) ioctl$SNDRV_TIMER_IOCTL_TREAD(r8, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:16:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:16:01 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) dup2(r1, r1) r5 = syz_io_uring_complete(0x0) r6 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e4, 0x0, 0x3, 0x175}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r5, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r6, {0x1}}, './file0\x00'}) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r5) ioctl$SNDRV_TIMER_IOCTL_TREAD(r5, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:16:01 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) add_key$keyring(&(0x7f0000000740), &(0x7f0000000780)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) unshare(0x48020200) [ 2214.274150] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.0'. 23:16:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:16:15 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) unshare(0x48020200) 23:16:15 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) [ 2227.333917] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.0'. 23:16:15 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r3, r2) syz_io_uring_submit(0x0, 0x0, &(0x7f00000000c0)=@IORING_OP_WRITE={0x17, 0x3, 0x2007, @fd=r2, 0x1, &(0x7f0000000000)="d7a18aa6274f3066336631d4cf52ba37aa7df1bd1a787f3c67c35c6bdff60de94e9b1a9489c4808cbae89012d48d91a9f6d8b3d6c31392f75c86256e96410b0134785e66db8aacc819c4cfa03a96b954cad10f5bea111755b2792c37ccaadd665649b62046b4c5b383c36c526cad09e7", 0x70, 0x8, 0x1}, 0x5) r4 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r4, &(0x7f00000002c0)=""/225, 0xe1) r5 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$SG_IO(r6, 0x1274, 0x0) r7 = dup2(r1, r1) r8 = syz_io_uring_complete(0x0) r9 = io_uring_setup(0x4c7a, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x1, 0x1ce, 0x0, r8}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r8, 0xc018937c, &(0x7f0000000440)=ANY=[@ANYBLOB="01005400010000defcffffff", @ANYRES32=r9, @ANYBLOB="01000000000000002e2f66696c653000"]) write$binfmt_elf64(r7, &(0x7f0000000540)=ANY=[@ANYRES64=r5], 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x0, r8) ioctl$SNDRV_TIMER_IOCTL_TREAD(r8, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:16:15 executing program 7: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r1, 0xffffffffffffffff) close_range(r0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r3, &(0x7f00000002c0)=""/225, 0xe1) r4 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$SG_IO(r5, 0x1274, 0x0) r6 = dup2(r2, r2) r7 = syz_io_uring_complete(0x0) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r7}) write$binfmt_elf64(r6, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], 0x3c7) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r8, 0x0, r7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) ioctl$SNDRV_TIMER_IOCTL_TREAD(r7, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:16:15 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:16:15 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) unshare(0x48020200) 23:16:15 executing program 5: ioctl$FAT_IOCTL_GET_ATTRIBUTES(0xffffffffffffffff, 0x80047210, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x8, 0x0, 0x0, 0xf, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x4, @perf_config_ext={0xf906, 0xffffffffffffff75}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d, 0x5, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) pread64(r0, &(0x7f0000000280)=""/178, 0xb2, 0x9028) pread64(r0, &(0x7f0000000340), 0x0, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x10b6) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000020100000001000000004080000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x402}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000080000dff46552e0f465dfe0f4655f000000000000040004", 0x1d, 0x2100}], 0x3b84d5590da9fa74, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x686beb89}}, './file0\x00'}) setsockopt$IPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x41, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x3f, 0x0, 0x0, 0x0, 0x751, 0xd175, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x56039296}, 0x4002, 0x0, 0x3, 0x7, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000380)={0x83, 0xfffffe00, 0xfffffffc, 0x1, 0x0, 0x6}) ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000180)) ftruncate(0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) [ 2227.371099] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.1'. 23:16:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:16:15 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) unshare(0x48020200) 23:16:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:16:15 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) [ 2227.506850] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.5'. 23:16:15 executing program 7: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) dup2(r1, r1) r5 = syz_io_uring_complete(0x0) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r5}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r6, 0x0, r5) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) r8 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0xb, 0x80010, r7, 0x0) syz_io_uring_setup(0x2125, &(0x7f00000003c0)={0x0, 0x233a, 0x20, 0x1, 0x380, 0x0, r6}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000001c0)=0x0) syz_io_uring_submit(r8, r9, &(0x7f0000000200)=@IORING_OP_POLL_REMOVE={0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8bf) ioctl$SNDRV_TIMER_IOCTL_TREAD(r5, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:16:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:16:15 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) r7 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r7, {0x1}}, './file0\x00'}) dup2(r0, r6) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x2, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x0, r6) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:16:15 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r1, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:16:15 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="98000000200039040000000000000000020000000dc0c23671f1a964651e4d52c3dc9432e6af519d60c901a7ea83dce8f6a9c36adbbf7c23348ed7953cc124f0f2e2f1324bf1187b4e1f5a7bf5116e03f38056144e4fd6711849a6579e46004fbfb9ae80572129d57aa41a4c792b56978ebd2e72f57ca14145d7bcd879afed4e97abd691d56cf2d815f272170c0011000000000000000000bb3e3c7562af739c74b82fd57e7bd51e163e9c2394948632056b9357f234b64631cba457c59e6d0eae9098c89e3c7aa8b1cbc03bd674263161cff69945516e14595dfad881c353d7fb9bbdc2fb19f3306b4f29f5ac8dddb92ee4fe33f6e190dffd186aa055b9a9547a834f1d6190acda5d78a8cff254a2de72f20938d689ca4044e9b0a3ee3627818c70cc78d1fe11e55c898d61e09dd9cc4bdefd952f33d4697d06ffd93de78dd16ff6fabb99fb6b42eb449d317ff0f62c982878d984496c08a7a672102affbb245b18bb390e66298d7220110693dd4d00d4a7b9a75298857b75fa243b23c8cf9643bb00000000006dabf39491a19826dd17133c71e29784f2335028a747a6113ad6efdfbffa7205050056d0ee75b2f729232cc5bd028e654e69b60ba5313c46aa44ffefefa1dd182aa574a6fa732d6708584982012bb16aaceda807d810ad63ccfa5203bc3b2fac19fa9b5cd3d3f3e3cd43ced0a0870700adae78cb262f235c0401058ea209faecd0a5262bbda1d50def7cbef31c9b3ac3140d4741d25a4f0277c0ede8517e65b43a81d4e70e4f7c8f3e4c6b059a695c"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) unshare(0x48020200) [ 2227.669034] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2241.058691] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.1'. 23:16:28 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:16:28 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0x79) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) r7 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r7, {0x1}}, './file0\x00'}) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x0, r6) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:16:28 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) unshare(0x48020200) 23:16:28 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) r7 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r7, {0x1}}, './file0\x00'}) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000000)={0x0, r7, 0x0, 0x100000000, 0x3, 0x1439}) fcntl$dupfd(0xffffffffffffffff, 0x0, r6) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:16:28 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:16:28 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r1, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:16:28 executing program 7: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) r7 = openat$cgroup_ro(r4, &(0x7f0000000040)='cpuset.effective_cpus\x00', 0x0, 0x0) io_uring_enter(r7, 0x504d, 0x77a7, 0x1, &(0x7f00000000c0)={[0x5]}, 0x8) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r8, 0x0, r6) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') openat2(r4, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)={0xd0200, 0x48, 0x8}, 0x18) 23:16:28 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="98000000200039040000000000000000020000000dc0c23671f1a964651e4d52c3dc9432e6af519d60c901a7ea83dce8f6a9c36adbbf7c23348ed7953cc124f0f2e2f1324bf1187b4e1f5a7bf5116e03f38056144e4fd6711849a6579e46004fbfb9ae80572129d57aa41a4c792b56978ebd2e72f57ca14145d7bcd879afed4e97abd691d56cf2d815f272170c0011000000000000000000bb3e3c7562af739c74b82fd57e7bd51e163e9c2394948632056b9357f234b64631cba457c59e6d0eae9098c89e3c7aa8b1cbc03bd674263161cff69945516e14595dfad881c353d7fb9bbdc2fb19f3306b4f29f5ac8dddb92ee4fe33f6e190dffd186aa055b9a9547a834f1d6190acda5d78a8cff254a2de72f20938d689ca4044e9b0a3ee3627818c70cc78d1fe11e55c898d61e09dd9cc4bdefd952f33d4697d06ffd93de78dd16ff6fabb99fb6b42eb449d317ff0f62c982878d984496c08a7a672102affbb245b18bb390e66298d7220110693dd4d00d4a7b9a75298857b75fa243b23c8cf9643bb00000000006dabf39491a19826dd17133c71e29784f2335028a747a6113ad6efdfbffa7205050056d0ee75b2f729232cc5bd028e654e69b60ba5313c46aa44ffefefa1dd182aa574a6fa732d6708584982012bb16aaceda807d810ad63ccfa5203bc3b2fac19fa9b5cd3d3f3e3cd43ced0a0870700adae78cb262f235c0401058ea209faecd0a5262bbda1d50def7cbef31c9b3ac3140d4741d25a4f0277c0ede8517e65b43a81d4e70e4f7c8f3e4c6b059a695c"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) add_key$keyring(&(0x7f0000000740), &(0x7f0000000780)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) unshare(0x48020200) [ 2241.082857] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.0'. 23:16:28 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:16:28 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r1, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:16:28 executing program 7: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0x7ffffff9) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x5e, 0x0, 0x38, 0x1f, 0x0, 0x1, 0xa, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x293, 0x0, @perf_config_ext={0x3f, 0x9}, 0x81, 0x8, 0x80, 0x4, 0xfffffffffffffff8, 0x9928, 0x4, 0x0, 0x6, 0x0, 0x4}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x8) r6 = dup2(r1, r1) r7 = syz_io_uring_complete(0x0) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r7}) write$binfmt_elf64(r6, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"/983], 0x3c7) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r8, 0x0, r7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) ioctl$SNDRV_TIMER_IOCTL_TREAD(r7, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:16:28 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="98000000200039040000000000000000020000000dc0c23671f1a964651e4d52c3dc9432e6af519d60c901a7ea83dce8f6a9c36adbbf7c23348ed7953cc124f0f2e2f1324bf1187b4e1f5a7bf5116e03f38056144e4fd6711849a6579e46004fbfb9ae80572129d57aa41a4c792b56978ebd2e72f57ca14145d7bcd879afed4e97abd691d56cf2d815f272170c0011000000000000000000bb3e3c7562af739c74b82fd57e7bd51e163e9c2394948632056b9357f234b64631cba457c59e6d0eae9098c89e3c7aa8b1cbc03bd674263161cff69945516e14595dfad881c353d7fb9bbdc2fb19f3306b4f29f5ac8dddb92ee4fe33f6e190dffd186aa055b9a9547a834f1d6190acda5d78a8cff254a2de72f20938d689ca4044e9b0a3ee3627818c70cc78d1fe11e55c898d61e09dd9cc4bdefd952f33d4697d06ffd93de78dd16ff6fabb99fb6b42eb449d317ff0f62c982878d984496c08a7a672102affbb245b18bb390e66298d7220110693dd4d00d4a7b9a75298857b75fa243b23c8cf9643bb00000000006dabf39491a19826dd17133c71e29784f2335028a747a6113ad6efdfbffa7205050056d0ee75b2f729232cc5bd028e654e69b60ba5313c46aa44ffefefa1dd182aa574a6fa732d6708584982012bb16aaceda807d810ad63ccfa5203bc3b2fac19fa9b5cd3d3f3e3cd43ced0a0870700adae78cb262f235c0401058ea209faecd0a5262bbda1d50def7cbef31c9b3ac3140d4741d25a4f0277c0ede8517e65b43a81d4e70e4f7c8f3e4c6b059a695c"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) add_key$keyring(&(0x7f0000000740), &(0x7f0000000780)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) unshare(0x48020200) 23:16:28 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$SG_IO(r3, 0x1274, 0x0) r4 = dup2(r1, r1) r5 = syz_io_uring_complete(0x0) r6 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r5}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r5, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r6, {0x1}}, './file0\x00'}) write$binfmt_elf64(r4, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$SNDRV_TIMER_IOCTL_TREAD(r5, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') [ 2241.216430] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.5'. 23:16:42 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:16:42 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) (fail_nth: 1) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) add_key$keyring(0x0, &(0x7f0000000780)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) unshare(0x48020200) 23:16:42 executing program 7: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) r7 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r10, 0xffffffffffffffff) sendmsg$unix(0xffffffffffffffff, &(0x7f0000007600)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="0d5de3d74fc73c75cf9f24281c25c634ca767d5bc07fdc93cc37d7083715f8266732245631d1ccb732d6c724fc43227ab4fb133e9de30572fc70a105383789d12df0943ffe0580bcd8b3b50cababb429590b67b57166063b7af05d54dde5333de3388adb3d1675daaaaa3f516994fc2e94ce6192a857825077ce2db8093e1b75f06a89bd72d04f57ef53a550e85568226a18da3884950b14cce8358942233f3898e56fed0e4daeb5f79d760927bf6a627aaeaf4b0ab0b82cd56be1295a1b2244c0de8580760265e176be563ed0782e84ecd6657a385705792fdc627804357629464a43cd3d976b56851dd6e3", 0xec}, {&(0x7f0000000640)="3819d8fbe8ed49c4b90f4bbc9702f763a467f39f19ec23fe8dcd5703f48237ee6fb5b87dfcc87f3791c24cdeca11f45fa35a390c10b55e577ce31131927e561f34470bb4d2b1165e21630706ad8db51c085e04d10a5bd2462fda6785029ce4b06a90388d14ecf676a351cd250bf6d8e49294f7c403fd2169bbaaff163e394fc14db1be5f158216dee5c1d08722564af9482fbe17922ca379c966bd610d109bdeca750e8410166d6894a57363f11878903f30d358cb3898f322f0bfb0baf931455f57bddf0bf517134c0204f54a978506dcc114c70122c7", 0xd7}, {&(0x7f0000000bc0)="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", 0x1000}, {&(0x7f00000000c0)="cd9035b9458de0034459fbaef2b18b0ffb725a693dad9186153aeb42eabd56d927832a16411f3d8eb7f2d8b093060bb2b4ec7d25ce1f706a64461d340b41ff6ca91fb497089b9fca778788b7eea7da", 0x4f}, {&(0x7f00000001c0)="78fdc0f9e9587f03cb8eafab3481aa35df9516a847605f04aa9151bd3f540ddf0b487288e3fe850ad084cee7f7c97357edd17a2b66e554754b24187538fac5883c7ee3631c8c149b02d8b2ca56c51372", 0x50}], 0x5, &(0x7f0000001bc0)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB="000000002800000000000000010000000100000070f111d99e4b33003c755f3fdf65816f5c3d6c7c443abe97c4a850ad20b6672165c9c2e76f213c57d92ab2e09ac0707e3fe28dfe2ba104f500a1595a5fcaad772de60bafa967d26d064b6e1aae73ffdbc5dff752ad3d8b8941a025509f8d2de807409c2b", @ANYRES32=r1, @ANYRES32, @ANYRES32, @ANYRES32=r9, @ANYRES32=r3, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32=r4, @ANYRES32=r7, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32=r10, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0xd0, 0x408c0}, 0x44004881) fcntl$dupfd(r8, 0x0, r6) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') [ 2254.643828] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.0'. 23:16:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:16:42 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:16:42 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) unshare(0x48020200) 23:16:42 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x20800) unshare(0x48020200) 23:16:42 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) r7 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000440)=ANY=[@ANYBLOB="01a2493662da746f06000000", @ANYRES32=r7, @ANYBLOB="01000000000000002e2f66696c653000"]) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) pidfd_open(0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff}) r8 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x420000, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x3f, 0x8, 0x7, 0xfe, 0x0, 0x4, 0x80010, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xabd7, 0x4, @perf_bp={&(0x7f0000000000), 0xb}, 0x2000, 0x2, 0x3, 0x2, 0x1, 0x2, 0x7fff, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0x2, r8, 0xa) fcntl$dupfd(0xffffffffffffffff, 0x0, r6) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') [ 2254.653034] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.1'. 23:16:42 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:16:42 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) [ 2254.675938] FAULT_INJECTION: forcing a failure. [ 2254.675938] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2254.677964] CPU: 1 PID: 11278 Comm: syz-executor.5 Not tainted 5.10.225 #1 [ 2254.678630] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2254.679475] Call Trace: [ 2254.680013] dump_stack+0x107/0x167 [ 2254.680367] should_fail.cold+0x5/0xa [ 2254.680732] _copy_to_user+0x2e/0x180 [ 2254.681105] simple_read_from_buffer+0xcc/0x160 [ 2254.681574] proc_fail_nth_read+0x198/0x230 [ 2254.682000] ? proc_sessionid_read+0x230/0x230 [ 2254.682478] ? security_file_permission+0xb1/0xe0 [ 2254.683508] ? proc_sessionid_read+0x230/0x230 [ 2254.683945] vfs_read+0x228/0x620 [ 2254.684283] ksys_read+0x12d/0x260 [ 2254.684632] ? vfs_write+0xb10/0xb10 [ 2254.691696] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2254.692145] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2254.692584] do_syscall_64+0x33/0x40 [ 2254.692905] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2254.693333] RIP: 0033:0x7fdc0f1bc69c [ 2254.693681] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2254.695400] RSP: 002b:00007fdc0c75e170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2254.696169] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007fdc0f1bc69c [ 2254.696845] RDX: 000000000000000f RSI: 00007fdc0c75e1e0 RDI: 0000000000000004 [ 2254.697522] RBP: 00007fdc0c75e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2254.698217] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2254.698936] R13: 00007ffc71c335ff R14: 00007fdc0c75e300 R15: 0000000000022000 23:16:42 executing program 7: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x4800) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000f202030100b59d0100", @ANYRES32=r3, @ANYBLOB="04000000000000002e2f66696c653000"]) r5 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r5, 0x1274, 0x0) r6 = dup2(r1, r1) r7 = syz_io_uring_complete(0x0) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r7}) write$binfmt_elf64(r6, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"/967], 0x3c7) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r8, 0x0, r7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) ioctl$SNDRV_TIMER_IOCTL_TREAD(r7, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:16:42 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) r7 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r7, {0x1}}, './file0\x00'}) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x0, r6) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:16:42 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:16:42 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r2, r1, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:16:42 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r2, r1, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:16:55 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:16:55 executing program 0: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000640)={[{@nr_inodes={'nr_inodes', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 1) [ 2268.133009] FAULT_INJECTION: forcing a failure. [ 2268.133009] name failslab, interval 1, probability 0, space 0, times 0 [ 2268.135122] CPU: 0 PID: 11306 Comm: syz-executor.0 Not tainted 5.10.225 #1 [ 2268.135825] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2268.136701] Call Trace: [ 2268.136974] dump_stack+0x107/0x167 [ 2268.137310] should_fail.cold+0x5/0xa [ 2268.137736] ? __do_sys_memfd_create+0xfb/0x450 [ 2268.138183] should_failslab+0x5/0x20 [ 2268.138590] __kmalloc+0x72/0x390 [ 2268.138927] __do_sys_memfd_create+0xfb/0x450 [ 2268.139342] ? ksys_write+0x1a9/0x260 [ 2268.139797] ? memfd_file_seals_ptr+0x170/0x170 [ 2268.140911] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2268.142151] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2268.143368] do_syscall_64+0x33/0x40 [ 2268.144218] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2268.145339] RIP: 0033:0x7f3afb19eb19 [ 2268.146145] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2268.150408] RSP: 002b:00007f3af8713f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2268.160226] RAX: ffffffffffffffda RBX: 00000000200005c0 RCX: 00007f3afb19eb19 [ 2268.161883] RDX: 00007f3af8714000 RSI: 0000000000000000 RDI: 00007f3afb1f80fb [ 2268.163556] RBP: 0000000000000000 R08: 00007f3af8713ff8 R09: ffffffffffffffff [ 2268.165241] R10: 00007f3af8713ffc R11: 0000000000000246 R12: 0000000020000000 [ 2268.166904] R13: 0000000020000040 R14: 0000000000000000 R15: 0000000020000640 23:16:55 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:16:55 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r2, r1, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:16:55 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) close(r0) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100ff0018000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) r7 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r6, 0x3) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000440)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r7, @ANYBLOB="01080000000000666908003000000000"]) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x0, r6) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:16:55 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="98000000200039040000000000000000020000000dc0c23671f1a964651e4d52c3dc9432e6af519d60c901a7ea83dce8f6a9c36adbbf7c23348ed7953cc124f0f2e2f1324bf1187b4e1f5a7bf5116e03f38056144e4fd6711849a6579e46004fbfb9ae80572129d57aa41a4c792b56978ebd2e72f57ca14145d7bcd879afed4e97abd691d56cf2d815f272170c0011000000000000000000bb3e3c7562af739c74b82fd57e7bd51e163e9c2394948632056b9357f234b64631cba457c59e6d0eae9098c89e3c7aa8b1cbc03bd674263161cff69945516e14595dfad881c353d7fb9bbdc2fb19f3306b4f29f5ac8dddb92ee4fe33f6e190dffd186aa055b9a9547a834f1d6190acda5d78a8cff254a2de72f20938d689ca4044e9b0a3ee3627818c70cc78d1fe11e55c898d61e09dd9cc4bdefd952f33d4697d06ffd93de78dd16ff6fabb99fb6b42eb449d317ff0f62c982878d984496c08a7a672102affbb245b18bb390e66298d7220110693dd4d00d4a7b9a75298857b75fa243b23c8cf9643bb00000000006dabf39491a19826dd17133c71e29784f2335028a747a6113ad6efdfbffa7205050056d0ee75b2f729232cc5bd028e654e69b60ba5313c46aa44ffefefa1dd182aa574a6fa732d6708584982012bb16aaceda807d810ad63ccfa5203bc3b2fac19fa9b5cd3d3f3e3cd43ced0a0870700adae78cb262f235c0401058ea209faecd0a5262bbda1d50def7cbef31c9b3ac3140d4741d25a4f0277c0ede8517e65b43a81d4e70e4f7c8f3e4c6b059a695c"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) unshare(0x48020200) 23:16:55 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) add_key$keyring(0x0, &(0x7f0000000780)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) unshare(0x48020200) 23:16:55 executing program 7: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x6, 0x240042) ioctl$TUNGETSNDBUF(r4, 0x800454d3, &(0x7f00000000c0)) r5 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r5, 0x1274, 0x0) r6 = dup2(r1, r1) r7 = syz_io_uring_complete(0x0) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r7}) write$binfmt_elf64(r6, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r8, 0x0, r7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) ioctl$SNDRV_TIMER_IOCTL_TREAD(r7, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') [ 2268.187644] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2268.204074] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.5'. 23:16:55 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r2, r1, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:16:55 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r2, r1, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:16:56 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) r7 = io_uring_setup(0x1b35, &(0x7f00000004c0)={0x0, 0x5ce6, 0x20, 0x3, 0x175, 0x0, r6}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000440)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r7, @ANYBLOB="01000000000000002e2f66696c65300e"]) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) r8 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x802, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r8, 0xc00c620f, &(0x7f0000000040)) fcntl$dupfd(0xffffffffffffffff, 0x0, r6) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:16:56 executing program 7: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) write$binfmt_elf64(r5, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c467f020600a50e00000000000002003e0000180000000000000000000040000000000000001e0300000000010000000000050238000100321f0100000100000000030000000500000000000000ff00000000000000a200000000000000d70d0000000000000300000010000000ffff0000000000005563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f400"/967], 0x3c7) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:16:56 executing program 0: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000640)={[{@nr_inodes={'nr_inodes', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 2) 23:16:56 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r2, r1, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:16:56 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, 0x0) [ 2268.410197] FAULT_INJECTION: forcing a failure. [ 2268.410197] name failslab, interval 1, probability 0, space 0, times 0 [ 2268.412432] CPU: 1 PID: 11336 Comm: syz-executor.0 Not tainted 5.10.225 #1 [ 2268.413083] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2268.413891] Call Trace: [ 2268.414506] dump_stack+0x107/0x167 [ 2268.414875] should_fail.cold+0x5/0xa [ 2268.415248] ? create_object.isra.0+0x3a/0xa20 [ 2268.415730] should_failslab+0x5/0x20 [ 2268.416108] kmem_cache_alloc+0x5b/0x310 [ 2268.416520] create_object.isra.0+0x3a/0xa20 [ 2268.416967] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2268.417494] __kmalloc+0x16e/0x390 [ 2268.417861] __do_sys_memfd_create+0xfb/0x450 [ 2268.418887] ? ksys_write+0x1a9/0x260 [ 2268.419713] ? memfd_file_seals_ptr+0x170/0x170 [ 2268.420172] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2268.420709] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2268.421219] do_syscall_64+0x33/0x40 [ 2268.421594] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2268.422097] RIP: 0033:0x7f3afb19eb19 [ 2268.422485] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2268.424310] RSP: 002b:00007f3af8713f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2268.425080] RAX: ffffffffffffffda RBX: 00000000200005c0 RCX: 00007f3afb19eb19 [ 2268.425821] RDX: 00007f3af8714000 RSI: 0000000000000000 RDI: 00007f3afb1f80fb [ 2268.427322] RBP: 0000000000000000 R08: 00007f3af8713ff8 R09: ffffffffffffffff [ 2268.428014] R10: 00007f3af8713ffc R11: 0000000000000246 R12: 0000000020000000 [ 2268.428721] R13: 0000000020000040 R14: 0000000000000000 R15: 0000000020000640 23:16:56 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) r7 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r7, @ANYBLOB="01000000000000002e2f66696c6530004fe4dc6cc8"]) write$binfmt_elf64(r5, &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x0, r6) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x68801, 0xd) [ 2283.128581] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2283.144242] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2283.150997] FAULT_INJECTION: forcing a failure. [ 2283.150997] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2283.152826] CPU: 1 PID: 11369 Comm: syz-executor.0 Not tainted 5.10.225 #1 [ 2283.153418] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2283.154139] Call Trace: [ 2283.154381] dump_stack+0x107/0x167 [ 2283.154707] should_fail.cold+0x5/0xa [ 2283.155046] _copy_from_user+0x2e/0x1b0 [ 2283.155402] __do_sys_memfd_create+0x16d/0x450 [ 2283.155848] ? memfd_file_seals_ptr+0x170/0x170 [ 2283.156260] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2283.156714] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2283.157157] do_syscall_64+0x33/0x40 [ 2283.157485] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2283.157916] RIP: 0033:0x7f3afb19eb19 [ 2283.158233] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2283.159804] RSP: 002b:00007f3af8713f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2283.160469] RAX: ffffffffffffffda RBX: 00000000200005c0 RCX: 00007f3afb19eb19 [ 2283.161078] RDX: 00007f3af8714000 RSI: 0000000000000000 RDI: 00007f3afb1f80fb [ 2283.161697] RBP: 0000000000000000 R08: 00007f3af8713ff8 R09: ffffffffffffffff [ 2283.162309] R10: 00007f3af8713ffc R11: 0000000000000246 R12: 0000000020000000 [ 2283.162923] R13: 0000000020000040 R14: 0000000000000000 R15: 0000000020000640 23:17:10 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, 0x0, 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:17:10 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, 0x0) 23:17:10 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) r7 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000440)=ANY=[@ANYBLOB="01000000010000001000f4ff", @ANYRES32=r7, @ANYBLOB="01000000000000002e2f66696c653000"]) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x0, r6) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:17:10 executing program 7: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x2}, 0x0, 0x0, 0x0, 0x6, 0x0, 0xa418b6d, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:17:10 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) unshare(0x48020200) 23:17:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:17:10 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) add_key$keyring(0x0, &(0x7f0000000780)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) unshare(0x48020200) 23:17:10 executing program 0: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000640)={[{@nr_inodes={'nr_inodes', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 3) 23:17:10 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, 0x0, 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:17:10 executing program 0: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000640)={[{@nr_inodes={'nr_inodes', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 4) 23:17:10 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) r7 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000440)=ANY=[@ANYBLOB="000100004018000000000000", @ANYRES32=r7, @ANYBLOB="01000000000000002e2f66696c653000"]) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x0, r6) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:17:11 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, 0x0, 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) [ 2283.292418] FAULT_INJECTION: forcing a failure. [ 2283.292418] name failslab, interval 1, probability 0, space 0, times 0 [ 2283.293565] CPU: 0 PID: 11380 Comm: syz-executor.0 Not tainted 5.10.225 #1 [ 2283.294184] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2283.294909] Call Trace: [ 2283.295154] dump_stack+0x107/0x167 [ 2283.295477] should_fail.cold+0x5/0xa [ 2283.295833] ? shmem_alloc_inode+0x18/0x40 [ 2283.296226] should_failslab+0x5/0x20 [ 2283.296577] kmem_cache_alloc+0x5b/0x310 [ 2283.296958] ? shmem_destroy_inode+0x70/0x70 [ 2283.297354] shmem_alloc_inode+0x18/0x40 [ 2283.297707] ? shmem_destroy_inode+0x70/0x70 [ 2283.298087] alloc_inode+0x63/0x240 [ 2283.298423] new_inode+0x23/0x250 [ 2283.298742] shmem_get_inode+0x15e/0xbc0 [ 2283.299110] __shmem_file_setup+0xb8/0x320 [ 2283.299492] ? _copy_from_user+0xfb/0x1b0 [ 2283.299883] __do_sys_memfd_create+0x275/0x450 [ 2283.300276] ? memfd_file_seals_ptr+0x170/0x170 [ 2283.300690] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2283.301148] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2283.301596] do_syscall_64+0x33/0x40 [ 2283.301926] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2283.302371] RIP: 0033:0x7f3afb19eb19 [ 2283.302698] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2283.304261] RSP: 002b:00007f3af8713f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2283.304906] RAX: ffffffffffffffda RBX: 00000000200005c0 RCX: 00007f3afb19eb19 [ 2283.305522] RDX: 00007f3af8714000 RSI: 0000000000000000 RDI: 00007f3afb1f80fb [ 2283.306132] RBP: 0000000000000000 R08: 00007f3af8713ff8 R09: ffffffffffffffff [ 2283.306736] R10: 00007f3af8713ffc R11: 0000000000000246 R12: 0000000020000000 [ 2283.307345] R13: 0000000020000040 R14: 0000000000000000 R15: 0000000020000640 [ 2283.345867] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.5'. 23:17:11 executing program 0: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000640)={[{@nr_inodes={'nr_inodes', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 5) 23:17:11 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) unshare(0x48020200) [ 2283.418107] FAULT_INJECTION: forcing a failure. [ 2283.418107] name failslab, interval 1, probability 0, space 0, times 0 [ 2283.419230] CPU: 0 PID: 11387 Comm: syz-executor.0 Not tainted 5.10.225 #1 [ 2283.419822] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2283.420523] Call Trace: [ 2283.420755] dump_stack+0x107/0x167 [ 2283.421070] should_fail.cold+0x5/0xa [ 2283.421401] ? create_object.isra.0+0x3a/0xa20 [ 2283.421791] should_failslab+0x5/0x20 [ 2283.422119] kmem_cache_alloc+0x5b/0x310 [ 2283.422473] create_object.isra.0+0x3a/0xa20 [ 2283.422986] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2283.423422] kmem_cache_alloc+0x159/0x310 [ 2283.423787] ? shmem_destroy_inode+0x70/0x70 [ 2283.424167] shmem_alloc_inode+0x18/0x40 [ 2283.424510] ? shmem_destroy_inode+0x70/0x70 [ 2283.424882] alloc_inode+0x63/0x240 [ 2283.425191] new_inode+0x23/0x250 [ 2283.425490] shmem_get_inode+0x15e/0xbc0 [ 2283.425841] __shmem_file_setup+0xb8/0x320 [ 2283.426201] ? _copy_from_user+0xfb/0x1b0 [ 2283.426555] __do_sys_memfd_create+0x275/0x450 [ 2283.426943] ? memfd_file_seals_ptr+0x170/0x170 [ 2283.427343] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2283.427801] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2283.428242] do_syscall_64+0x33/0x40 [ 2283.428560] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2283.428992] RIP: 0033:0x7f3afb19eb19 [ 2283.429310] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2283.430844] RSP: 002b:00007f3af8713f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2283.431486] RAX: ffffffffffffffda RBX: 00000000200005c0 RCX: 00007f3afb19eb19 [ 2283.432112] RDX: 00007f3af8714000 RSI: 0000000000000000 RDI: 00007f3afb1f80fb [ 2283.432712] RBP: 0000000000000000 R08: 00007f3af8713ff8 R09: ffffffffffffffff [ 2283.433301] R10: 00007f3af8713ffc R11: 0000000000000246 R12: 0000000020000000 [ 2283.433891] R13: 0000000020000040 R14: 0000000000000000 R15: 0000000020000640 23:17:11 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:17:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:17:11 executing program 7: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$BTRFS_IOC_QUOTA_CTL(r0, 0xc0109428, &(0x7f0000000040)={0x1, 0x1}) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pidfd_open(0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_mr_cache\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r1, &(0x7f00000002c0)=""/225, 0xe1) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000400)={0x53, 0xfffffffffffffffe, 0x95, 0x0, @buffer={0x0, 0xe0, &(0x7f0000000540)=""/224}, &(0x7f0000000640)="75d78c04654a1f3467444e020e2b51e5570f3a49fee536892ae84bbaf235d09ea92e2401f1c30b958add1fec5299c1c04167d16f14567bf62f93c78c4ef0464230db54abf935f11462ae4671d4966c5ff109a3db90b7b768a1d1dd20c42e4c4638e693f70e4c8ca6ffb9684a564509dc2d6892c961a3976ce7e9d3ab4e23d20f6c97239a1a96ce0a839d1f1a54dc24cb65eaf178e0", &(0x7f0000000700)=""/171, 0x100, 0x1, 0x2, &(0x7f0000000200)}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$SG_IO(r3, 0x1274, 0x0) r4 = syz_io_uring_complete(0x0) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r4}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"/967], 0x3c7) pipe(&(0x7f0000000280)={0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) sendmsg$IPVS_CMD_GET_INFO(r6, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x40, 0x0, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x1}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @private=0xa010100}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x80}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x1}, 0x8000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r4, 0x40045402, &(0x7f0000000480)=0x1) 23:17:11 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, 0x0) 23:17:11 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:17:11 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x2, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="98000000200039040000000000000000020000000dc0c23671f1a964651e4d52c3dc9432e6af519d60c901a7ea83dce8f6a9c36adbbf7c23348ed7953cc124f0f2e2f1324bf1187b4e1f5a7bf5116e03f38056144e4fd6711849a6579e46004fbfb9ae80572129d57aa41a4c792b56978ebd2e72f57ca14145d7bcd879afed4e97abd691d56cf2d815f272170c0011000000000000000000bb3e3c7562af739c74b82fd57e7bd51e163e9c2394948632056b9357f234b64631cba457c59e6d0eae9098c89e3c7aa8b1cbc03bd674263161cff69945516e14595dfad881c353d7fb9bbdc2fb19f3306b4f29f5ac8dddb92ee4fe33f6e190dffd186aa055b9a9547a834f1d6190acda5d78a8cff254a2de72f20938d689ca4044e9b0a3ee3627818c70cc78d1fe11e55c898d61e09dd9cc4bdefd952f33d4697d06ffd93de78dd16ff6fabb99fb6b42eb449d317ff0f62c982878d984496c08a7a672102affbb245b18bb390e66298d7220110693dd4d00d4a7b9a75298857b75fa243b23c8cf9643bb00000000006dabf39491a19826dd17133c71e29784f2335028a747a6113ad6efdfbffa7205050056d0ee75b2f729232cc5bd028e654e69b60ba5313c46aa44ffefefa1dd182aa574a6fa732d6708584982012bb16aaceda807d810ad63ccfa5203bc3b2fac19fa9b5cd3d3f3e3cd43ced0a0870700adae78cb262f235c0401058ea209faecd0a5262bbda1d50def7cbef31c9b3ac3140d4741d25a4f0277c0ede8517e65b43a81d4e70e4f7c8f3e4c6b059a695c"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) add_key$keyring(0x0, &(0x7f0000000780)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) unshare(0x48020200) 23:17:11 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = getpgrp(0x0) pidfd_open(r2, 0x0) fcntl$lock(r1, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r2}) r3 = perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000005e, 0x83008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x0, 0x7fff}, 0x0, 0x0, 0x7f, 0x3, 0x8, 0xa41896d, 0x0, 0x0, 0x0, 0x0, 0x6}, r2, 0xfffffffffffffffc, 0xffffffffffffffff, 0x2) r4 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r4, &(0x7f00000002c0)=""/225, 0xe1) r5 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$SG_IO(r6, 0x1274, 0x0) r7 = dup2(r3, r3) r8 = syz_io_uring_complete(0x0) r9 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r8}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r8, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r9, {0x1}}, './file0\x00'}) write$binfmt_elf64(r7, &(0x7f0000000d80)=ANY=[@ANYBLOB="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"], 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x0, r8) ioctl$SNDRV_TIMER_IOCTL_TREAD(r8, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') [ 2283.561024] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.5'. 23:17:11 executing program 7: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x7ffffff9) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r3, &(0x7f00000002c0)=""/225, 0xe1) r4 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$SG_IO(r5, 0x1274, 0x0) r6 = dup2(r2, r2) r7 = syz_io_uring_complete(0x0) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r7}) write$binfmt_elf64(r6, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r8, 0x0, r7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) ioctl$SNDRV_TIMER_IOCTL_TREAD(r7, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') [ 2283.739052] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.5'. 23:17:25 executing program 0: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000640)={[{@nr_inodes={'nr_inodes', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 6) 23:17:25 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x3, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) add_key$keyring(0x0, &(0x7f0000000780)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) unshare(0x48020200) 23:17:25 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x0, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:17:25 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) unshare(0x48020200) 23:17:25 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:17:25 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) r7 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) lseek(0xffffffffffffffff, 0x7, 0x0) r8 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r8, 0xffffffffffffffff, 0x0, 0x7ffffff9) getsockopt$IPT_SO_GET_INFO(r8, 0x0, 0x40, &(0x7f0000000000)={'raw\x00', 0x0, [0x7, 0x80000000, 0x100, 0x401, 0x10001]}, &(0x7f00000000c0)=0x54) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r7, {0x1}}, './file0\x00'}) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x0, r6) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:17:25 executing program 7: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x105340, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r1, &(0x7f00000002c0)=""/225, 0xe1) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$SG_IO(r3, 0x1274, 0x0) r4 = syz_io_uring_complete(0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_setup(0x1b33, &(0x7f00000001c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r5}) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'caif0\x00'}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x3c7) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r4) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) ioctl$SNDRV_TIMER_IOCTL_TREAD(r4, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:17:25 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, 0x0) [ 2298.040698] FAULT_INJECTION: forcing a failure. [ 2298.040698] name failslab, interval 1, probability 0, space 0, times 0 [ 2298.041748] CPU: 1 PID: 11424 Comm: syz-executor.0 Not tainted 5.10.225 #1 [ 2298.048459] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2298.049158] Call Trace: [ 2298.049395] dump_stack+0x107/0x167 [ 2298.049699] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2298.050429] should_fail.cold+0x5/0xa [ 2298.050766] ? security_inode_alloc+0x34/0x160 [ 2298.051169] should_failslab+0x5/0x20 [ 2298.051508] kmem_cache_alloc+0x5b/0x310 [ 2298.051868] security_inode_alloc+0x34/0x160 [ 2298.052266] inode_init_always+0xa4e/0xd10 [ 2298.052636] ? shmem_destroy_inode+0x70/0x70 [ 2298.053013] alloc_inode+0x84/0x240 [ 2298.053329] new_inode+0x23/0x250 [ 2298.053631] shmem_get_inode+0x15e/0xbc0 [ 2298.053975] __shmem_file_setup+0xb8/0x320 [ 2298.054351] ? _copy_from_user+0xfb/0x1b0 [ 2298.054714] __do_sys_memfd_create+0x275/0x450 [ 2298.055102] ? memfd_file_seals_ptr+0x170/0x170 [ 2298.055513] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2298.055960] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2298.056399] do_syscall_64+0x33/0x40 [ 2298.056716] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2298.057156] RIP: 0033:0x7f3afb19eb19 [ 2298.057482] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2298.059014] RSP: 002b:00007f3af8713f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2298.059667] RAX: ffffffffffffffda RBX: 00000000200005c0 RCX: 00007f3afb19eb19 [ 2298.060277] RDX: 00007f3af8714000 RSI: 0000000000000000 RDI: 00007f3afb1f80fb [ 2298.060877] RBP: 0000000000000000 R08: 00007f3af8713ff8 R09: ffffffffffffffff [ 2298.061492] R10: 00007f3af8713ffc R11: 0000000000000246 R12: 0000000020000000 [ 2298.062085] R13: 0000000020000040 R14: 0000000000000000 R15: 0000000020000640 23:17:25 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:17:25 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) r7 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) r8 = syz_open_dev$mouse(&(0x7f0000000000), 0x3, 0x600281) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r8, 0xc018937c, &(0x7f0000000440)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r7, @ANYBLOB="01400000000000006e2f66696c653000"]) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x2, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x4, 0x3, 0x5, 0xff, 0xa2, 0x200000000dd7, 0x1000000002, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x0, r6) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:17:25 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:17:25 executing program 0: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000640)={[{@nr_inodes={'nr_inodes', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 7) [ 2298.285756] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.5'. 23:17:26 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x7, 0x0, 0x4, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) r7 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f00000003c0)=ANY=[@ANYBLOB="00000000040000d78e73f58d", @ANYRES32=r7, @ANYRES16=r5, @ANYRESHEX, @ANYRES64=r5, @ANYRES64, @ANYRES16]) r8 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r9 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r9, r8) readv(r9, &(0x7f0000000040)=[{&(0x7f0000000000)=""/40, 0x28}, {&(0x7f00000000c0)=""/77, 0x4d}, {&(0x7f00000001c0)=""/188, 0xbc}], 0x3) write$binfmt_elf64(r5, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x0, r6) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') [ 2298.309518] FAULT_INJECTION: forcing a failure. [ 2298.309518] name failslab, interval 1, probability 0, space 0, times 0 [ 2298.310567] CPU: 1 PID: 11457 Comm: syz-executor.0 Not tainted 5.10.225 #1 [ 2298.311147] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2298.311850] Call Trace: [ 2298.312100] dump_stack+0x107/0x167 [ 2298.312415] should_fail.cold+0x5/0xa [ 2298.312743] ? create_object.isra.0+0x3a/0xa20 [ 2298.313133] should_failslab+0x5/0x20 [ 2298.313459] kmem_cache_alloc+0x5b/0x310 [ 2298.313809] create_object.isra.0+0x3a/0xa20 [ 2298.314186] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2298.314619] kmem_cache_alloc+0x159/0x310 [ 2298.314981] security_inode_alloc+0x34/0x160 [ 2298.315356] inode_init_always+0xa4e/0xd10 [ 2298.315716] ? shmem_destroy_inode+0x70/0x70 [ 2298.316105] alloc_inode+0x84/0x240 [ 2298.316414] new_inode+0x23/0x250 [ 2298.316718] shmem_get_inode+0x15e/0xbc0 [ 2298.317071] __shmem_file_setup+0xb8/0x320 [ 2298.317432] ? _copy_from_user+0xfb/0x1b0 [ 2298.317790] __do_sys_memfd_create+0x275/0x450 [ 2298.318178] ? memfd_file_seals_ptr+0x170/0x170 [ 2298.318579] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2298.319024] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2298.319466] do_syscall_64+0x33/0x40 [ 2298.319785] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2298.320240] RIP: 0033:0x7f3afb19eb19 [ 2298.320559] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2298.322108] RSP: 002b:00007f3af8713f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2298.322758] RAX: ffffffffffffffda RBX: 00000000200005c0 RCX: 00007f3afb19eb19 [ 2298.323361] RDX: 00007f3af8714000 RSI: 0000000000000000 RDI: 00007f3afb1f80fb [ 2298.323976] RBP: 0000000000000000 R08: 00007f3af8713ff8 R09: ffffffffffffffff [ 2298.324585] R10: 00007f3af8713ffc R11: 0000000000000246 R12: 0000000020000000 [ 2298.325185] R13: 0000000020000040 R14: 0000000000000000 R15: 0000000020000640 23:17:26 executing program 7: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000040)={'macvlan1\x00', &(0x7f00000001c0)=@ethtool_rx_ntuple={0x35, {0xd, @ether_spec={@random="e843e2d4be9f", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 0xfff}, @udp_ip4_spec={@loopback, @multicast2, 0x4e23, 0x4e20, 0xff}, 0x8, 0x1, 0x0, 0xc4, 0xfffffffffffffffe}}}) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:17:26 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) unshare(0x48020200) 23:17:26 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:17:26 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x0, 0x0, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:17:26 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x4, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) add_key$keyring(0x0, &(0x7f0000000780)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) unshare(0x48020200) [ 2298.470738] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.5'. 23:17:26 executing program 7: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = pidfd_getfd(r5, r2, 0x0) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000040)='veth0_to_hsr\x00', 0x10) r7 = syz_io_uring_complete(0x0) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r7}) write$binfmt_elf64(r5, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"/967], 0x3c7) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r8, 0x0, r7) readv(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000100)=""/8, 0x8}, {&(0x7f00000001c0)=""/7, 0x7}], 0x2) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) ioctl$SNDRV_TIMER_IOCTL_TREAD(r7, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:17:26 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x4400, 0x0) r2 = dup2(r0, r1) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') read(r4, &(0x7f00000002c0)=""/225, 0xe1) r5 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$SG_IO(r6, 0x1274, 0x0) dup2(r3, r3) fallocate(0xffffffffffffffff, 0x40, 0x0, 0xd73) r7 = syz_io_uring_complete(0x0) r8 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r7}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r7, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r8, {0x1}}, './file0\x00'}) write$binfmt_elf64(r2, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x4, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x3, 0x100}, [{0x7, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0x7}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x0, r7) write$binfmt_aout(r5, &(0x7f0000000bc0)={{0xcc, 0x8, 0x3, 0x31b, 0x266, 0x453, 0x296, 0x2}, "0f28bce1dc353e7d542cbc3461d81e165d148918d0fe9c24aab23aef56eb957b567bbf1be797dcd0456e2ed6c7", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x54d) ioctl$SNDRV_TIMER_IOCTL_TREAD(r7, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:17:26 executing program 0: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000640)={[{@nr_inodes={'nr_inodes', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 8) [ 2298.560516] FAULT_INJECTION: forcing a failure. [ 2298.560516] name failslab, interval 1, probability 0, space 0, times 0 [ 2298.561515] CPU: 1 PID: 11482 Comm: syz-executor.0 Not tainted 5.10.225 #1 [ 2298.562099] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2298.562801] Call Trace: [ 2298.563031] dump_stack+0x107/0x167 [ 2298.563349] should_fail.cold+0x5/0xa [ 2298.563678] ? __d_alloc+0x2a/0x990 [ 2298.564007] should_failslab+0x5/0x20 [ 2298.564343] kmem_cache_alloc+0x5b/0x310 [ 2298.564688] ? trace_hardirqs_on+0x5b/0x180 [ 2298.565058] __d_alloc+0x2a/0x990 [ 2298.565362] d_alloc_pseudo+0x19/0x70 [ 2298.565688] alloc_file_pseudo+0xce/0x250 [ 2298.566042] ? alloc_file+0x5a0/0x5a0 [ 2298.566373] ? shmem_get_inode+0x55c/0xbc0 [ 2298.566735] __shmem_file_setup+0x144/0x320 [ 2298.567101] ? _copy_from_user+0xfb/0x1b0 [ 2298.567458] __do_sys_memfd_create+0x275/0x450 [ 2298.567848] ? memfd_file_seals_ptr+0x170/0x170 [ 2298.568267] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2298.568711] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2298.569147] do_syscall_64+0x33/0x40 [ 2298.569464] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2298.569895] RIP: 0033:0x7f3afb19eb19 [ 2298.570217] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2298.571753] RSP: 002b:00007f3af8713f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2298.572413] RAX: ffffffffffffffda RBX: 00000000200005c0 RCX: 00007f3afb19eb19 [ 2298.573012] RDX: 00007f3af8714000 RSI: 0000000000000000 RDI: 00007f3afb1f80fb [ 2298.573610] RBP: 0000000000000000 R08: 00007f3af8713ff8 R09: ffffffffffffffff [ 2298.574206] R10: 00007f3af8713ffc R11: 0000000000000246 R12: 0000000020000000 [ 2298.574803] R13: 0000000020000040 R14: 0000000000000000 R15: 0000000020000640 23:17:39 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x5, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) add_key$keyring(0x0, &(0x7f0000000780)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) unshare(0x48020200) [ 2312.279920] FAULT_INJECTION: forcing a failure. [ 2312.279920] name failslab, interval 1, probability 0, space 0, times 0 [ 2312.282643] CPU: 0 PID: 11500 Comm: syz-executor.0 Not tainted 5.10.225 #1 [ 2312.284216] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2312.286147] Call Trace: [ 2312.286774] dump_stack+0x107/0x167 [ 2312.287621] should_fail.cold+0x5/0xa [ 2312.288545] ? create_object.isra.0+0x3a/0xa20 [ 2312.289624] should_failslab+0x5/0x20 23:17:39 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)) 23:17:39 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, 0x0) [ 2312.290498] kmem_cache_alloc+0x5b/0x310 [ 2312.291612] create_object.isra.0+0x3a/0xa20 [ 2312.292641] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2312.293797] kmem_cache_alloc+0x159/0x310 [ 2312.294780] __d_alloc+0x2a/0x990 [ 2312.295594] d_alloc_pseudo+0x19/0x70 [ 2312.296511] alloc_file_pseudo+0xce/0x250 [ 2312.297452] ? alloc_file+0x5a0/0x5a0 [ 2312.298300] ? shmem_get_inode+0x55c/0xbc0 [ 2312.299302] __shmem_file_setup+0x144/0x320 [ 2312.300302] ? _copy_from_user+0xfb/0x1b0 [ 2312.301253] __do_sys_memfd_create+0x275/0x450 [ 2312.302304] ? memfd_file_seals_ptr+0x170/0x170 [ 2312.303391] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2312.304666] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2312.305844] do_syscall_64+0x33/0x40 [ 2312.306726] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2312.307897] RIP: 0033:0x7f3afb19eb19 [ 2312.308771] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2312.313004] RSP: 002b:00007f3af8713f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2312.314750] RAX: ffffffffffffffda RBX: 00000000200005c0 RCX: 00007f3afb19eb19 [ 2312.316387] RDX: 00007f3af8714000 RSI: 0000000000000000 RDI: 00007f3afb1f80fb [ 2312.318186] RBP: 0000000000000000 R08: 00007f3af8713ff8 R09: ffffffffffffffff [ 2312.319739] R10: 00007f3af8713ffc R11: 0000000000000246 R12: 0000000020000000 [ 2312.321303] R13: 0000000020000040 R14: 0000000000000000 R15: 0000000020000640 23:17:40 executing program 0: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000640)={[{@nr_inodes={'nr_inodes', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 9) 23:17:40 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r1, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:17:40 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) r7 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r7, {0x1}}, './file0\x00'}) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0x1f, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4"}, 0xc7) fcntl$dupfd(0xffffffffffffffff, 0x0, r6) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:17:40 executing program 7: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xd0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x3, 0x0, 0x5, 0x7ff, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) write$binfmt_elf64(r5, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], 0x3c7) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r9, 0xffffffffffffffff, 0x0, 0x7ffffff9) close_range(r8, r9, 0x0) fcntl$dupfd(r7, 0x0, r6) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:17:40 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, 0x0, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) unshare(0x48020200) [ 2312.321505] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.5'. 23:17:40 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r1, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) [ 2312.547304] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.5'. 23:17:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, 0x0) 23:17:53 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x6, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) add_key$keyring(0x0, &(0x7f0000000780)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) unshare(0x48020200) 23:17:53 executing program 4: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = pidfd_getfd(r5, r2, 0x0) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000040)='veth0_to_hsr\x00', 0x10) r7 = syz_io_uring_complete(0x0) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r7}) write$binfmt_elf64(r5, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"/967], 0x3c7) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r8, 0x0, r7) readv(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000100)=""/8, 0x8}, {&(0x7f00000001c0)=""/7, 0x7}], 0x2) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) ioctl$SNDRV_TIMER_IOCTL_TREAD(r7, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:17:53 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r1, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:17:53 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) r7 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r7, {0x1}}, './file0\x00'}) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x0, r6) r8 = syz_open_pts(r2, 0x80000) dup(r8) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7ffffff9) io_uring_enter(0xffffffffffffffff, 0xf9e, 0x6a00, 0x2, &(0x7f0000000000), 0x8) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:17:53 executing program 7: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x1274, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f00000001c0)={{0x0, 0x10000, 0x4, 0x9, 0x10001, 0x8001, 0xff, 0x6, 0xfffffffa, 0x54, 0x2, 0xb854, 0x0, 0x101, 0x6}, 0x40, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000040)=0x3a) r3 = dup2(r1, r1) r4 = syz_io_uring_complete(0x0) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r4}) write$binfmt_elf64(r3, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r5, 0x0, r4) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) ioctl$SNDRV_TIMER_IOCTL_TREAD(r4, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:17:53 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, 0x0, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) unshare(0x48020200) 23:17:53 executing program 0: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000640)={[{@nr_inodes={'nr_inodes', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 10) [ 2325.752964] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2325.765200] FAULT_INJECTION: forcing a failure. [ 2325.765200] name failslab, interval 1, probability 0, space 0, times 0 [ 2325.766291] CPU: 0 PID: 11538 Comm: syz-executor.0 Not tainted 5.10.225 #1 [ 2325.766888] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2325.767665] Call Trace: [ 2325.767895] dump_stack+0x107/0x167 [ 2325.768207] should_fail.cold+0x5/0xa [ 2325.768619] ? __alloc_file+0x21/0x320 [ 2325.768962] should_failslab+0x5/0x20 [ 2325.769347] kmem_cache_alloc+0x5b/0x310 [ 2325.769706] __alloc_file+0x21/0x320 [ 2325.770030] alloc_empty_file+0x6d/0x170 [ 2325.770423] alloc_file+0x5e/0x5a0 [ 2325.770734] alloc_file_pseudo+0x16a/0x250 [ 2325.771095] ? alloc_file+0x5a0/0x5a0 [ 2325.771499] ? shmem_get_inode+0x55c/0xbc0 [ 2325.771861] __shmem_file_setup+0x144/0x320 [ 2325.772272] ? _copy_from_user+0xfb/0x1b0 [ 2325.772671] __do_sys_memfd_create+0x275/0x450 [ 2325.773066] ? memfd_file_seals_ptr+0x170/0x170 [ 2325.773522] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2325.773964] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2325.774445] do_syscall_64+0x33/0x40 [ 2325.774760] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2325.775190] RIP: 0033:0x7f3afb19eb19 [ 2325.775585] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2325.777210] RSP: 002b:00007f3af8713f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2325.777912] RAX: ffffffffffffffda RBX: 00000000200005c0 RCX: 00007f3afb19eb19 [ 2325.778557] RDX: 00007f3af8714000 RSI: 0000000000000000 RDI: 00007f3afb1f80fb [ 2325.779169] RBP: 0000000000000000 R08: 00007f3af8713ff8 R09: ffffffffffffffff [ 2325.779836] R10: 00007f3af8713ffc R11: 0000000000000246 R12: 0000000020000000 [ 2325.780557] R13: 0000000020000040 R14: 0000000000000000 R15: 0000000020000640 23:17:53 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:17:53 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x5, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) add_key$keyring(0x0, &(0x7f0000000780)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) unshare(0x48020200) 23:17:53 executing program 7: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') r2 = epoll_create(0x3) read(r2, &(0x7f0000000540)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x3f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0x8000, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') dup2(0xffffffffffffffff, 0xffffffffffffffff) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, 0xffffffffffffffff, &(0x7f0000000040)={0x30000018}) 23:17:53 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) syz_io_uring_complete(0x0) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000000)={{0x0, 0xe28, 0xfffffffeffffffff, 0x5, 0x61, 0x2, 0x40b, 0x1000, 0x70, 0x8, 0x7, 0x7, 0x9451, 0x3f, 0xfffffffffffffffe}, 0x8, [0x0]}) r7 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r7, {0x1}}, './file0\x00'}) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x0, r6) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:17:53 executing program 0: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000640)={[{@nr_inodes={'nr_inodes', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 11) [ 2325.905799] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.4'. 23:17:53 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) [ 2325.939050] FAULT_INJECTION: forcing a failure. [ 2325.939050] name failslab, interval 1, probability 0, space 0, times 0 [ 2325.940062] CPU: 1 PID: 11554 Comm: syz-executor.0 Not tainted 5.10.225 #1 [ 2325.940674] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2325.941366] Call Trace: [ 2325.941599] dump_stack+0x107/0x167 [ 2325.941924] should_fail.cold+0x5/0xa [ 2325.942257] ? create_object.isra.0+0x3a/0xa20 [ 2325.942652] should_failslab+0x5/0x20 [ 2325.942976] kmem_cache_alloc+0x5b/0x310 [ 2325.943324] create_object.isra.0+0x3a/0xa20 [ 2325.943696] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2325.944144] kmem_cache_alloc+0x159/0x310 [ 2325.944522] __alloc_file+0x21/0x320 [ 2325.944837] alloc_empty_file+0x6d/0x170 [ 2325.945179] alloc_file+0x5e/0x5a0 [ 2325.945484] alloc_file_pseudo+0x16a/0x250 [ 2325.945840] ? alloc_file+0x5a0/0x5a0 [ 2325.946176] ? shmem_get_inode+0x55c/0xbc0 [ 2325.946540] __shmem_file_setup+0x144/0x320 [ 2325.946905] ? _copy_from_user+0xfb/0x1b0 [ 2325.947269] __do_sys_memfd_create+0x275/0x450 [ 2325.947664] ? memfd_file_seals_ptr+0x170/0x170 [ 2325.948063] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2325.948527] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2325.948973] do_syscall_64+0x33/0x40 [ 2325.949298] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2325.949743] RIP: 0033:0x7f3afb19eb19 [ 2325.950058] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2325.951601] RSP: 002b:00007f3af8713f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2325.952237] RAX: ffffffffffffffda RBX: 00000000200005c0 RCX: 00007f3afb19eb19 [ 2325.952860] RDX: 00007f3af8714000 RSI: 0000000000000000 RDI: 00007f3afb1f80fb [ 2325.953454] RBP: 0000000000000000 R08: 00007f3af8713ff8 R09: ffffffffffffffff [ 2325.954060] R10: 00007f3af8713ffc R11: 0000000000000246 R12: 0000000020000000 [ 2325.954659] R13: 0000000020000040 R14: 0000000000000000 R15: 0000000020000640 23:17:53 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) r7 = io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000440)={{0x1, 0x1, 0x18, r7, {0x1}}, './file0\x00'}) write$binfmt_elf64(r5, &(0x7f00000007c0)=ANY=[@ANYBLOB="7f454c467f020600a50e00000000000002003e0000180000000000000000000040000000000000001e0300000000000006000000050238000100321f0100000100000000030000000500000000000000ff00000000000000a200000000000000d70d0000000000000300000010000000ffff0000000000005563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d3f2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f40000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001400"/967], 0x3c7) fcntl$dupfd(0xffffffffffffffff, 0x0, r6) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') [ 2325.996465] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.5'. 23:17:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x0, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:17:53 executing program 7: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x0, 0x3, 0x22a, 0x0, r6}) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:17:53 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x7, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) add_key$keyring(0x0, &(0x7f0000000780)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) unshare(0x48020200) 23:17:53 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) 23:17:53 executing program 0: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000640)={[{@nr_inodes={'nr_inodes', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 12) [ 2326.114630] FAULT_INJECTION: forcing a failure. [ 2326.114630] name failslab, interval 1, probability 0, space 0, times 0 [ 2326.117212] CPU: 1 PID: 11571 Comm: syz-executor.0 Not tainted 5.10.225 #1 [ 2326.118719] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2326.120560] Call Trace: [ 2326.121131] dump_stack+0x107/0x167 [ 2326.121921] should_fail.cold+0x5/0xa 23:17:53 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, 0x0, 0x0) close_range(r1, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20800) unshare(0x48020200) [ 2326.122757] ? security_file_alloc+0x34/0x170 [ 2326.123552] should_failslab+0x5/0x20 [ 2326.123877] kmem_cache_alloc+0x5b/0x310 [ 2326.124230] security_file_alloc+0x34/0x170 [ 2326.124656] __alloc_file+0xb7/0x320 [ 2326.125009] alloc_empty_file+0x6d/0x170 [ 2326.125395] alloc_file+0x5e/0x5a0 [ 2326.125736] alloc_file_pseudo+0x16a/0x250 [ 2326.126134] ? alloc_file+0x5a0/0x5a0 [ 2326.126492] ? shmem_get_inode+0x55c/0xbc0 [ 2326.126865] __shmem_file_setup+0x144/0x320 [ 2326.127234] ? _copy_from_user+0xfb/0x1b0 [ 2326.127594] __do_sys_memfd_create+0x275/0x450 [ 2326.127981] ? memfd_file_seals_ptr+0x170/0x170 [ 2326.128396] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2326.128841] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2326.129283] do_syscall_64+0x33/0x40 [ 2326.129604] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2326.130033] RIP: 0033:0x7f3afb19eb19 [ 2326.130361] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2326.131900] RSP: 002b:00007f3af8713f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2326.132560] RAX: ffffffffffffffda RBX: 00000000200005c0 RCX: 00007f3afb19eb19 [ 2326.133159] RDX: 00007f3af8714000 RSI: 0000000000000000 RDI: 00007f3afb1f80fb [ 2326.133772] RBP: 0000000000000000 R08: 00007f3af8713ff8 R09: ffffffffffffffff [ 2326.134382] R10: 00007f3af8713ffc R11: 0000000000000246 R12: 0000000020000000 [ 2326.134982] R13: 0000000020000040 R14: 0000000000000000 R15: 0000000020000640 23:17:53 executing program 6: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_mr_cache\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) r7 = io_uring_setup(0x1f33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000440)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r7, @ANYBLOB='\x00\x00']) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) syz_io_uring_submit(0x0, 0x0, &(0x7f00000000c0)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x77359400}}, 0xffffffff) fcntl$dupfd(0xffffffffffffffff, 0x0, r6) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') 23:17:53 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000001c0)={0xa5, 0x1f, 0x7f, "2b69890b98463f0f71035091c73a153d26bd064f381e3cea207cfcaeb57e29edd2c44aa851a6c3b58fcbf0ea3a7dc1355d9866974232337a1f6b08897e450d817c307567f9bbcad0c85f73504b0a0ef11d5ae69c61ae114763dee001ccc892a57b3de541900ee6b9eee26048751d22f2d65ff74d206d3eb18211f99c169707fe5ad6a53e13d35deea5b7064f95f613b6e8c0dfd2e85c4293c9c503488020407e20d314556e"}) [ 2326.182647] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.5'. 23:17:53 executing program 7: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SG_IO(r4, 0x1274, 0x0) r5 = dup2(r1, r1) r6 = syz_io_uring_complete(0x0) io_uring_setup(0x1b33, &(0x7f00000004c0)={0x0, 0xc7e7, 0x20, 0x3, 0x175, 0x0, r6}) write$binfmt_elf64(r5, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0xea5, 0x2, 0x3e, 0x1800, 0x0, 0x40, 0x31e, 0x6, 0x205, 0x38, 0x1, 0x1f32, 0x1, 0x100}, [{0x0, 0x3, 0x5, 0xff, 0xa2, 0xdd7, 0x1000000003, 0xffff}], "5563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f4", ['\x00', '\x00', '\x00']}, 0x3c7) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000480)=0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') r8 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r8, 0xffffffffffffffff) fchmod(r8, 0x0) 23:17:54 executing program 0: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000640)={[{@nr_inodes={'nr_inodes', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 13) [ 2326.331441] FAULT_INJECTION: forcing a failure. [ 2326.331441] name failslab, interval 1, probability 0, space 0, times 0 [ 2326.332538] CPU: 0 PID: 11589 Comm: syz-executor.0 Not tainted 5.10.225 #1 [ 2326.333174] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2326.333930] Call Trace: [ 2326.334163] dump_stack+0x107/0x167 [ 2326.334482] should_fail.cold+0x5/0xa [ 2326.334793] ? create_object.isra.0+0x3a/0xa20 [ 2326.335225] should_failslab+0x5/0x20 [ 2326.335573] kmem_cache_alloc+0x5b/0x310 [ 2326.335966] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 2326.336451] create_object.isra.0+0x3a/0xa20 [ 2326.336807] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2326.337304] kmem_cache_alloc+0x159/0x310 [ 2326.337652] security_file_alloc+0x34/0x170 [ 2326.338468] __alloc_file+0xb7/0x320 [ 2326.338769] alloc_empty_file+0x6d/0x170 [ 2326.339141] alloc_file+0x5e/0x5a0 [ 2326.339673] alloc_file_pseudo+0x16a/0x250 [ 2326.340510] ? alloc_file+0x5a0/0x5a0 [ 2326.341244] ? shmem_get_inode+0x55c/0xbc0 [ 2326.342209] __shmem_file_setup+0x144/0x320 [ 2326.342991] ? _copy_from_user+0xfb/0x1b0 [ 2326.343697] __do_sys_memfd_create+0x275/0x450 [ 2326.344557] ? memfd_file_seals_ptr+0x170/0x170 [ 2326.345487] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2326.346158] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2326.347325] do_syscall_64+0x33/0x40 [ 2326.347664] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2326.348810] RIP: 0033:0x7f3afb19eb19 [ 2326.349235] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2326.353464] RSP: 002b:00007f3af8713f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2326.354177] RAX: ffffffffffffffda RBX: 00000000200005c0 RCX: 00007f3afb19eb19 [ 2326.354815] RDX: 00007f3af8714000 RSI: 0000000000000000 RDI: 00007f3afb1f80fb [ 2326.355496] RBP: 0000000000000000 R08: 00007f3af8713ff8 R09: ffffffffffffffff [ 2326.356155] R10: 00007f3af8713ffc R11: 0000000000000246 R12: 0000000020000000 [ 2326.356800] R13: 0000000020000040 R14: 0000000000000000 R15: 0000000020000640 [ 2326.435061] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.5'. BUG: leak checking failed VM DIAGNOSIS: 23:17:54 Registers: info registers vcpu 0 RAX=0000000000000000 RBX=0000000000000000 RCX=ffffffff81d23c0d RDX=ffff888016fc9a40 RSI=ffffffff81d23c17 RDI=0000000000000005 RBP=0000000000000010 RSP=ffff888016dc7bd8 R8 =0000000000000000 R9 =0000000000000000 R10=0000000000000000 R11=0000000000000001 R12=0000000000000008 R13=0000000000000000 R14=000000000000002b R15=ffffffff871c8d40 RIP=ffffffff81409f60 RFL=00000246 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f67a45dd8c0 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007ffc71c31ff4 CR3=000000000d900000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=000000000000002f002f2e2e2f002e2e XMM01=0000000000000000696c61766e49002f XMM02=ffffffffffffff0f0e0d0c0b0a090807 XMM03=696e656420737365636341002f737973 XMM04=2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f XMM05=000055a7f77d7c80000055a7f78026a0 XMM06=000055a7f77ec4b00000000000000000 XMM07=00000000000000000000000000000000 XMM08=2f63697361622f6372732f2e2e000d0a XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=000055a7f77e2dc0 RBX=000055a7f77bbd90 RCX=0000000000000700 RDX=000055a7f77e2d60 RSI=0000000000000000 RDI=0000000000000000 RBP=0000000000000009 RSP=00007ffd373c4e80 R8 =0000000000000000 R9 =0000000000000000 R10=000055a7f77f7330 R11=0000000000000000 R12=000055a7f77e2df0 R13=0000000000000000 R14=0000000000000002 R15=000055a7f77e58f0 RIP=000055a7eade407c RFL=00000206 [-----P-] CPL=3 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0033 0000000000000000 ffffffff 00a0fb00 DPL=3 CS64 [-RA] SS =002b 0000000000000000 ffffffff 00c0f300 DPL=3 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f67a45dd8c0 00000000 00000000 GS =0000 0000000000000000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=000055a7f77fbe40 CR3=0000000047d0e000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=ffffff0f0e0d0c0b0a09080706050403 XMM03=696e656420737365636341002f737973 XMM04=2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f XMM05=000055a7f77fc730000055a7f77f26d0 XMM06=00000000000000000000000300000000 XMM07=00000000000000000000000000000000 XMM08=0000000000000000000055a7f6f7aa60 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000